Breach Detection BREACH DETECTION

While corporations and major enterprises are often the primary targets for hackers, small and medium-sized businesses (SMES) need not forget that they could soon next.

A survey conducted by Versasec found that company size and maturity level correlate with security readiness, with SMEs falling several steps behind that of their counterparts.  

The reasons these businesses are dragging their feet may be because SMEs have not traditionally been the ideal targets for hackers, or because they face less pressure than their public company counterparts, leaving them able to push the issue of security under to rug.

In the wake of numerous corporate breaches like that of Target and Home Depot, public companies have invested heavily in security solutions like File Integrity Monitoring, Change and Configuration Management, System Hardening and Vulnerability Management. Hackers have begun to realize how unprepared SMEs are to prevent or detect a breach and have become an easy target for online criminals.

According to the Versasec survey, mobility (43%), cloud usage (32%), and external devices (22%) pose the greatest security threat against their organization. Network Security was also a key issue among respondents, with nearly 74 percent claiming that’s their organization's main security focused effort for 2016. Respondents also claimed that 37% of security efforts this year are being focused on the arena of cyber security.

While many individuals were quick to admit their security pitfalls, many feel they are not ready to invest in fixing these issues. 40 percent of those surveyed stated that nearly 0 to 10% of their IT budgets are allocated for security needs, and approximately 36 percent said security spending this year would consume only 10 to 25% of their budget.

SMEs need to take the steps necessary to protect their assets against cyber threats using a layered approach to IT security. Truly layered security requires a mixture of preventative security – vulnerability management with breach detection- real-time file integrity monitoring. Integration is also key in enhancing the ease of use and cost of operation. For example, automatically leveraging threat intelligence to expose breach activity when it happens.

 

 

Read this article on Business Wire

NNT Products
USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
UK Office
New Net Technologies LLC
Rivers Lodge
West Common
Harpenden
Hertfordshire
AL5 2JN

Tel: 01582 287310
email UKinfo@nntws.com
Connect
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500 Sans Institute
Copyright 2017, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.