Vulnerabilities / Threats
11:28 AM
Connect Directly

Viruses Lead SMB Security Concerns

Malware tops employee-generated data breaches among security concerns of small and midsize business, finds Trend Micro survey.

Strategic Security Survey: Global Threat, Local Pain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)

When it comes to information security concerns, small businesses still fear the virus. Indeed, according to a new survey of 1,600 end users in Germany, Japan, the United Kingdom, and United States, conducted by antivirus vendor Trend Micro, viruses are the leading concern for 63% of small businesses.

Small business respondents' other top concerns were Trojan applications (60%), malware designed by criminals expressly to steal data (59%), data leaks (56%), spyware (55%), and fake AV (52%). Spam and phishing threats ranked lowest.

Most of today's antivirus software suites protect against many viruses and worms. But when it comes to data-stealing malware, 21% of small U.S. business respondents said that their IT department could do a better job of protecting end users. Notably, only 47% of small businesses install security software to help stop such malware, 30% offer related security policies, and 28% provide relevant education or guidance.

Another interesting finding is that, compared with midsize or large organizations, the typical small business in the United States tends to be less worried about data loss. While 74% of respondents at large U.S. enterprises ranked data loss as a top threat, only 49% of small U.S. businesses said the same. Also 22% of respondents at large organizations in the United States think their employees have actually leaked data, versus 10% at small organizations.

In general, of course, small businesses have fewer security controls or policies in place, owing to a paucity of investment in information security technology, awareness, or talent. That may explain small businesses' approach to data-leak prevention. While small businesses are worried about data leaks -- more than spyware -- only 44% of them have data-leak security policies in place, compared with 61% of large enterprises.

Interestingly, however, the odds of actually being trained on a data-leak policy -- if it exists -- were about the same, with 70% of respondents at large organizations, compared with 61% at small ones, saying they received such training.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-08-29 in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.