Securing small businesses from cyber attacks

Why are SMBs increasingly coming under attack from cyber criminals, and how can they stay safe? Davey Winder investigates...

Mike Foreman, senior vice president at AVG Technologies, says phishing attacks against SMBs are still proving hugely popular.

For instance, his firm's research shows that 56.9 per cent of SMBs have received fraudulent emails asking for money, 36.8 per cent have received fake tax rebate emails and 12.3 per cent have been directed to a fake government web page.

Advertisement - Article continues below
SMB security timeline

Chris Wysopal, co-founder and chief technology officer of application testing company Veracode, sets out a timeline for preparing a small business security strategy.

In the first three months

*Identify the stakeholders needed to articulate & execute your application security strategy.

*Educate your teams on the threat landscape and build an application security training program.

*Identify the portfolio of applications that are critical to your business.

In the next six months

*Assess business risk across your app portfolio.

*Establish security policy to comply with regulatory or customer requirements, and ultimately cover the business critical apps.

*Independently verify the security of the software that you sell, build, purchase and procure.

Clickjacking, which involves tricking people into clicking links directing them to malware installations or fake websites, is another popular form of attack used against SMBs.

"The majority of SMBs are easily tricked into clicking on these links," Foreman adds, "with only 30.5 per cent exercising caution about clicking on links claiming to be HMRC."

Advertisement - Article continues below
Advertisement - Article continues below

SMB threat protection

The biggest problem for SMBs is their size, in terms of the amount they spend on security and the breadth of their in-house knowledge about protecting themselves against cyber attacks.

"The same rules apply for any business. They need to decide which assets are critical, then put policies and solutions in place to protect those assets," says CheckPoint's Greer-King.

"Users also need educating on potential risks and threat vectors, and how their behaviour can mitigate risks. The smaller business has one key advantage here: they have fewer employees to educate."

James Potter-Irwin, a senior consultant at Plan-Net, sums it up best. "If you don't make yourself the easy target, the criminal will most likely look elsewhere for their victim."

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now

Most Popular

How to find RAM speed, size and type

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi

How to use Chromecast without Wi-Fi

4 Aug 2020
UN report points to a 350% rise in phishing websites at start of 2020

UN report points to a 350% rise in phishing websites at start of 2020

7 Aug 2020