Can Small Business Beat Cyber Attacks?

According to Verizon's 2019 Data Breach Investigations Report, 43% of Cyber Attacks are aimed at small businesses and the weakest link is lack of employee Cyber understanding – every member of the team needs continual training. A recent UK government survey estimated that the average cost of a small business cyberattack is between £65,000 and £115,000. 

Cybercrime recovery potentially involves many measures, including identifying and fixing the problem, replacing damaged software and hardware, hiring specialist IT security consultants, hiring a PR firm to manage a damaged reputation, and hiring a solicitor to deal with clients who’ve had their own business compromised as a result of cybercrime.

It is clear that an attack would be a massive upheaval for most small businesses. As well as following its cyber protection advice, the Federation of Small Businesses has stressed the need for smaller companies to put in place specific cyber protection solutions to guard against this significant risk.

A good cybersecurity strategy is essential for any business, no matter its size, but in the midst of a sever lack of security experts, what’s a small business to do?

It’s a vexing question as cybercriminals continue to score goal after goal with simple attacks such as phishing emails, in which attackers use already-compromised passwords to access users’ other work and personal accounts.

In Australiane Office of the Australian Information Commissioner (OAIC) stats confirm that businesses there also remain extremely vulnerable to the attacks. A server containing 1.2 billion personal profiles including 622m email addresses was recently discovered. Small businesses make up more than 97 per cent of Australia’s businesses, even those that recognise the need to improve security can struggle to give it the priority of major enterprises.

By contrast, 62 per cent of small businesses are sole traders and 27 per cent have just 1 to 4 employees. Margins are often tight, leaving little left over to spend on cybersecurity tools and even less for the six-figure salaries needed to lure cybersecurity specialists.

Throw in the challenges of a market with an estimated 100,000-person IT skills gap making it is ‘very difficult’ to recruit cybersecurity specialists, and small businesses are vulnerable to an unchecked stream of cybersecurity threats.
There were 60 per cent more cybersecurity threats against healthcare organisations, the majority of which are small businesses, in the first three quarters of this year than in all of 2018.

Detecting, stopping and recovering from such attacks requires a broad range of security skills, while proactive defences takes job descriptions to a whole new level. Yet even those companies that do manage to hire an IT person with some cybersecurity experience often find their capabilities limited. 

In light of the ever-increasing threat, now is the time to protect your business against cybercrime. Increase your ability to prevent cybercrime within your SME by adopting best practice and awareness training, and increase your ability to recover by adopting cyber insurance. Neither need to be costly, but they could save your business.

Please contact Cyber Security Intelligence for advice and help.

Informationa Age:       Small Business:           ByteStart:

You Might Also Read:


Cyber Security Training That Employees Don’t Hate:

 

 

« AI And IoT Have Created The AIoT
Finland Has A Cyber Security Standard For IoT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Naval Dome

Naval Dome

Naval Dome provides the first maritime multilayer cyber defense solution for mission critical onboard systems.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Global Market Innovators (GMI)

Global Market Innovators (GMI)

Global Market Innovators (GMI) delivers secure technology solutions to organizations in need.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.