Risk
10/27/2009
02:03 PM
Keith Ferrell
Keith Ferrell
Commentary
Connect Directly
RSS
E-Mail
50%
50%

SMB Security Survey Shows Sorry State Of Cyber Safety

A new survey of small business cybersecurity offers a bleak picture of the state of things. Bleak unless you're a cybercrook, of course.

A new survey of small business cybersecurity offers a bleak picture of the state of things. Bleak unless you're a cybercrook, of course.The National Cyber Security Alliance (NCSA)/Symantec survey of close to 1,500 small businesses (51 or fewer employees) shows that when it comes to cybersecurity, most small businesses are neither fully aware of the problems nor prepared to meet them.

The two are not necessarily mutually exclusive. A small business that, for example, turns over security to a reliable and competent third-party, may not have deep awareness of the threat environment and its dangerous nuances, but is investing in protecting itself from those threats.

Evidently most of the businesses participating in the survey are doing neither.

To wit:

Only 28% of have formal Internet security policies in place

Only 25% provide even minimal Internet use/Internet security training to employees

Those companies that do train, do so less than 5 hours per year on average

The typical small business is flying blind when it comes to tech security:

86% of the survey respondents do not have an employee focused on Internet security

Which goes a long way to explaining the lack of awareness and policies.

It's unrealistic, I believe, to expect most small business to have a fulltime information security officer -- not in the budget.

But not in the budget shouldn't be matched by "not on the radar" when it comes to cybersecurity. Not in a world where the threats multiply hourly, the amount of customer and other data even the smallest businesses have grow almost as fast, and the variety of security choices and options at every budget level and business size are more robust than ever.

Of course, the businesses may not be any more aware of those options than they are of the threats they need to protect themselves from.

Lack of awareness is a fine breeding ground for overconfidence:

More than 90% of the businesses believe they are protected from malware and viruses

That belief is strong, too:

Barely half the businesses check anti-virus weekly to insure they're up to date

11% never check security tools to make sure they're current

Is it any wonder that crooks increasingly see small businesses as rich grounds for plucking data and dough?

The survey was conducted as part of National Cyber Security Awareness Month -- an initiative that clearly needs to run 24/7/365.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.