Welcome!

Weblogic Authors: Yeshim Deniz, Elizabeth White, Michael Meiner, Michael Bushong, Avi Rosenthal

Related Topics: @CloudExpo, Agile Computing, Cloud Security

@CloudExpo: Blog Post

Why Small Businesses Still Don't Take Cyber Security Seriously By @NateMVickery | @CloudExpo #Cloud

Statistics say that more than half of all small businesses in the US don't provide security training for their employees

Although corporate giants realized the danger of cyber attacks and cyber crime in general, especially after attacks on Sony and Zappos, as well as the very sensitive data breach that struck Ashley Madison website, small businesses still don't do much for making their networks more secure.

Statistics say that more than half of all small businesses in the US don't provide security training for their employees, only one quarter conduct outside party security tests, and more than 40% don't produce backup copies of their most important business files, in case something goes wrong.

Why Small Businesses Don't Invest in Cyber Security?
Most small entrepreneurs think that their businesses are immune to cyber attacks due to false belief that cyber criminals only attack corporative and government websites. Annual research conducted by Symantec, for their 2015 Internet Security Threat Report determined that more than 40% of businesses that became victims of cyber crime have 500 or less employees.

These attacks create huge losses, and close thousands of small businesses every year. Small companies are much less likely to stand back on their feet and become competitive again after a disastrous data breach. Same research done by Symantec also determined that more than 60% of attacked companies had to be permanently closed afterwards.

How to Prevent Cyber Attacks?
No website can be 100% secure from cyber attacks, but by introducing new security protocols and providing proper training for employees, entrepreneurs can reduce the risk of cyber attacks to minimum. These are some of the things that can be done:

  • Physical Access Control- Only authorized personnel should have the access to company computers and gadgets.
  • Employee's training- All company employees' should understand cyber security principles and know how to securely use common services that can be found online. This includes: social networks, web browsing, e mail correspondence, and SMS and text messaging, since these are some of the most frequent channels through which cyber criminals slip in malware files into company computers. Security training for employees is especially important for companies that use BYOD work model.
  • Regular System Updates- Most cyber attacks are based on exploits which are continuously scanned by automated tools. Each one of these exploits comes with a patch that is quickly released, and that can protect system from outside attacks.
  • Backup- Having few backup locations is necessary, especially for businesses that deal with sensitive information.
  • Firewall- Firewalls are the basis of almost every network security strategy. They prevent the entrance of malicious files by checking all passing data that that enters and exits the network.
  • Regular Antivirus Updates- Outdated antivirus programs are mostly useless. These programs need to be regularly updated in order to recognize and deal with the latest bugs and other malicious software.
  • Secure Wi Fi networks- Only secure Wi-Fi networks should be used, both at company premises and at home, for employees who access company networks after work. One part of employee's security training should inform employees about the dangers of non-secure Wi-Fi networks.
  • Strong and Frequently Updated Passwords- Companies should use pass phrases instead of regular passwords, and should constantly update them.
  • Remote Support- Remote support software enables security technicians and engineers to access other computers in the network and act fast in case of security breach.
  • Limiting Access to Installation Software- Only few key technician and engineers should have access to installation software, because over-exposure of these sensitive files can have disastrous consequences on company's security.
  • Emergency Protocols- Companies need to have elaborate plans that determine specific tasks that should be done in case of emergency. These protocols should define the role of every employee and minimize the consequences of cyber attacks.
  • Hire Professionals- Many small businesses decide to hire cyber security agencies for developing security strategies. Although this can be costly at first, on the long run it is much more affordable and reliable option than hiring whole team of security experts in a regular way.

Although the facts acquired by independent researchers that deal with cyber security for small businesses still sound grim, a positive trend can be observed where entrepreneurs are becoming more aware of this problem. This comes as a result of media coverage of cyber attacks on big corporate entities, as well as many informative articles and guidelines published online.

More Stories By Nate Vickery

Nate M. Vickery is a business consultant from Sydney, Australia. He has a degree in marketing and almost a decade of experience in company management through latest technology trends. Nate is also the editor-in-chief at bizzmarkblog.com.

@ThingsExpo Stories
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
"We view the cloud not as a specific technology but as a way of doing business and that way of doing business is transforming the way software, infrastructure and services are being delivered to business," explained Matthew Rosen, CEO and Director at Fusion, in this SYS-CON.tv interview at 18th Cloud Expo (http://www.CloudComputingExpo.com), held June 7-9 at the Javits Center in New York City, NY.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
Michael Maximilien, better known as max or Dr. Max, is a computer scientist with IBM. At IBM Research Triangle Park, he was a principal engineer for the worldwide industry point-of-sale standard: JavaPOS. At IBM Research, some highlights include pioneering research on semantic Web services, mashups, and cloud computing, and platform-as-a-service. He joined the IBM Cloud Labs in 2014 and works closely with Pivotal Inc., to help make the Cloud Found the best PaaS.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...