Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Good, the Bad and the Risky: Current State of IT Security for SMBs


Technology has revolutionized business. However, along with all the advantages and benefits technology affords us, it comes with a few risks and vulnerabilities that some businesses are still struggling to come to terms with. For example, storing records electronically makes them easier to organize and locate when they’re needed. It also makes them vulnerable to hacker and cyber-attacks. Still, most SMBs are working toward mitigating risks as opposed to abandoning the use of technology in their business operations - and a current assessment of the situation does show improvement over past years.

The following seven statistics examine the current state of IT security for SMBs, as well as why these numbers should be of importance to you and your business.

  • Only 36 percent of organizations report being fully aware of employee activity on their network.
    From terminated employees with continued access to your network to current employees spending the day on social media instead of working and even to Internet of Things devices connecting without knowledge or permission of a company, there are all types of unauthorized access that a business network has to be aware of. This study is saying that only 1/3 of companies have an idea of what is happening on their network. When it comes to network access, what you don’t know can hurt you - and cost your company money!
  • The percentage of businesses that that have at least some control over employee activity on their network grew from 62 percent in 2016 to 85 percent in 2017.
    This statistic is one of the few significant positive changes that is highlighted in this business IT risk report. SMBs are finally starting to recognize the importance of access control when it comes to IT security. The truth is, many major security breaches are caused by human error (some of it intentional) from employees who access a network or parts of a network outside of their job with malicious intent.

  • 65 percent of respondents admitted to having security incidents in 2016; the most common reasons cited were malware and human errors.
    SMBs are being targeted regularly by cyber criminals. Many of these respondents have failed to take the proper network security measures, despite a security incident. Historically, many SMBs are involved in a full-scale cyber-attack and experience loss before they fully enact and enforce network security.

  • 48 percent of organizations that have to comply with any cyber security standard still struggle to ensure continuous compliance and provide complete evidence of it to auditors.
    Certain industries require SMBs to comply with cyber security standards and regulations, regardless of their size and network security experience. Moving forward, it will be more and more common for the entries requiring compliance to request proof of compliance, including policy implementation and compliance audits. For SMBs who can’t meet these compliances, it is recommended that they contact a third party, like Computerware for guidance.

  • 79 percent of respondents say that detecting and mitigating human errors, both malicious or accidental is critical for reducing IT risks.
    The secret is out. Sometimes, humans make mistakes. Other times, they are just up to no-good. For example, malware may ravage a network as a result of an employee that accidently clicks on an attachment in their email. SMBs have started to acknowledge the element of risk generated on a regular base by humans. Businesses next need to take measures to mitigate the human threat with proper training of best practices, ensuring they take situationally-appropriate network security measures, and regularly update these measures to keep up with threats and risks.

These are just five of the many items that Netwrix Risk Report can tell SMBs about all of the threats that they are facing every day. For those of you who don’t have time to read IT risk reports, a partnership with Computerware will go a long way toward making your network and data safe - against all types of threats, including the human element.

Tip of the Week: The Windows 10 Touch Keyboard Off...
Unified Threat Management Keeps Your Network Safer


