Securing small businesses from cyber attacks

Why are SMBs increasingly coming under attack from cyber criminals, and how can they stay safe? Davey Winder investigates...

Mike Foreman, senior vice president at AVG Technologies, says phishing attacks against SMBs are still proving hugely popular.

For instance, his firm's research shows that 56.9 per cent of SMBs have received fraudulent emails asking for money, 36.8 per cent have received fake tax rebate emails and 12.3 per cent have been directed to a fake government web page.

SMB security timeline

Chris Wysopal, co-founder and chief technology officer of application testing company Veracode, sets out a timeline for preparing a small business security strategy.

In the first three months

*Identify the stakeholders needed to articulate & execute your application security strategy.

*Educate your teams on the threat landscape and build an application security training program.

*Identify the portfolio of applications that are critical to your business.

In the next six months

*Assess business risk across your app portfolio.

*Establish security policy to comply with regulatory or customer requirements, and ultimately cover the business critical apps.

*Independently verify the security of the software that you sell, build, purchase and procure.

Clickjacking, which involves tricking people into clicking links directing them to malware installations or fake websites, is another popular form of attack used against SMBs.

"The majority of SMBs are easily tricked into clicking on these links," Foreman adds, "with only 30.5 per cent exercising caution about clicking on links claiming to be HMRC."

SMB threat protection

The biggest problem for SMBs is their size, in terms of the amount they spend on security and the breadth of their in-house knowledge about protecting themselves against cyber attacks.

"The same rules apply for any business. They need to decide which assets are critical, then put policies and solutions in place to protect those assets," says CheckPoint's Greer-King.

"Users also need educating on potential risks and threat vectors, and how their behaviour can mitigate risks. The smaller business has one key advantage here: they have fewer employees to educate."

James Potter-Irwin, a senior consultant at Plan-Net, sums it up best. "If you don't make yourself the easy target, the criminal will most likely look elsewhere for their victim."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021
Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021