Cisco to SMBs: 'Make sure your insurance covers cyberattacks'

Many SMBs are realizing they are exposed to similar threats as their enterprise peers. Often times, those realizations come after an attack. This year, we learned from the Cisco 2018 Security Capabilities Benchmark Study: More than half (54 percent) of all cyber-attacks result in financial damages of more than US$500,000 including, but not limited to, lost revenue, customers, opportunities, and out-of-pocket costs. That amount is enough to put an unprepared small/midmarket business out of operation—permanently— a small businesses nightmare come true.
With this in mind—it’s critical that SMB and midmarket organizations take steps now, if they haven’t already, to safeguard themselves and their customers and partners from cyber-attacks.
More than half of midmarket companies have experienced a breach
Cisco unveiled its SMB Cybersecurity Report, which leverages data from 1,816 SMB respondents across 26 countries. The study provides an understanding of the risks smaller organizations face and how SMBs stack up against their peers with respect to security. The report also shares some guidance for these organizations to bear in mind in 2018 and beyond.
According to the report, 53 percent of the respondents experienced a breach. These data breaches often times have lasting financial impact on a company, including lost revenue, customers, and opportunities, as well as the expenses to clean up after the breach.
Other notable highlights from the report:
- 30 percent of midmarket companies said breaches cost them less than $100,000, while 20 percent said it cost $1,000,000 to $2,499,999.
- SMBs and midmarket organizations face fewer than 5000 security alerts a day.
- Midmarket companies investigate 55.6 percent of security alerts.
- Targeted attacks against employees such as phishing (79%), advanced persistent threats (77%), ransomware (77%), DDoS attacks (75%), and proliferation of BYOD (74%) are the top five security concerns for SMBs.
Maximizing Security Effectiveness
Companies are evaluating and investing in staffing and technologies to address the threats that keep them awake at night. If staffing resources were more available, midmarket companies would be more likely to invest in:
- upgrading their endpoint security to more sophisticated advanced malware protection/EDR – the most common response at 19 percent.
- better web application security against web attacks at 18 percent.
- deploying intrusion prevention, still seen as a vital technology to stop network attacks and exploit attempts at 17 percent.
Solutions using machine learning and automation are relied on slightly less heavily by midmarket businesses when compared to organizations with more than 1000 employees. SMB companies are looking for vendors to integrate machine learning and AI technologies into the detection layers of existing solutions vs. standing up stand-alone projects. Cisco is leading the way with machine learning algorithms at the core of its Encrypted Traffic Analytics technology.
SMBs are also considering the solutions needed to secure today’s work environment, including the continued influx of mobile devices on company networks and adoption of cloud services. Cloud services adoption has increased in recent years, from 55 percent of midmarket businesses hosting some of their networks on the cloud in 2014 to 70 percent in 2017, as companies seek to scale their resources and consider leveraging external security resources like Managed Security Service Providers.
Because SMBs and midmarket companies are not immune to the challenges created by the shortage of cybersecurity talent, they are finding ways to maximize their limited resources. More than half of these organizations rely on outsourced partners for advice and consulting services, incident response, and security monitoring.
So, What More Can SMBs Do?
Unfortunately, we’re nowhere near finding a magic bullet for cyber-attacks. However, organizations can take steps to transform their entire company into a “security aware” business. Arm your employees with the foundational knowledge required to help them avoid falling victim to campaigns directly targeting them. National Cyber Security Awareness Month in the U.S. and European Cyber Security Awareness Month begin next week and present a perfect opportunity to educate employees on the most prevalent attack vectors in your industry and what they can do to avoid them.
Beyond that, review your insurance policies to ensure they cover loss of business stemming from a cyber-attack, and ensure your crisis communication plans enable faster recovery and help prevent reputational damage.
Companies don’t have to recreate the wheel to establish an effective security program; they simply need to look around them, learn from others in the industry, and apply measures that will bring value in their own community.
A final recommendation for SMB’s to drive improvements in security is to recognize that incremental change is better than no change. In summary, they should not let a desire to find the perfect silver bullet get in the way of becoming incrementally better. Remember to keep security above everything.
Source cisco
Industry: Cyber Security News

Latest Jobs
-
- Lead Cyber Security Incident Response Consultant.
- United Kingdom
- N/A
-
Seeking skilled and passionate UK-based individual for a Lead Cyber Security Incident Response Consultant opportunity 3 core skillsets for the role Hands on technical incident response (triage and planning). Business consultancy (engaging with clients). Commercial awareness. Being able to engage in business growth conversations. Consultancy experience is an essential as it the ability to visit clients and the office. Additional experience will include, but not be limited to: Developing incident response strategies, guides and procedures for effective incident handling Proactive and reactive defense plans based on cyber threat actors' techniques Offering guidance, supervision, and fostering opportunities for team development Significant career development opportunities for the right individuals.
-
- OUTSIDE IR35 Contract- Functional tester- SC clearance Microsoft Windows Server
- London
- Outside IR35 contract
-
Front End Functional tester with SC clearance needed for an Outside IR35 project. Current valid SC clearance is required Experience with functional testing with exchange, sharepoint, SQL and other applications relating across a windows server Migration to 2019. Must be able to get to Central London 3 days a week. Jira, Wiki documentation and automation experience highly desirable.
-
- ForgeRock Consultant- UK
- United Kingdom
- Upto £100,000 plus benefits
-
ForgeRock Consultant/ Architect is require for niche consultancy who are looking to expand their presence within the UK/European Market Looking for a lead IAM architect, ideally with ForgeRock experience but would consider other vendors, But looking for someone who is able to advice and consultant with Clients but have the implementation background so they can get involved in projects as and when needed. Key duties will be: Provider IAM consultancy to clients, with a focus on ForgeRock Product stack ·Responsible for the design and implementation of ForgeRock solutions ·Install and configure ForgeRock stack to meet customer authentication and authorization requirements, ·Design and implement OAuth2 protocol using ForgeRock OpenAM, ·Design and develop OpenAM custom authentication modules, ·Configure ForgeRock stack to protect RESTful API, ·Troubleshoot and support ForgeRock IAM stack. This is a great role to join a niche play as they look to kick of their European expansion
-
- ForgeRock Consultant- Netherlands
- Netherlands
- N/A
-
ForgeRock Consultant required for 6 Month Contract This will be a mix of on site and home based, so need people to be based in the Netherlands We are looking for a lead ForgeRock Technical Consultant/ Architect with strong experience of ForgeRock to lead a new deployment project. ·Responsible for the design and implementation of ForgeRock stack ·Install and configure ForgeRock stack to meet customer authentication and authorization requirements, ·Design and implement OAuth2 protocol using ForgeRock OpenAM, ·Design and develop OpenAM custom authentication modules, ·Configure ForgeRock stack to protect RESTful API, ·Troubleshoot and support ForgeRock IAM stack. ·Designed and developed Restful APIs, This is a great project with an expanding leading IAM player within Europe, We are looking for someone with the above experience, who is comfortable hitting the ground running and taking on the reins at the start of a project