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Managed Service Provider Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Mobile Devices Business Continuity Disaster Recovery Computer Mobile Office Network Virtualization Microsoft Office Server VoIP Social Media Upgrade Windows 10 Mobile Device Management Miscellaneous Unified Threat Management Android Windows Ransomware Smartphone Holiday Operating System Remote Computing Passwords Innovation WiFi Vendor Management Mobile Computing BYOD Communication Remote Monitoring Collaboration Marketing Apps Facebook The Internet of Things Analytics Users History Firewall Managed IT services Apple IT Support Alert Data Management Phishing Save Money Outsourced IT Cybersecurity Managed IT Services IT Consultant Automation Bring Your Own Device Gmail Health Office Big data App Content Filtering Productivity Hiring/Firing Tech Support Wireless Technology Search Browser Outlook Lithium-ion Battery communications Budget Managed IT Hard Drives Virus Artificial Intelligence Best Practice Windows 8 BDR Spam Going Green Mobile Device Printer Encryption Recovery Employer-Employee Relationship Update Cost Management Data Backup Maintenance Help Desk Antivirus Phone System Information Technology Internet of Things IBM Money Bandwidth Office 365 Document Management Humor Running Cable Saving Time Government Networking Risk Management Law Enforcement Administration Data storage Proactive IT Customer Service It Management Hard Drive Computers Travel Education Legal SaaS Save Time User Data Recovery Computer Repair Black Market Avoiding Downtime DDoS Business Growth Intranet Current Events Word Telephone Systems Training Excel Password Project Management Cortana Disaster End of Support Hacker Digital Payment Securty Tablet Comparison Solid State Drive PowerPoint Flexibility Two-factor Authentication Social Networking Wireless VPN Mobility Website Twitter Windows 10 iPhone Hacking Business Intelligence Hosted Solution Fax Server Robot Access Control Uninterrupted Power Supply Social Engineering Compliance Trending Specifications Safety Social Data Security Computing Infrastructure Statistics Patch Management Network Congestion Google Maps Telephony Monitors Cloud Computing Pain Points Cybercrime Streaming Media Inbound Marketing Hack User Error YouTube Settings Unified Communications Chrome Downtime Gaming Console Processors Router Computer Accessories USB Distributed Denial of Service Politics Webcam Presentation Customer Relationship Management Augmented Reality Company Culture Public Cloud Virtual Desktop Mouse Documents Text Messaging Programming Cryptocurrency Google Docs Laptop Heating/Cooling Scam Automobile Office Tips Retail eWaste How To Paperless Office Co-managed IT Experience Net Neutrality Sports Digital Bitcoin Computing Start Menu Lifestyle Taxes IT service Software as a Service Music Video Surveillance G Suite Virtual Reality Physical Security SharePoint External Harddrive Upgrades LinkedIn Application Spyware Saving ZTime Tablets Tip of the week Bluetooth LiFi Archive Debate Data Protection Sync CCTV Rental Service Evernote Smart Phones Deep Learning Get More Done Digital Signature cache Entertainment Virtual Assistant Memory Printer Server Visible Light Communication Point of Contact Data Loss Corporate Profile In Internet of Things Wi-Fi Emails Data Warehousing Assessment Thin CLient Redundancy Analytic Hard Drive Disposal Scalability Flash Advertising Google Wallet Data Breach VoIP Meetings Windows Server 2008 Displays Public Speaking Consultation Leadership Cabling Unified Threat Management Private Cloud Upselling Webinar Drones Entrepreneur Audit Device Management Administrator Banking Business Managemenet Supercomputer File Sharing Windows 7 HIPAA Electronic Payment Emergency Worker Fiber-Optic Machine Learning Language Permissions online Currency Computer Care Business Metrics Employer Employee Relationship Freedom of Information Writing Best Practives switches IP Address Google Drive Vulnerability Licensing Fraud Human Resources Microserver Printing Electricity Botnet Chromebook Skype Messenger News Business Technology GPS email scam Work/Life Balance Turn Key Downloads Teamwork WannaCry Computer Malfunction Download Books Fake News Trojan IT consulting Storage Time Management PDF Ebay 3D Vulnerabilities Organize Cleaning Mobile Technology CIO Keyboard Google Calendar Recycling Best Available Motion Sickness Microchip Product Reviews Tracking Reading Microsoft Excel Regulations Windows XP Domains Touchscreen Knowledge Pirating Information Read Adminstration Business Cards Society Mobile Payment Micrsooft Shortcut Technology Tips Value Web Server Hacks Workers Relocation Troubleshooting Websites Content Management Environment Tech Terms Identity Theft Staffing Notifications Television Competition Access Samsung Reliable Computing Blockchain Harddrive Business Owner Software License Capital Productuvuty 3D Printing CrashOverride Piracy

hp supplies medallionLarge2017