Risk
10/27/2009
02:03 PM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

SMB Security Survey Shows Sorry State Of Cyber Safety

A new survey of small business cybersecurity offers a bleak picture of the state of things. Bleak unless you're a cybercrook, of course.

A new survey of small business cybersecurity offers a bleak picture of the state of things. Bleak unless you're a cybercrook, of course.The National Cyber Security Alliance (NCSA)/Symantec survey of close to 1,500 small businesses (51 or fewer employees) shows that when it comes to cybersecurity, most small businesses are neither fully aware of the problems nor prepared to meet them.

The two are not necessarily mutually exclusive. A small business that, for example, turns over security to a reliable and competent third-party, may not have deep awareness of the threat environment and its dangerous nuances, but is investing in protecting itself from those threats.

Evidently most of the businesses participating in the survey are doing neither.

To wit:

Only 28% of have formal Internet security policies in place

Only 25% provide even minimal Internet use/Internet security training to employees

Those companies that do train, do so less than 5 hours per year on average

The typical small business is flying blind when it comes to tech security:

86% of the survey respondents do not have an employee focused on Internet security

Which goes a long way to explaining the lack of awareness and policies.

It's unrealistic, I believe, to expect most small business to have a fulltime information security officer -- not in the budget.

But not in the budget shouldn't be matched by "not on the radar" when it comes to cybersecurity. Not in a world where the threats multiply hourly, the amount of customer and other data even the smallest businesses have grow almost as fast, and the variety of security choices and options at every budget level and business size are more robust than ever.

Of course, the businesses may not be any more aware of those options than they are of the threats they need to protect themselves from.

Lack of awareness is a fine breeding ground for overconfidence:

More than 90% of the businesses believe they are protected from malware and viruses

That belief is strong, too:

Barely half the businesses check anti-virus weekly to insure they're up to date

11% never check security tools to make sure they're current

Is it any wonder that crooks increasingly see small businesses as rich grounds for plucking data and dough?

The survey was conducted as part of National Cyber Security Awareness Month -- an initiative that clearly needs to run 24/7/365.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

CVE-2014-7880
Published: 2014-12-17
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote attackers to cause a denial of service via unspecified vectors.

CVE-2014-8133
Published: 2014-12-17
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.