Vulnerabilities / Threats
11/4/2010
11:28 AM
Connect Directly
RSS
E-Mail
50%
50%

Viruses Lead SMB Security Concerns

Malware tops employee-generated data breaches among security concerns of small and midsize business, finds Trend Micro survey.

Strategic Security Survey: Global Threat, Local Pain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)

When it comes to information security concerns, small businesses still fear the virus. Indeed, according to a new survey of 1,600 end users in Germany, Japan, the United Kingdom, and United States, conducted by antivirus vendor Trend Micro, viruses are the leading concern for 63% of small businesses.

Small business respondents' other top concerns were Trojan applications (60%), malware designed by criminals expressly to steal data (59%), data leaks (56%), spyware (55%), and fake AV (52%). Spam and phishing threats ranked lowest.

Most of today's antivirus software suites protect against many viruses and worms. But when it comes to data-stealing malware, 21% of small U.S. business respondents said that their IT department could do a better job of protecting end users. Notably, only 47% of small businesses install security software to help stop such malware, 30% offer related security policies, and 28% provide relevant education or guidance.

Another interesting finding is that, compared with midsize or large organizations, the typical small business in the United States tends to be less worried about data loss. While 74% of respondents at large U.S. enterprises ranked data loss as a top threat, only 49% of small U.S. businesses said the same. Also 22% of respondents at large organizations in the United States think their employees have actually leaked data, versus 10% at small organizations.

In general, of course, small businesses have fewer security controls or policies in place, owing to a paucity of investment in information security technology, awareness, or talent. That may explain small businesses' approach to data-leak prevention. While small businesses are worried about data leaks -- more than spyware -- only 44% of them have data-leak security policies in place, compared with 61% of large enterprises.

Interestingly, however, the odds of actually being trained on a data-leak policy -- if it exists -- were about the same, with 70% of respondents at large organizations, compared with 61% at small ones, saying they received such training.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant