Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/4/2010
05:04 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Global Survey Reveals Data Loss Among The Biggest Concern For Small Businesses

While viruses and Trojans are still the top runners, small businesses are becoming more worried about losing important data

CUPERTINO, Calif., Nov. 2, 2010 /PRNewswire/ -- Viruses, Trojans, data-stealing malware, and data leaks were rated as big IT concerns among small businesses, according to Trend Micro's 2010 corporate end user survey, which included 1600 end users(1) in the U.S., U.K., Germany and Japan. On average, 63 percent of small businesses(2) were most concerned by viruses, 60 percent by Trojans, 59 percent by data-stealing malware (malware designed by cybercriminals specifically to steal data), followed by 56 percent by data leaks -- the intentional or unintentional sending of sensitive or crucial information outside the corporate network. Phishing scams and spam were least concerning among the small businesses surveyed.

"What this tells us is that data loss, either through internal data leaks or malware, is a serious issue for small businesses, especially as they become more aware of their attractiveness to cybercriminals," said David Perry, global director of education, Trend Micro. It would not be surprising to see data-stealing malware and data leaks pushed up to number one and two on this list in the next few years."

Small businesses are less prepared, less aware of data loss

Despite these worries, the survey found that across all countries, small organizations are less likely by 23 percent to have preventative data leak policies in place than large companies.

The biggest difference was found in Japan where 81 percent of large companies have data leak prevention policies in place compared to only 47 percent of small companies. For those businesses that have preventive data leak policies in place, employees in large companies are also significantly more likely to have received training on data leak prevention than those in small companies.

This is worsened by the fact that employees within large companies indicate more awareness of confidential business information than those in small companies. Employees in large U.S. companies are significantly more likely to indicate data leaks as a serious threat than those in smaller companies: 74 percent in large companies, 49 percent in small companies.

In the U.K., this is also significant: 73 percent of employees from large companies say they are aware of confidential information compared to 63 percent from small companies. Also worth noting is that in every country, employees in larger companies are significantly more likely to agree that other employees have leaked data from within their organization.

Employees say their companies can do better at protection

The survey found that the most prevalent forms of IT protection against data stealing malware is installing security software, restricting Internet access and implementing security policies. Even then, 21 percent of small business employees still say that their IT departments can do a better job at protecting them on potential risks associated with data-stealing malware. More alarmingly, more than one third (35 percent) of employees in small companies indicated their IT department could have done a better job educating them about data stealing malware.

For more information regarding this survey, please visit: http://trendmicro.mediaroom.com/index.php?s=23

Small businesses need education, awareness and the right security product that's designed for them

Education, combined with the right security technology specifically designed for your small business, is crucial in the fight against cybercrime. Check out Trend Micro's Top 10 Tips to Keep Your Small Business Safe here.

For years, small businesses have turned to Trend Micro(TM) Worry-Free(TM) Business Security for easy, effective protection against spam, viruses, spyware, phishing attacks, hackers and other threats before they reach your business. The newest version of Worry-Free Business Security, announced today - see press release here, now includes email data loss prevention, integrated Mac-client protection, and device control.

The Trend Micro(TM) Smart Protection(TM) Network system delivers the infrastructure behind many Trend Micro products and solutions that stop social networking threats. It uses a number of patent-pending technologies and combines Internet-based (or "in-the-cloud") technologies with lighter-weight, client-based methods to ensure small businesses have immediate access to the latest and strongest protection wherever and however they connect - from home, within the company's network, or on the go.

Follow us on

Facebook: http://www.facebook.com/Trendmicro

Twitter: http://twitter.com/trendmicro

YouTube: http://www.youtube.com/trendmicroinc

About Trend Micro:

Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro Smart Protection Network cloud computing security infrastructure which delivers advanced protection from the cloud, blocking threats in real-time before they reach you. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit Trend Micro.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27187
PUBLISHED: 2020-10-26
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related command...
CVE-2020-7752
PUBLISHED: 2020-10-26
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
CVE-2020-7127
PUBLISHED: 2020-10-26
A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
CVE-2020-7196
PUBLISHED: 2020-10-26
The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the ur...
CVE-2020-7197
PUBLISHED: 2020-10-26
SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreServ Management Console (SSMC) 3.7.0.0 is an off node multiarray manager web application and remains isolated from data on the managed arrays. HPE has provided an update to HPE StoreServ Management Console (SSMC) software 3.7.0.0* U...