Following the news of a recent Webroot report titled “Size Does Matter”, which highlights SMBs’ perception of cybersecurity risks, Paul Norris, Senior Systems Engineer for EMEA at Tripwire, gives his take on how SMBs can protect themselves.
Paul Norris, Senior Systems Engineer for EMEA at Tripwire:
“SMBs used to feel safer from the threat of cyberattacks because they failed to see the potential value of their digital assets. Recently, criminals have figured out that through the weaker security layers of smaller contractors, they could not only obtain sensitive information, but they could also gain access to the networks of larger enterprises. Fortunately, awareness is increasing, and the fact that SMBs are worrying about the state of their cybersecurity is encouraging, because it means that they are taking steps to protect themselves.
The best way in which SMBs can manage the risk coming from cyber threats is, first and foremost, employee training. In our experience, preparing the workforce on the best security practices goes a long way in protecting the infrastructure from evitable breaches, such as those caused by malicious links delivered via phishing emails. Humans are still the weakest link in SMBs security systems: often without a malicious intent, employees can make mistakes, compromise their passwords, or abuse privilege access, thus harming the security layers.
Additionally, since SMBs sometimes don’t have a dedicated cybersecurity team, investing in solid foundational controls can help with the identification of threats and vulnerabilities by continuously monitoring the security of their systems.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.