Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

10/17/2019
03:00 PM
Connect Directly
Twitter
RSS
E-Mail

State of SMB Insecurity by the Numbers

SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different pictur
1 of 8

Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
blackjack0021
50%
50%
blackjack0021,
User Rank: Apprentice
10/21/2019 | 1:33:44 PM
cyber risk change hits small biz
As long as Security expense is optional then most SMB can't afford to add it. The market doesn't let them charge more if they do, and competitors will always run the risk or cut corners and costs. As Bruce Schneir points out in Click Here To Kill Everyone, if the cost of security measures isn't required of everyone then the market actually penalizes you for doing it. Customers of SMB especially have no way to know if your company is doing it right or better. There is no competitive advantage. It's a proverbial Catch 22. I've done consulting for SMB, super small <10 people up to midsize I'd guess around 2000, but I'm an enterprise guy mostly. There is a special focus for SMB on free- or low-cost solutions that is almost alien to most enterprise people. It just presents many different challenges.
FLYING J3
50%
50%
FLYING J3,
User Rank: Apprentice
10/21/2019 | 4:02:59 PM
Re: cyber risk change hits small biz
If your a contractor with the DOD they are going to be requiring you to have a Cybersecurity Maturity Model Certification sometime in 2020. Because they are forcing this, Cybersecurity is going to be an alowable cost on new contracts sometime in mid to late 2020. .
Franois Amigorena
50%
50%
Franois Amigorena,
User Rank: Author
11/4/2019 | 5:55:33 AM
The business benefits for IT security in SMBs
SMBs that grasp the business benefits are often further ahead. They understand that any competitor can nowadays quickly adopt a new technology to gain new capabilities, improve efficiency and/or reduce costs. However, each new application does create a need to secure users, data and the environment that the solution integrates into. Those that treat security as an onerous requirement that is invoked each time a new technology is contemplated will be slow to adopt – and slow to profit from – new efficiencies.

SMBs that build effective IT security frameworks are able to move more quickly and surely than their competitors. Environments without effective IT security solutions will have difficulty innovating and are likely to fall behind more nimble competitors.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15478
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
CVE-2020-6261
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-15471
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.