Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Small Businesses Feel Security's Burn

Nearly one third of SMBs have experienced system compromise in the past year, study says

Small businesses aren't naive about IT security anymore. In fact, many of them have already been burned -- and many others are no longer sure their systems are safe.

These are some of the conclusions released in a survey published Friday by market research firm eMediaUSA, which conducted the survey of small and medium-sized businesses on behalf of security vendor GFI Software.

In a study of some 455 companies ranging from one to 500 seats, eMedia found that 32 percent of small and medium-sized businesses (SMBs) have experienced some sort of security breach in the past year, and these breaches are changing the sector's viewpoint on security tools and products.

Approximately 42 percent of the respondents said they do not believe their networks are secure, even though 96 percent of them have deployed antivirus software, 93 percent have deployed firewalls, and 80 percent have deployed spam filters.

"This may indicate that [SMBs] are starting to doubt the effectiveness of traditional perimeter security products in protecting them from other security threats, including data leakage and network breaches," the report says.

The results indicate a shift in SMBs' comfort level with IT security. Several studies conducted earlier in the year indicated that small enterprises had developed a positive -- and perhaps false -- sense of security in their IT systems. (See Study: SMBs Overconfident in IT Security and Small Business: Hackers' Low-Hanging Fruit.)

If the eMediaUSA study is any indication, SMBs' attitudes may have shifted due to their own breach experiences. Nearly 70 percent of respondents said their systems have been infected by a virus in the past year, and 30 percent said they have downloaded infected Internet files. Twenty-four percent have lost hardware, such as laptops, containing company information.

And SMBs are responding to the threat, the study says. Thirty-eight percent of the survey respondents say they are spending between 11 percent and 30 percent of their IT budgets on security, and most of the businesses are planning to maintain their spending patterns in the coming year.

Network monitoring tools top the shopping lists of many SMBs, cited by 31 percent of respondents for purchase in the next six months. Email management tools are in the plans for 29 percent of SMBs, while network scanning and antivirus tools were both cited by 26 percent. So far, only 19 percent of SMBs have deployed an endpoint security product.

Forty-eight percent of SMBs said they believe their security posture would improve through better training, both of employees and senior management.

"Computer users can be considered as the least predictable and controlled security vulnerability," said Andre Muscat, director of engineering at GFI Software. "In the majority of cases, a lack of education and an understanding of basic security principles and procedures are the main causes of security breaches, rather than malicious activity -- although the latter can never be ignored."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • GFI Software Ltd.

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Edge-DRsplash-10-edge-articles
    7 Old IT Things Every New InfoSec Pro Should Know
    Joan Goodchild, Staff Editor,  4/20/2021
    News
    Cloud-Native Businesses Struggle With Security
    Robert Lemos, Contributing Writer,  5/6/2021
    Commentary
    Defending Against Web Scraping Attacks
    Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-32089
    PUBLISHED: 2021-05-11
    ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on Zebra (formerly Motorola Solutions) Fixed RFID Reader FX9500 devices. An unauthenticated attacker can upload arbitrary files to the filesystem that can then be accessed through the web interface. This can lead to information disclosure and c...
    CVE-2020-24586
    PUBLISHED: 2021-05-11
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted us...
    CVE-2020-24587
    PUBLISHED: 2021-05-11
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and...
    CVE-2020-24588
    PUBLISHED: 2021-05-11
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802....
    CVE-2020-26139
    PUBLISHED: 2021-05-11
    An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and...