Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Good, the Bad and the Risky: Current State of IT Security for SMBs

netwrix_statistics_400

Technology has revolutionized business. However, along with all the advantages and benefits technology affords us, it comes with a few risks and vulnerabilities that some businesses are still struggling to come to terms with. For example, storing records electronically makes them easier to organize and locate when they’re needed. It also makes them vulnerable to hacker and cyber-attacks. Still, most SMBs are working toward mitigating risks as opposed to abandoning the use of technology in their business operations - and a current assessment of the situation does show improvement over past years.

The following seven statistics examine the current state of IT security for SMBs, as well as why these numbers should be of importance to you and your business.

  • Only 36 percent of organizations report being fully aware of employee activity on their network.
    From terminated employees with continued access to your network to current employees spending the day on social media instead of working and even to Internet of Things devices connecting without knowledge or permission of a company, there are all types of unauthorized access that a business network has to be aware of. This study is saying that only 1/3 of companies have an idea of what is happening on their network. When it comes to network access, what you don’t know can hurt you - and cost your company money!
  • The percentage of businesses that that have at least some control over employee activity on their network grew from 62 percent in 2016 to 85 percent in 2017.
    This statistic is one of the few significant positive changes that is highlighted in this business IT risk report. SMBs are finally starting to recognize the importance of access control when it comes to IT security. The truth is, many major security breaches are caused by human error (some of it intentional) from employees who access a network or parts of a network outside of their job with malicious intent.

  • 65 percent of respondents admitted to having security incidents in 2016; the most common reasons cited were malware and human errors.
    SMBs are being targeted regularly by cyber criminals. Many of these respondents have failed to take the proper network security measures, despite a security incident. Historically, many SMBs are involved in a full-scale cyber-attack and experience loss before they fully enact and enforce network security.

  • 48 percent of organizations that have to comply with any cyber security standard still struggle to ensure continuous compliance and provide complete evidence of it to auditors.
    Certain industries require SMBs to comply with cyber security standards and regulations, regardless of their size and network security experience. Moving forward, it will be more and more common for the entries requiring compliance to request proof of compliance, including policy implementation and compliance audits. For SMBs who can’t meet these compliances, it is recommended that they contact a third party, like Computerware for guidance.

  • 79 percent of respondents say that detecting and mitigating human errors, both malicious or accidental is critical for reducing IT risks.
    The secret is out. Sometimes, humans make mistakes. Other times, they are just up to no-good. For example, malware may ravage a network as a result of an employee that accidently clicks on an attachment in their email. SMBs have started to acknowledge the element of risk generated on a regular base by humans. Businesses next need to take measures to mitigate the human threat with proper training of best practices, ensuring they take situationally-appropriate network security measures, and regularly update these measures to keep up with threats and risks.

These are just five of the many items that Netwrix Risk Report can tell SMBs about all of the threats that they are facing every day. For those of you who don’t have time to read IT risk reports, a partnership with Computerware will go a long way toward making your network and data safe - against all types of threats, including the human element.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Software Productivity Business Computing Backup Hackers Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Efficiency Google Quick Tips Gadgets Smartphones Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery Computer User Tips Virtualization Microsoft Office Server Network Network Security Miscellaneous Upgrade VoIP Social Media Windows 10 Windows Unified Threat Management Mobile Device Management Innovation Smartphone Operating System BYOD Communication Ransomware Android WiFi Vendor Management Remote Computing Passwords Apps The Internet of Things Mobile Computing Marketing Remote Monitoring Facebook Users History Holiday Managed IT services Firewall Data Management Analytics Apple Collaboration Alert IT Consultant Save Money Content Filtering Outsourced IT Bring Your Own Device Managed IT Services Automation Health Office Big data App Best Practice Windows 8 BDR Spam Going Green Hiring/Firing Phishing Tech Support Wireless Technology Search Productivity Outlook Lithium-ion Battery Hard Drives Virus Internet of Things Antivirus Phone System Data Backup Encryption Information Technology IBM IT Support Printer Gmail Managed IT Recovery Browser Employer-Employee Relationship Budget Help Desk Computers Bandwidth Customer Service Artificial Intelligence Education Save Time Humor Money Saving Time Running Cable Data storage Administration Maintenance communications Proactive IT SaaS Two-factor Authentication VPN Wireless Twitter Website Travel Black Market iPhone Business Intelligence Networking Hacking Fax Server It Management Telephone Systems Document Management Mobile Device Training Hard Drive Office 365 Computer Repair User Avoiding Downtime Securty Intranet Windows 10 Solid State Drive DDoS Government Update Flexibility Current Events Word Risk Management Legal Digital Payment Password Data Recovery Hacker PowerPoint Tablet Hosted Solution Social Networking Virtual Desktop Text Messaging Cloud Computing Robot Hack IT service Programming Documents Heating/Cooling Compliance Co-managed IT Net Neutrality Retail Business Growth Experience Telephony Monitors Public Cloud Lifestyle Cybersecurity YouTube Settings Trending Mobility Disaster End of Support Automobile Safety Statistics Law Enforcement Social Politics How To Network Congestion Pain Points Streaming Media Inbound Marketing Start Menu User Error Taxes Cybercrime Excel Laptop Chrome Uninterrupted Power Supply Cortana Cost Management Gaming Console Office Tips Router Computer Accessories Paperless Office Processors Comparison Customer Relationship Management Downtime Webcam Augmented Reality USB Sports Presentation Computing Company Culture Redundancy GPS Notifications Scalability Reliable Computing Skype Turn Key VoIP Consultation Virtual Reality Trojan Meetings Music Ebay Teamwork Project Management 3D Social Engineering Organize Cabling Upgrades Private Cloud Administrator LiFi Recycling Storage Bluetooth Computing Infrastructure Supercomputer PDF Keyboard Pirating Information Best Available Emergency Adminstration Rental Service Worker Deep Learning Machine Learning Memory Distributed Denial of Service Visible Light Communication Domains Product Reviews Read Google Drive Wi-Fi Employer Employee Relationship eWaste Content Management Shortcut Value Licensing Flash Botnet Advertising Troubleshooting Electricity Harddrive Google Wallet Staffing Environment Competition Video Surveillance Business Technology Displays Computer Malfunction LinkedIn Unified Communications Business Owner Saving ZTime External Harddrive WannaCry Time Management Banking Drones Archive Application Debate Scam File Sharing Language Get More Done Motion Sickness Permissions Specifications Smart Phones Touchscreen Business Metrics Printer Server Tracking Point of Contact switches Digital Signature Knowledge Writing Web Server Entertainment Thin CLient Digital Websites Chromebook Workers Tech Terms Messenger Access Work/Life Balance Cryptocurrency Leadership Analytic Upselling Software as a Service Download Webinar Samsung Google Docs G Suite IT consulting Public Speaking Device Management Books Spyware Physical Security Cleaning Microchip Tablets CIO Entrepreneur Sync online Currency Windows XP HIPAA Reading Business Managemenet Data Protection Regulations cache Best Practives CCTV Society Electronic Payment Patch Management Hacks Google Maps Micrsooft In Internet of Things IP Address Mouse Relocation Microserver Corporate Profile Assessment Identity Theft Emails Human Resources Capital Productuvuty Vulnerability CrashOverride 3D Printing

hp supplies medallionLarge2017