SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Are today’s SMBs ready for cyberattacks?
It’s almost impossible to not hear about the famous security breaches
that have been occurring over the past couple of years.
Sure, we know now that IT security is something that companies have
been sorely failing at. But now that the word is clearly out, how many
companies in our world are actually prepared?
To answer this, an in-depth study of 700 small to medium sized
business was done by Webroot. When they asked How is your
security managed? this was the result.
La k of IT se urit skills are learl still a dau ti g issue for “MB’s.
Notably, 8% of companies have no specific skills in IT security. However,
this is e pe ted. Most alar i g is the fa t that % of “MB’s are
handing over their IT security needs to employees whom are not purely
IT security professionals.
Does this mean that 32% of “MB’s o ’t e a le to ha dle a targeted
ha ki g atta k? Well, let’s see.
When Webroot asked these 700 companies if they felt ready to handle
a hacking attack-
Although the percentage of companies that have no dedicated-full time
IT professionals working for them is 40%, the percentage of companies
that are not completely prepared for an attack is 63%.
This exposes a rather alarming tendency. Companies do not seem to
feel prepared for an attack unless they have a dedicated team either
in house or in a managed security provider working directly on their
behalf to handle IT security needs.
This tendency goes hand in hand with the fact that 56% percent of
“MB’s spe d less tha 1 hours o IT se urity i e ery o th
period. That’s right, the ajorit of s all to ediu sized usi esses
only spend 2 days out of every 132 business days on IT security.
Surprised?
Likewise. Less than 17 hours is far from what it takes to be confident
that ou’re safe fro a atta k. I these ases it’s likel that IT security
has widely taken the back seat to the other IT tasks that companies are
responsible for.
To discover if this hypothesis was true, Webroot asked them one final
question: Would outsourcing your cybersecurity improve your ability
to address other critical areas of your business? To which 81% agreed.
This time, we are ’t surprised. As predi ted, o pa ies see to k o
hat the should e doi g ut ait o pulli g the trigger u til the ’ e
been damaged. U fortu atel “MB’s ge erall thi k this is the a it
has to be because they cannot afford a large enterprise-sized team that
big corporations can.
With erse urit te h olog rapidl ad a i g, this is ’t the a it
has to be anymore.
By using managed security provider outsourcing with a targeted
strategy for handling o li e erse urit , “MB’s do ot ha e to pa
nearly what larger corporations do to have the same level of
protection. But there is much more to what a managed security service
provider can do that just what you read in this article.
Fi d out ore a out hat is possi le ith today’s y erse urity
technology here.
Image credit: https://pixabay.com/en/computer-addiction-help-1106900/

Weitere ähnliche Inhalte

Andere mochten auch

Rishi-Tea-Portfolio
Rishi-Tea-PortfolioRishi-Tea-Portfolio
Rishi-Tea-PortfolioSean O'Leary
 
JULIANA_BACCHUS_RESUME 2015
JULIANA_BACCHUS_RESUME 2015JULIANA_BACCHUS_RESUME 2015
JULIANA_BACCHUS_RESUME 2015Juliana Bacchus
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programmingVasilios Kuznos
 
My future vacations
My future vacationsMy future vacations
My future vacationsCMarianaS
 
Investigacion
Investigacion Investigacion
Investigacion chelsey98
 
Game Sense Presentation
Game Sense PresentationGame Sense Presentation
Game Sense Presentationejcoggo
 
Virdatint Distributed Data Virtualization Basics_2.6
Virdatint Distributed Data Virtualization Basics_2.6Virdatint Distributed Data Virtualization Basics_2.6
Virdatint Distributed Data Virtualization Basics_2.6Virdatint
 
Sage_report_v8_digital_low
Sage_report_v8_digital_lowSage_report_v8_digital_low
Sage_report_v8_digital_lowMeghan Cornwall
 
SILC Testimonials 092015
SILC Testimonials 092015SILC Testimonials 092015
SILC Testimonials 092015Victoria Ross
 
A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...
A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...
A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...Kedir Bade
 

Andere mochten auch (12)

