Risk
10/27/2009
02:03 PM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

SMB Security Survey Shows Sorry State Of Cyber Safety

A new survey of small business cybersecurity offers a bleak picture of the state of things. Bleak unless you're a cybercrook, of course.

A new survey of small business cybersecurity offers a bleak picture of the state of things. Bleak unless you're a cybercrook, of course.The National Cyber Security Alliance (NCSA)/Symantec survey of close to 1,500 small businesses (51 or fewer employees) shows that when it comes to cybersecurity, most small businesses are neither fully aware of the problems nor prepared to meet them.

The two are not necessarily mutually exclusive. A small business that, for example, turns over security to a reliable and competent third-party, may not have deep awareness of the threat environment and its dangerous nuances, but is investing in protecting itself from those threats.

Evidently most of the businesses participating in the survey are doing neither.

To wit:

Only 28% of have formal Internet security policies in place

Only 25% provide even minimal Internet use/Internet security training to employees

Those companies that do train, do so less than 5 hours per year on average

The typical small business is flying blind when it comes to tech security:

86% of the survey respondents do not have an employee focused on Internet security

Which goes a long way to explaining the lack of awareness and policies.

It's unrealistic, I believe, to expect most small business to have a fulltime information security officer -- not in the budget.

But not in the budget shouldn't be matched by "not on the radar" when it comes to cybersecurity. Not in a world where the threats multiply hourly, the amount of customer and other data even the smallest businesses have grow almost as fast, and the variety of security choices and options at every budget level and business size are more robust than ever.

Of course, the businesses may not be any more aware of those options than they are of the threats they need to protect themselves from.

Lack of awareness is a fine breeding ground for overconfidence:

More than 90% of the businesses believe they are protected from malware and viruses

That belief is strong, too:

Barely half the businesses check anti-virus weekly to insure they're up to date

11% never check security tools to make sure they're current

Is it any wonder that crooks increasingly see small businesses as rich grounds for plucking data and dough?

The survey was conducted as part of National Cyber Security Awareness Month -- an initiative that clearly needs to run 24/7/365.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.