A new report has found that despite the growing adoption of advanced cyber security tools, SMBs are still vulnerable to long-lasting security breaches compared to enterprise organizations. 

The report released by Infocyte claims SMBs are more vulnerable due to the lack of IT staff needed to detect and respond to security threats. 

Threats from April to June 2019 were analyzed, reviewing over 550,000 forensics inspections on systems across hundreds of customer networks in the mid-enterprise business sector. The results? Unsettling. 

22% of SMBs claim their networks have experienced a ransomware attack that evaded preventative security controls. Fileless malware attacks were also reported to be on the rise. 

The average attack dwell time (time between an attack penetrating a network and being discovered) for SMBs ranged from 43 to 895 days. The average dwell time for confirmed, persistent malware was 798 days. The dwell time for riskware averaged 869 days. 

Dwell time for attacks involving ransomware were significantly lower, averaging 43 days between infection and remediation due to the nature of how ransomware informs its victims. 

These figures should serve as a wake-up call for SMBs operating improper CIS Controls. At a minimum, NNT suggests implementing the first six CIS Controls - referred to as the Basic Controls - to protect your organization from the most common and devastating cyber threats. You can learn more about the basic security controls by reading our latest resource: Understanding the Basic CIS Controls - CSC 1 - 6

Join us for our upcoming webinar on CIS Control 5 - Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers - and hear from Tony Sager Senior Vice President and Chief Evangelist of Center for Internet Security and Mark Kedgley CTO of New Net Technologies as they discuss Critical Control #5 and explore an effective SecureOps strategy.

Register now for our upcoming webinar What can we learn about cybersecurity from the Death Star: CIS Control 5 Explained in 30 Minutes

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.