Rishi-Tea-Portfolio
Rishi-Tea-PortfolioRishi-Tea-Portfolio
Rishi-Tea-Portfolio
 
JULIANA_BACCHUS_RESUME 2015
JULIANA_BACCHUS_RESUME 2015JULIANA_BACCHUS_RESUME 2015
JULIANA_BACCHUS_RESUME 2015
 
Object oriented programming
Object oriented programmingObject oriented programming
Object oriented programming
 
Tema 1 el sistema solar sociales
Tema 1       el sistema solar            socialesTema 1       el sistema solar            sociales
Tema 1 el sistema solar sociales
 
My future vacations
My future vacationsMy future vacations
My future vacations
 
Investigacion
Investigacion Investigacion
Investigacion
 
Game Sense Presentation
Game Sense PresentationGame Sense Presentation
Game Sense Presentation
 
Virdatint Distributed Data Virtualization Basics_2.6
Virdatint Distributed Data Virtualization Basics_2.6Virdatint Distributed Data Virtualization Basics_2.6
Virdatint Distributed Data Virtualization Basics_2.6
 
Sage_report_v8_digital_low
Sage_report_v8_digital_lowSage_report_v8_digital_low
Sage_report_v8_digital_low
 
Apuntes
ApuntesApuntes
Apuntes
 
SILC Testimonials 092015
SILC Testimonials 092015SILC Testimonials 092015
SILC Testimonials 092015
 
A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...
A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...
A8hcqdusfighmnagsobw signature-c86a07381c552e271ea067ec05fb574d1661495ea080c4...
 

Kürzlich hochgeladen

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Kürzlich hochgeladen (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Are today’s SMBs ready for cyberattacks?

  • 1. Are today’s SMBs ready for cyberattacks? It’s almost impossible to not hear about the famous security breaches that have been occurring over the past couple of years. Sure, we know now that IT security is something that companies have been sorely failing at. But now that the word is clearly out, how many companies in our world are actually prepared? To answer this, an in-depth study of 700 small to medium sized business was done by Webroot. When they asked How is your security managed? this was the result.
  • 2. La k of IT se urit skills are learl still a dau ti g issue for “MB’s. Notably, 8% of companies have no specific skills in IT security. However, this is e pe ted. Most alar i g is the fa t that % of “MB’s are handing over their IT security needs to employees whom are not purely IT security professionals. Does this mean that 32% of “MB’s o ’t e a le to ha dle a targeted ha ki g atta k? Well, let’s see. When Webroot asked these 700 companies if they felt ready to handle a hacking attack-
  • 3. Although the percentage of companies that have no dedicated-full time IT professionals working for them is 40%, the percentage of companies that are not completely prepared for an attack is 63%. This exposes a rather alarming tendency. Companies do not seem to feel prepared for an attack unless they have a dedicated team either in house or in a managed security provider working directly on their behalf to handle IT security needs. This tendency goes hand in hand with the fact that 56% percent of “MB’s spe d less tha 1 hours o IT se urity i e ery o th period. That’s right, the ajorit of s all to ediu sized usi esses only spend 2 days out of every 132 business days on IT security. Surprised? Likewise. Less than 17 hours is far from what it takes to be confident that ou’re safe fro a atta k. I these ases it’s likel that IT security has widely taken the back seat to the other IT tasks that companies are responsible for.
  • 4. To discover if this hypothesis was true, Webroot asked them one final question: Would outsourcing your cybersecurity improve your ability to address other critical areas of your business? To which 81% agreed. This time, we are ’t surprised. As predi ted, o pa ies see to k o hat the should e doi g ut ait o pulli g the trigger u til the ’ e been damaged. U fortu atel “MB’s ge erall thi k this is the a it has to be because they cannot afford a large enterprise-sized team that big corporations can. With erse urit te h olog rapidl ad a i g, this is ’t the a it has to be anymore. By using managed security provider outsourcing with a targeted strategy for handling o li e erse urit , “MB’s do ot ha e to pa nearly what larger corporations do to have the same level of protection. But there is much more to what a managed security service provider can do that just what you read in this article. Fi d out ore a out hat is possi le ith today’s y erse urity technology here. Image credit: https://pixabay.com/en/computer-addiction-help-1106900/