The Good, the Bad and the Risky: Current State of IT Security for SMBs


Technology has revolutionized business. However, along with all the advantages and benefits technology affords us, it comes with a few risks and vulnerabilities that some businesses are still struggling to come to terms with. For example, storing records electronically makes them easier to organize and locate when they’re needed. It also makes them vulnerable to hacker and cyber-attacks. Still, most SMBs are working toward mitigating risks as opposed to abandoning the use of technology in their business operations - and a current assessment of the situation does show improvement over past years.

The following seven statistics examine the current state of IT security for SMBs, as well as why these numbers should be of importance to you and your business.

  • Only 36 percent of organizations report being fully aware of employee activity on their network.
    From terminated employees with continued access to your network to current employees spending the day on social media instead of working and even to Internet of Things devices connecting without knowledge or permission of a company, there are all types of unauthorized access that a business network has to be aware of. This study is saying that only 1/3 of companies have an idea of what is happening on their network. When it comes to network access, what you don’t know can hurt you - and cost your company money!
  • The percentage of businesses that that have at least some control over employee activity on their network grew from 62 percent in 2016 to 85 percent in 2017.
    This statistic is one of the few significant positive changes that is highlighted in this business IT risk report. SMBs are finally starting to recognize the importance of access control when it comes to IT security. The truth is, many major security breaches are caused by human error (some of it intentional) from employees who access a network or parts of a network outside of their job with malicious intent.

  • 65 percent of respondents admitted to having security incidents in 2016; the most common reasons cited were malware and human errors.
    SMBs are being targeted regularly by cyber criminals. Many of these respondents have failed to take the proper network security measures, despite a security incident. Historically, many SMBs are involved in a full-scale cyber-attack and experience loss before they fully enact and enforce network security.

  • 48 percent of organizations that have to comply with any cyber security standard still struggle to ensure continuous compliance and provide complete evidence of it to auditors.
    Certain industries require SMBs to comply with cyber security standards and regulations, regardless of their size and network security experience. Moving forward, it will be more and more common for the entries requiring compliance to request proof of compliance, including policy implementation and compliance audits. For SMBs who can’t meet these compliances, it is recommended that they contact a third party, like Computerware for guidance.

  • 79 percent of respondents say that detecting and mitigating human errors, both malicious or accidental is critical for reducing IT risks.
    The secret is out. Sometimes, humans make mistakes. Other times, they are just up to no-good. For example, malware may ravage a network as a result of an employee that accidently clicks on an attachment in their email. SMBs have started to acknowledge the element of risk generated on a regular base by humans. Businesses next need to take measures to mitigate the human threat with proper training of best practices, ensuring they take situationally-appropriate network security measures, and regularly update these measures to keep up with threats and risks.

These are just five of the many items that Netwrix Risk Report can tell SMBs about all of the threats that they are facing every day. For those of you who don’t have time to read IT risk reports, a partnership with Computerware will go a long way toward making your network and data safe - against all types of threats, including the human element.

Tip of the Week: The Windows 10 Touch Keyboard Off...
Unified Threat Management Keeps Your Network Safer


