{"id":2509,"date":"2014-09-04T17:54:53","date_gmt":"2014-09-04T17:54:53","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2509"},"modified":"2020-02-26T18:48:05","modified_gmt":"2020-02-26T16:48:05","slug":"a-solution-for-small-businesses-persistent-it-security-issues","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/a-solution-for-small-businesses-persistent-it-security-issues\/2509\/","title":{"rendered":"A solution for small businesses&#8217; persistent IT security issues"},"content":{"rendered":"<p>Struggling startups and mature small companies rarely pay much attention to cybersecurity issues. According to the\u00a0<a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Global_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">2014 Global Corporate IT Security Risks survey<\/a> conducted by B2B International together with Kaspersky Lab, small businesses are concerned more about their products and service strategy (41% of companies named it as a priority) and marketing strategy, which includes business development, building customer relationships and improving business image (40% named it as a priority for the company).<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>At the same time, development of IT strategy (including security) appears to be a lower strategic concern for small business than for the larger ones \u2013 only 19% of the former name IT strategy as the most important or second most priority for the company. Of course it\u2019s vital to invest in core business processes, but it would be a costly mistake for small business to completely neglect security considerations. <\/p><blockquote class=\"twitter-pullquote\"><p>Looking for the right thing: a solution for small businesses security problems.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FUz8V&amp;text=Looking+for+the+right+thing%3A+a+solution+for+small+businesses+security+problems.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There are a few reasons why small businesses don\u2019t always give IT security the attention it deserves, aside from their focus on their primary products and\/or services. First, they believe that criminals won\u2019t waste time and effort on a small company and that small businesses don\u2019t have anything worth stealing. Which is plain wrong. According to <a href=\"http:\/\/www.verizonenterprise.com\/DBIR\/2013\/\" target=\"_blank\" rel=\"noopener nofollow\">Verizon\u2019s 2013 Data Breach Investigations Report<\/a> more than 30 percent of data breaches occurred at companies with 100 or fewer employees. Due to this gap between perception and reality, very small business seldom pays much attention to IT security, inadvertently offering cybercriminals a great opportunity for easy money. Criminals, in turn, aren\u2019t too scrupulous in selecting their targets. They know smaller entities work with the very same resources as larger ones: technologies, knowledge, sensitive data, finances, etc. Small businesses do banking online, processing financial information about themselves and their customers. And without a decent protection it doesn\u2019t take much effort from hackers to damage smaller businesses.<\/p>\n<p>Very small business also tends to <a href=\"https:\/\/business.kaspersky.com\/few-companies-are-interested-in-protecting-endpoint-devices-of-their-clients\/2358\" target=\"_blank\" rel=\"noopener nofollow\">underestimate the scale of IT threats<\/a>. Perception of malware discovery rates among small businesses tends to be less realistic than in larger companies. The survey found that 74% of VSBs believe that 10,000 or fewer malware samples are discovered daily while the real figure is much higher at <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2013\/number-of-the-year\" target=\"_blank\" rel=\"noopener nofollow\">over 315,000 per day<\/a>.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/09\/06020107\/800-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2512\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2014\/09\/06020107\/800-1.png\" alt=\"800\" width=\"800\" height=\"534\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Underestimation costs. For start-ups even a single security incident could easily spell financial ruin. According to the fresh figures from the\u00a0<a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Global_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">2014 Global Corporate IT Security Risks survey<\/a> the\u00a0worldwide average cost of a data breach for a small or medium sized business can reach $375,000 USD. This figure includes lost business opportunities, hiring external IT support to fix the problem and potentially even new equipment. The median cost of professional services for SMBs due to a serious data loss event is $10,000 USD. For a very small business, the bill of this size may easily spell doom.<\/p>\n<p>The costs are not just financial: 57% of data loss events had a knock-on effect that damaged the operation of the business in general. The image and reputation of a company \u2013 something which absorbs so much time and effort when developing marketing strategies \u2013 can be ruined overnight. More than half of lost data events (56%) lead to a negative impact on a company\u2019s reputation or perceived reliability.<\/p>\n<p>Still, smaller businesses prefer to place their priorities elsewhere; quite often because of perceived costs of security solutions. But in reality a small company does not need to start by investing in things like the implementation of data-loss prevention (DLP), or an in-depth management console \u2013 an enterprise-level things.<\/p>\n<p>Small businesses can focus on the security issues which are critical to the individual company or to the field it works in, and pick a security vendor that can scale up as their business grows. At the outset, a very small business needs the baseline protection supplied by anti-malware software and a firewall. Once these businesses become operational and start processing orders, they need data encryption technology to <a href=\"https:\/\/business.kaspersky.com\/few-companies-are-interested-in-protecting-endpoint-devices-of-their-clients\/2358\" target=\"_blank\" rel=\"noopener nofollow\">protect payment information<\/a> or customer information, and this sort of protection is often mandated by law.\u00a0If they begin hiring employees who work outside the office, then basic mobile security features will be appropriate.<\/p><blockquote class=\"twitter-pullquote\"><p>Small businesses feel there isn\u2019t a security solution designed for them. That\u2019s not so. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FUz8V&amp;text=Small+businesses+feel+there+isn%26%238217%3Bt+a+security+solution+designed+for+them.+That%26%238217%3Bs+not+so.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>One key reason why small businesses may be hesitant to invest in IT security is because they feel there isn\u2019t a security solution built with their needs in mind: the only choices available are consumer software that isn\u2019t designed with business in mind, or enterprise-level software which is too complicated and apparently expensive.<\/p>\n<p>But actually there is <a href=\"https:\/\/www.kaspersky.com\/small-office-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> that had been specifically designed to fill this gap: it offers specially-built management and financial transaction protection that is made easy for an ordinary person to use, along with business-critical tools like file encryption and protection for file servers. And if criminals will attempt to take on a KSOS-protected company, thinking it\u2019s an easy target, they are going to be surprised, big time.<\/p>\n<p>The trial version of the latest Kaspersky Small Office Security edition is available <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small businesses are unwilling to invest in security solutions &#8211; often because they don&#8217;t think there are any &#8211; designed specifically for their needs. But such solutions do exist.<\/p>\n","protected":false},"author":209,"featured_media":15442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[298,234,2118],"class_list":{"0":"post-2509","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-it-security","10":"tag-small-business","11":"tag-small-business-security"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-solution-for-small-businesses-persistent-it-security-issues\/2509\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-solution-for-small-businesses-persistent-it-security-issues\/2509\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-solution-for-small-businesses-persistent-it-security-issues\/2509\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/it-security\/","name":"IT Security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/2509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=2509"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/2509\/revisions"}],"predecessor-version":[{"id":26323,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/2509\/revisions\/26323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15442"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=2509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=2509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=2509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}