• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Endpoint Security • Startup/SMBs/SMEs  /  Small businesses are underestimating cyber attacks
16 February 2018

Small businesses are underestimating cyber attacks

Written by Seqrite
Seqrite
Cybersecurity, Endpoint Security, Startup/SMBs/SMEs
  • 14
    Shares
4
Estimated reading time: 3 minutes

A cursory look at the cybersecurity landscape in 2017 throws up some of the biggest names in their respective industries. From Uber to Yahoo to Equifax to India’s Zomato and lots more, it seemed even the biggest companies in the world, despite their standing and financial heft, didn’t have means to defend themselves against this new menace.

But should network administrators and founders of startups or other small and medium-sized enterprises (SMEs) rejoice? Should they feel that cyber criminals will only attack the big guns and not worry about other smaller, insignificant players?

The answer is clear: a big and resounding no.

Waking up to the danger

Network administrators should consider the other aspect as well. The criminals don’t really care who they hit and in most cases, SMEs and startups make for an easier and better target. For one, smaller business will not have the financial resources of a financial giant and hence may not invest as much in security, hence meaning that their security measures for an impending attack may be low or even non-existent. Secondly, smaller firms will be much more desperate – even a small cyber attack has the potential to ground them and wipe them out completely, a fact which attackers will not be shy to utilize. They will be more willing to pay the ransom rather than bigger companies.

But are smaller businesses waking up to the fact that they are targets for cyber attacks? It does not seem so – a survey by the United Kingdom government and KPMG among 1,000 small business in the country threw up worrisome statistics: only 23% of small businesses felt cyber security was a top security concern while 29% of businesses who had not experienced a breach felt they would suffer reputational damage. Another worrying statistic arrived from the 2017 Verizon Data Breach Investigations report: at least 61 percent of the hacked industries and enterprises functioned with a smaller workforce, i.e. not even 1,000 employees.

A financial risk

And if SMEs need more reasons beyond just the security of their company, here is a financial one for the ones operating in the European Union. The year 2018 will see the General Data Protection Regulation come into effect from May 25 onward in all EU countries. As per the terms of this regulation, organizations violating the regulations may be fined up to 2-4% of their global annual turnover, depending on the violation. Small businesses are likely to be the worst affected of this provision. Bigger business will have huge budgets and may be able to tide over these fines but a small business is likely to get crippled. And hence, it’s extremely important that founders and administrators of small business negate this problem by setting up strong security measures.

So what are some steps in which small businesses and startups can implement effective cybersecurity? While SMEs may have resource constraints, it is important to take judicious and smart steps. A few measures which SMEs can employ are:

  • Accept the risk: The first step is acceptance. A small business or startup cannot think they are not “important enough” to be attacked. The point has already been made, but to reiterate – no one is safe and possibly, SMEs are at greater risk. By accepting that they too are at a risk, a small business takes an important, first step and opens their mind to solutions.
  • Risk assessment: The next step for a SME is to do a proper risk assessment. This is even more important for small business and startups as it allows them to understand what parts of their organization are under the greatest risk and prepare accordingly. Since resources need to be allocated much more carefully, a small business can draw up plans to invest more resources into areas of higher risk.
  • Train employees on cyber security: With fewer employees, SMEs can actually invest in training their workforce which will be a big step in bolstering their defence. While larger companies with bigger workforces may find this step difficult, SMEs can train their employees about the importance of strong passwords, phishing scams, ransomware and malware attacks and how to prevent them.
  • Invest in strong endpoint security solutions: SMEs have to think proactively before investing in a security solution. However, this is not a choice, it is a compulsion. SMEs must evaluate the options they have and choose the solution which best fits their requirements. They can consider Seqrite’s Endpoint Security (EPS) solution which integrates innovative technologies like Anti Ransomware, Advance DNA Scan, Behavioural detection system and others.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostBenefits of having Intrusion Prevention/Detection System in your ...
Next Post  Top 3 cybersecurity risks every HR chief should care about
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Turn the Page Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Building a holistic cybersecurity strategy to safeguard the pharma sector

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021
  • Data breach volumes worry governments and businesses

    The Data breach inferno burning big-ticket businesses

    February 5, 2021

4 Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

  1. joy Reply to joy to joy'> Reply to joy
    March 19, 2018 at 9:36 PM

    We can use network security to protect the integrity of company network or data it can be software or hardware.A network security offers multiple security layers.

  2. joy Reply to joy to joy'> Reply to joy
    March 19, 2018 at 9:40 PM

    Bussiness man/women are not tech expert they do not understand how lethal this is, some days ago there was an attack on twitter account of Air India and it was hacked by some Turkish hackers it updated the status of twitter India as all flite cancelled.Visit https://www.seqrite.com/blog/small-businesses-are-underestimating-cyber-attacks/ for more information.

  3. joy Reply to joy to joy'> Reply to joy
    March 19, 2018 at 9:43 PM

    To protect the integrity of company network or data it can be software or hardware.A network security offers multiple security layers.Bussiness man/women are not tech expert they do not understand how lethal this is, some days ago there was an attack on twitter account of Air India and it was hacked by some Turkish hackers it updated the status of twitter India as all flite cancelled.

    • Ankita Ashesh Ankita Ashesh Reply to Ankita to Ankita Ashesh'> Reply to Ankita
      March 22, 2018 at 3:59 PM

      We agree, network security is an essential component in enterprise security.

Popular Posts

  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.