Five typical cybersecurity risks in SMEs

SMEs are an attractive target for cyber fraudsters. Companies are mostly aware of the dangers of cyber threats, but not all of them know about the security gaps in their own IT.

Often, security vulnerabilities in a company's own IT are unknown.
Image: ZVG / T&N

Check Point Research (CPR), the security researchers at cybersecurity specialist Check Point Software Technologies, recorded 65 percent more cyberattacks on Swiss companies last year than in the previous year. SMEs are an attractive target for cyber fraudsters. Their defense systems are usually less extensive than those of large companies and thus easier to circumvent. At the same time, the trade secrets and data of SMEs are often vital and therefore particularly valuable.

The challenge of IT security

SMEs are usually aware of the dangers of cyber threats. But in practice, it turns out that security vulnerabilities in their own corporate IT are often unknown. We have compiled five security vulnerabilities that we frequently encounter in small and medium-sized enterprises:

  1. Backup of enterprise data is insufficient. When backing up corporate data, the rule of thumb of the 3-2-1 backup strategy applies. This states: There should be at least three copies of the data. These should be backed up on two different storage media. Of these, one backup copy should be stored at an external location. External backup is neglected in many places. The problem: cyber attacks, but also power failures or elementary events can destroy even local data backups. The simplest way to outsource a backup copy is an automated backup to a service provider. It is particularly important that the external backup is separate from the company's own infrastructure and that the connection is encrypted end-to-end.
  2. Employees are not sensitized to impending cybersecurity dangers. One click on the wrong link and malware is activated ... One of the biggest security risks in the company are the users of the IT systems, i.e. the company's own employees. Sensitizing employees to cyber threats and preparing them for emergencies is now part of the mandatory program. Those who want to dispense with traditional training can make use of security awareness software. In addition to an e-learning platform, modern solutions offer the option of simulating attacks and checking the infrastructure for security gaps (penetration testing).
  3. No recovery plan exists. The IT systems fail. And now? A recovery plan documents how an organization can respond to an emergency from an organizational and technical perspective. The goal of a disaster recovery plan is to limit the damage and minimize the disruption to normal operations.
  4. Access to the IT network and Internet interfaces are not protected. Today, a firewall is part of the standard equipment of an organization. But not all firewalls are the same. An integrated intrusion detection or intrusion prevention system (IDS/IPS) is particularly important with regard to threats from the network. This monitors the network for anomalies and can detect rule violations and harmful incidents such as hacker attacks in good time.
  5. Operating systems, virus scanners and firewalls are not up to date. Maintenance work is usually not very popular. They are gladly postponed in favor of other priorities or only insufficiently done. However, serious and regular maintenance and updates are the basis for secure systems and are more important today than ever before. For example, patches are applied that close new security gaps.

IT security check uncovers vulnerabilities

It is hardly possible for smaller companies to keep up with the dynamics in the security sector. At the same time, the pressure on the security of corporate data is growing. Today, a collection of security products is no longer enough to provide all-round protection. A holistic approach is necessary. An external IT security audit helps SMEs to uncover vulnerabilities and define the protection needs of IT assets. In addition, a holistic security check shows the measures to be taken to eliminate the security gaps. It is always worthwhile to call in external experts to review your own IT security: With their expertise and an outside perspective, they create added value and close the gaps that exist in the company.

Author

Renato Casati is Co-Head of IT at T&N, a Swiss ICT service provider for IT and telecommunications solutions in the business environment.
> www.tn-ict.com

(Visited 212 times, 1 visits today)

More articles on the topic

Fatal error: Uncaught TypeError: Argument 1 passed to SimplePie\Cache\BaseDataCache::__construct() must implement interface SimplePie\Cache\Base, instance of FeedWordPie_Cache given, called in /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-includes/SimplePie/src/SimplePie.php on line 3219 and defined in /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-includes/SimplePie/src/Cache/BaseDataCache.php:63 Stack trace: #0 /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-includes/SimplePie/src/SimplePie.php(3219): SimplePie\Cache\BaseDataCache->__construct(Object(FeedWordPie_Cache)) #1 /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-includes/SimplePie/src/SimplePie.php(1585): SimplePie\SimplePie->get_cache('https://www.wer...') #2 /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-content/plugins/feedwordpress/feedwordpress.php(1935): SimplePie\SimplePie->init() #3 /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-content/plugin in /home/httpd/vhosts/galledia.ch/httpdocs/organisator.ch/develop/wp-includes/SimplePie/src/Cache/BaseDataCache.php on line 63