Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/27/2007
02:18 AM
50%
50%

Study: SMBs Overconfident in IT Security

According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats

SAN DIEGO -- According to independent research released today by Websense, Inc. (NASDAQ: WBSN), small and medium sized businesses (SMBs) fail to take adequate steps to reduce the risk off data loss from Web-based security threats. The SMB State of Security (SOS) survey of 450 IT managers and employees within the United States shows that while 46 percent of SMB IT managers say they have software to protect company confidential data, 81 percent do not use software to block the use of peer-to-peer applications, block USB devices (80 percent), control the use of instant messaging (76 percent), or stop spyware from sending out information to external sources (47 percent) – all growing vectors of confidential data loss.

Despite the risk of data loss, 20 percent of SMBs do not use Internet security software other than firewall and anti-virus products, as they mistakenly feel these are sufficient. Additionally, 12 percent of IT managers admit, while they have an Internet usage policy, they have no way of enforcing it.

The study also found that business-owned computers are left vulnerable to security threats for more than 21 days, on average, despite the daily updates promoted and offered by operating system and anti-virus vendors. In fact, only 4 percent of SMB employees have daily security updates on their work PC, while 11 percent of employees say the security software on their work PC has never been updated.

On the bright side, 94 percent of SMBs claim to have an Internet use policy in place, and 67 percent say that all companies should have equal levels of protection from Internet security threats, irrespective of their size.

2007 SMB State of Security Key Findings:

  • PREVENTING DATA LOSS: While 46 percent of IT managers say they have software to protect company confidential data, 81 percent of SMBs do not use software to block the use of peer-to-peer applications, block USB devices (80 percent), control the use of instant messaging (76 percent), or stop spyware from sending out information to external sources (47 percent).

  • RISKY BEHAVIOR: IT security managers say the top risks to their business include employees clicking on email links from unknown sources (74 percent), employees sending company email to the wrong address (53 percent), and employees accidentally or deliberately accessing adult Web sites (50 percent). Alarmingly, 73 percent of SMB employees admit to at least one of these high-risk activities with their work-owned computer, 54 percent admit more than one, while 27 percent admit three or more.

  • FALSE SENSE OF SECURITY: 99 percent of SMB IT managers feel their company is protected to some degree from exposure to Internet security threats. But only 22 percent say they feel 100 percent protected – meaning 78 percent do not. Additionally, 20 percent of SMBs do not use Internet security software other than firewall and anti-virus products, as they mistakenly feel these are sufficient.

  • WINDOW OF EXPOSURE: The average length of time that employees have continued to use their work PCs before security is updated is 21.2 days. Only 4 percent of employees have daily security updates on their work PC, while 11 percent have never updated security on their work PC. On a daily basis, Websense discovers Web sites that contain malicious code – numbering in the hundreds of thousands -- that threaten vulnerable computers.

  • PROTECTION OVERCONFIDENCE: Confidence levels in IT security are high among SMB employees, with 41 percent confident that their IT department protects them from every Internet security threat. However, 45 percent say they have some level of protection but admit they are not sure what is protected. Another 12 percent of employees say they do not know if their work PC is protected.

“The Web continues to grow as the attack vector of choice for hackers, and SMBs need to realize that anti-virus and firewalls alone aren’t built for emerging Web-based threats,” said Steve Kelley, senior director of Product Management, Websense Inc. “For example, in February, Websense discovered an information-stealing keylogger on the Dolphin Stadium Web site just days before the Super Bowl was played there. Anti-virus vendors didn’t update their products until after the Super Bowl. To prevent data loss and protect against Web-based threats, SMBs need to reassess their security posture and take steps to stay ahead of hackers.”

Websense Inc. (Nasdaq: WBSN)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20733
PUBLISHED: 2021-06-22
Improper authorization in handler for custom URL scheme vulnerability in ????????? (asken diet) for Android versions from v.3.0.0 to v.4.2.x allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
CVE-2021-20734
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in Welcart e-Commerce versions prior to 2.2.4 allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
CVE-2021-20735
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in ETUNA EC-CUBE plugins (Delivery slip number plugin (3.0 series) 1.0.10 and earlier, Delivery slip number csv bulk registration plugin (3.0 series) 1.0.8 and earlier, and Delivery slip number mail plugin (3.0 series) 1.0.8 and earlier) allows remote attackers to ...
CVE-2021-20736
PUBLISHED: 2021-06-22
NoSQL injection vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to obtain and/or alter the information stored in the database via unspecified vectors.
CVE-2021-20737
PUBLISHED: 2021-06-22
Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors.