InvestorsHub Logo
Followers 5
Posts 2491
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Sunday, 03/01/2020 9:34:54 AM

Sunday, March 01, 2020 9:34:54 AM

Post# of 248697
One in five SMBs use no endpoint security at all

https://www.helpnetsecurity.com/2020/02/27/smbs-breach-prepared/

An alarming number of SMBs (small to medium businesses) in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns.

One-third of companies with 50 or fewer employees report using free, consumer-grade cybersecurity, and one in five companies use no endpoint security whatsoever.

SMBs are not prepared for a breach

Additionally, worrisome, the BullGuard study found 43% of SMB owners have no cybersecurity defense plan in place at all – leaving their most sensitive financial, customer and business data, and ultimately their companies, at significant risk.

“Small businesses are not immune to cyber attacks and data breaches, and are often targeted specifically because they often fail to prioritize security,” said Paul Lipman, CEO of BullGuard.

“Caught between inadequate consumer solutions and overly complex enterprise software, many small business owners may be inclined to skip cybersecurity. It only takes one attack, however, to bring a business to its knees.”

SMB owners overly confident in the safety of their company and customer data

The study also revealed some glaring discrepancies between what SMB owners believe versus what is actually occurring in the market. Nearly 60% of SMB owners believe their business is unlikely to be targeted by cyber criminals, however the results revealed that 18.5% of SMB owners have suffered from a cyber attack or data breach within the past year.

Unfortunately, while securing data can be simple, remediation is not. Companies that fall victim to a cyber attack often experience significant downtime that seriously impacts productivity, data privacy, and even revenue.

Once breached, 25% of SMB owners stated they had to spend $10,000 or more to resolve the attack, which could be devastating for a small company. As for time lost, 50% of SMB owners said it took 24 hours or longer to recover from a breach or cyber attack, while 25% reported they lost business as a result, and almost 40% stated they lost crucial data.

Despite these numbers, many SMB owners are overly confident in the safety of their company and customer data. One in five SMB owners surveyed stated their organization has zero vulnerabilities, however 50% of SMB owners stated their employees do not receive any cybersecurity training.

A significant number, 65%, of SMB owners report managing their cybersecurity in-house, but less than 10% say they have a dedicated IT staff member. The right solution makes it simple and extremely cost-effective for SMBs to manage their own cybersecurity, ensuring their business is secure and protected.
=================================================================
Imagine if SMBs knew that only known and approved devices were accessing their networks!!!
==================================================================
https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Excerpts:

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/

https://www.wavesys.com/contact-information











Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.