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Business Computing Software Backup Managed Service Provider Workplace Tips Productivity Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Smartphones Efficiency Quick Tips Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office VoIP Android Social Media Server Smartphone Mobile Device Management Windows 10 Innovation Miscellaneous Upgrade Unified Threat Management Windows Ransomware Operating System Remote Monitoring Holiday Remote Computing Mobile Computing Communication Passwords BYOD WiFi Vendor Management Collaboration Apps Cybersecurity The Internet of Things Marketing Facebook Users History Apple Firewall Managed IT services Analytics Alert Productivity Data Management communications IT Support Data Backup App Phishing IT Consultant Outsourced IT Internet of Things Data Recovery Automation Managed IT Services Save Money Office Health Big data Content Filtering Spam BDR Bandwidth Gmail Mobile Device Bring Your Own Device Antivirus Printer Search Tech Support Virus Artificial Intelligence Budget Lithium-ion Battery Tech Term Best Practice Information Technology Going Green Hiring/Firing Windows 8 Managed IT Outlook Hard Drives Browser Cybercrime Maintenance Wireless Technology Hacking Cost Management Update Office 365 Phone System Money IBM Recovery Encryption Employer-Employee Relationship Help Desk Computers Travel Administration Intranet Networking Legal Education Risk Management Training SaaS Save Time Hard Drive Law Enforcement Customer Service Two-factor Authentication It Management Document Management Compliance Proactive IT Government Running Cable Data storage Website Cloud Computing Saving Time VPN Humor Windows 10 Twitter Business Growth Password Cortana Project Management Regulations Hacker Avoiding Downtime Paperless Office Telephone Systems iPhone Access Control Business Intelligence Disaster End of Support Digital Payment Current Events Hosted Solution User Robot Downtime Excel Data Security Securty Wireless Comparison Tablet DDoS Blockchain Mobility Solid State Drive Company Culture Social Engineering Data Loss Computer Repair Fax Server Augmented Reality PowerPoint Flexibility Social Networking Black Market Word Data Breach Laptop eWaste Private Cloud Experience Monitors Cleaning Value Digital Office Tips Websites Telephony Streaming Media Taxes Start Menu Tech Terms Inbound Marketing YouTube Processors Vulnerabilities Mobile Technology Distributed Denial of Service Sports Software as a Service Net Neutrality Unified Communications Settings USB Chrome Computing Uninterrupted Power Supply Public Cloud Presentation Pain Points Specifications Safety Bitcoin Co-managed IT Virtual Desktop User Error Router Identity Theft Computer Accessories IT service Social Data Protection Applications Documents Business Technology Google Maps Patch Management Trending Politics Customer Relationship Management Heating/Cooling Virtual Reality Mouse Emails Bluetooth Lifestyle Automobile Storage Scam Gaming Console Chromebook Redundancy Statistics Cryptocurrency Programming Computing Infrastructure Hack Retail Webcam Network Congestion How To Text Messaging Google Docs Download Web Server Legislation External Harddrive IT consulting Knowledge Microserver Cabling IT Plan Public Speaking Consultation Evernote Virtual Assistant Books Workers email scam Addiction Shortcut Technology Tips Wi-Fi Administrator Accountants Troubleshooting Fake News Recycling Supercomputer Management Thin CLient Advertising Flash Entrepreneur Audit Get More Done Analytic Multi-factor Authentication 3D Ebay CIO Microchip Wireless Headphones Smart Phones Windows XP Environment Turn Key Product Reviews Machine Learning Worker Migration Staffing Google Wallet HIPAA Data Warehousing Printer Server Displays Electronic Payment Emergency Hard Drive Disposal Reading Samsung Society Competition Access Trojan Read Equifax Micrsooft Business Owner Microsoft Excel Organize Employer Employee Relationship Healthcare Leadership Computer Care G Suite Device security Adminstration Pirating Information Hacks Physical Security Nanotechnology Licensing Desktop Drones IP Address Google Drive Windows Server 2008 Device Management Startup Human Resources Vulnerability Business Managemenet Relocation Tablets Business Cards Application Spyware Mobile Payment Content Management Banking Botnet File Sharing Unified Threat Management Backup and Disaster Recovery Permissions Language Electricity Printing Sync Windows 7 Webinar online Currency Notifications CCTV Screen Reader Smart Tech switches Writing Reliable Computing Piracy Upselling Music Digital Signature cache Television Business Metrics Computer Malfunction Upgrades Entertainment LinkedIn Fiber-Optic Database Teamwork WannaCry Downloads In Internet of Things HTML Video Surveillance Time Management Freedom of Information Conferencing Saving ZTime LiFi Corporate Profile Mobile Security Multi-Factor Security PDF Skype Scalability Software License Assessment SharePoint Archive Motion Sickness Debate Deep Learning Tip of the week Messenger Tracking Fraud Tactics Harddrive Work/Life Balance Best Available Keyboard Google Calendar Best Practives Devices Domains Touchscreen News Rental Service Meetings Monitoring Visible Light Communication Memory VoIP Point of Contact UTM GPS 3D Printing Capital Productuvuty CrashOverride