Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Good, the Bad and the Risky: Current State of IT Security for SMBs

netwrix_statistics_400

Technology has revolutionized business. However, along with all the advantages and benefits technology affords us, it comes with a few risks and vulnerabilities that some businesses are still struggling to come to terms with. For example, storing records electronically makes them easier to organize and locate when they’re needed. It also makes them vulnerable to hacker and cyber-attacks. Still, most SMBs are working toward mitigating risks as opposed to abandoning the use of technology in their business operations - and a current assessment of the situation does show improvement over past years.

The following seven statistics examine the current state of IT security for SMBs, as well as why these numbers should be of importance to you and your business.

  • Only 36 percent of organizations report being fully aware of employee activity on their network.
    From terminated employees with continued access to your network to current employees spending the day on social media instead of working and even to Internet of Things devices connecting without knowledge or permission of a company, there are all types of unauthorized access that a business network has to be aware of. This study is saying that only 1/3 of companies have an idea of what is happening on their network. When it comes to network access, what you don’t know can hurt you - and cost your company money!
  • The percentage of businesses that that have at least some control over employee activity on their network grew from 62 percent in 2016 to 85 percent in 2017.
    This statistic is one of the few significant positive changes that is highlighted in this business IT risk report. SMBs are finally starting to recognize the importance of access control when it comes to IT security. The truth is, many major security breaches are caused by human error (some of it intentional) from employees who access a network or parts of a network outside of their job with malicious intent.

  • 65 percent of respondents admitted to having security incidents in 2016; the most common reasons cited were malware and human errors.
    SMBs are being targeted regularly by cyber criminals. Many of these respondents have failed to take the proper network security measures, despite a security incident. Historically, many SMBs are involved in a full-scale cyber-attack and experience loss before they fully enact and enforce network security.

  • 48 percent of organizations that have to comply with any cyber security standard still struggle to ensure continuous compliance and provide complete evidence of it to auditors.
    Certain industries require SMBs to comply with cyber security standards and regulations, regardless of their size and network security experience. Moving forward, it will be more and more common for the entries requiring compliance to request proof of compliance, including policy implementation and compliance audits. For SMBs who can’t meet these compliances, it is recommended that they contact a third party, like Computerware for guidance.

  • 79 percent of respondents say that detecting and mitigating human errors, both malicious or accidental is critical for reducing IT risks.
    The secret is out. Sometimes, humans make mistakes. Other times, they are just up to no-good. For example, malware may ravage a network as a result of an employee that accidently clicks on an attachment in their email. SMBs have started to acknowledge the element of risk generated on a regular base by humans. Businesses next need to take measures to mitigate the human threat with proper training of best practices, ensuring they take situationally-appropriate network security measures, and regularly update these measures to keep up with threats and risks.

These are just five of the many items that Netwrix Risk Report can tell SMBs about all of the threats that they are facing every day. For those of you who don’t have time to read IT risk reports, a partnership with Computerware will go a long way toward making your network and data safe - against all types of threats, including the human element.

Tip of the Week: The Windows 10 Touch Keyboard Off...
Unified Threat Management Keeps Your Network Safer
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Managed Service Provider Workplace Tips Hackers Productivity Backup Business Computing Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Business Continuity Mobile Devices Computer User Tips Mobile Office Disaster Recovery Virtualization Network Network Security Server Microsoft Office VoIP Social Media Windows 10 Miscellaneous Upgrade Unified Threat Management Mobile Device Management Windows Ransomware Smartphone Android Passwords Operating System Remote Computing Innovation Remote Monitoring WiFi Vendor Management BYOD Communication The Internet of Things Marketing Holiday Mobile Computing Apps Firewall History Collaboration Managed IT services Facebook Users Data Management Analytics Apple IT Support Outsourced IT Save Money IT Consultant Alert Content Filtering Health Bring Your Own Device Phishing Automation Office Managed IT Services Big data Productivity Best Practice Going Green BDR Spam Outlook Wireless Technology Hiring/Firing Search Virus Browser App Lithium-ion Battery Managed IT Hard Drives Windows 8 communications Budget Artificial Intelligence Tech Support Internet of Things Information Technology IBM Encryption Data Backup Maintenance Gmail Update Cybersecurity Recovery Employer-Employee Relationship Phone System Help Desk Antivirus Printer SaaS Travel Education Bandwidth Document Management Mobile Device Save Time Money Saving Time Running Cable Administration It Management Government Law Enforcement Data storage Proactive IT Computers Legal Humor Customer Service Website iPhone Avoiding Downtime Hosted Solution Business Intelligence Current Events Hacking Black Market Computer Repair Office 365 User Networking Intranet Telephone Systems Training DDoS Hard Drive Disaster Mobility Digital Payment Securty Word Risk Management Solid State Drive Password Windows 10 Cost Management Flexibility Hacker PowerPoint Social Networking Tablet Fax Server VPN Twitter Two-factor Authentication Wireless Data Recovery Computing Patch Management Net Neutrality Google Maps Robot Retail IT service Pain Points Experience Cloud Computing Hack Compliance Excel User Error Project Management Trending Statistics Gaming Console Business Growth Telephony Monitors Webcam Safety Public Cloud Social Streaming Media YouTube Inbound Marketing Unified Communications Network Congestion Settings End of Support Cybercrime Chrome Automobile Scam Router Politics Cortana Computer Accessories Comparison How To Customer Relationship Management Co-managed IT Augmented Reality Processors Downtime Start Menu USB Google Docs Laptop Lifestyle Presentation Taxes Text Messaging Software as a Service Company Culture Uninterrupted Power Supply Office Tips Access Control Virtual Desktop Paperless Office Documents Programming Sports Heating/Cooling Get More Done cache Storage CCTV Relocation Pirating Information Adminstration Smart Phones Identity Theft Printer Server PDF Corporate Profile Best Available In Internet of Things Notifications Data Loss Keyboard Domains Assessment Content Management Emails Reliable Computing Product Reviews Scalability Virtual Reality Music Redundancy eWaste Read VoIP Value Social Engineering Upgrades Data Breach Shortcut LiFi Consultation Troubleshooting Meetings Video Surveillance Bluetooth Private Cloud Computing Infrastructure Saving ZTime Upselling Staffing Webinar Environment LinkedIn Cabling Administrator Rental Service Deep Learning Audit Competition Visible Light Communication Business Owner Archive Supercomputer Debate Memory Machine Learning Wi-Fi Emergency Worker Application Point of Contact Distributed Denial of Service Computer Care Advertising Best Practives Google Drive Specifications Employer Employee Relationship Flash Thin CLient Google Wallet Licensing Electricity Digital Signature Botnet Displays Microserver Mobile Technology Printing Entertainment Banking Leadership Drones Business Technology WannaCry Computer Malfunction File Sharing Turn Key Mobile Payment Downloads Permissions Trojan Time Management Analytic Device Management Language Business Metrics Organize Google Calendar Public Speaking Motion Sickness Writing switches Touchscreen online Currency Tracking Chromebook Knowledge Entrepreneur Technology Tips Digital HIPAA Web Server Messenger Business Managemenet Work/Life Balance Cryptocurrency Websites Electronic Payment Workers Mouse Download Tech Terms IT consulting IP Address Access Books GPS Harddrive Cleaning Human Resources Samsung G Suite Microchip CIO Windows XP Spyware Physical Security Reading Skype Ebay Regulations 3D External Harddrive Society Tablets Recycling Data Protection Teamwork Sync Hacks Micrsooft Data Security Capital Productuvuty Vulnerability CrashOverride Television 3D Printing

hp supplies medallionLarge2017