www.csoonline.com Open in urlscan Pro
151.101.194.165  Public Scan

URL: https://www.csoonline.com/article/3695593/small-and-medium-sized-businesses-don-t-give-up-on-cybersecurity.html
Submission: On May 10 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


cso online
GERMANY
 * United States
 * ASEAN
 * Australia
 * India
 * United Kingdom
 * Germany


×

search
 

More from the Foundry Network

 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * How to survive below the cybersecurity poverty line
 * RELATED STORIES
 * UK NCSC launches new tools to help small businesses tackle cybersecurity
   issues
 * SPONSORED BY Advertiser Name Here Sponsored item title goes here as designed
 * Why reporting an incident only makes the cybersecurity community stronger
 * Siemens focuses on zero trust, legacy hardware, supply chain challenges to...

 * Home
 * Industry
 * Business

Opinion


SMALL- AND MEDIUM-SIZED BUSINESSES: DON’T GIVE UP ON CYBERSECURITY


WHEN THE FOCUS IS OFTEN ON THE BIG HACKING AND RANSOMWARE CASES INVOLVING
MULTINATIONAL COMPANIES AND GOVERNMENTS, SMALL- AND MEDIUM-SIZED BUSINESSES CAN
OFTEN FEEL LEFT BEHIND AND POWERLESS. BUT HELP IS OUT THERE.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Christopher Burgess

CSO | 9 May 2023 9:00


Fizkes / Shutterstock



In today’s increasingly hostile environment, every enterprise, be they big or
small, should be concerned about cybersecurity and have access to protection
from hackers, scammers, phishers, and all the rest of the host of bad actors who
seem to be sprouting up around the world.

Yet time and again, we see small- and medium-sized businesses (SMBs) left out in
the cold, an unaddressed market segment that finds real protection either too
expensive or far too complex to adopt. Thus, cybersecurity becomes an
“afterthought” or “add when we can” kind of service that leaves SMBs far more
vulnerable than the corporate giants — just reading the news every day shows
even they aren’t immune to ransomware, intrusions, and data theft.

It might be tempting to think that it’s too late at this point for an enterprise
with limited resources to start investing in cybersecurity — after all, if the
bug guys still get hit, what’s the point in trying to catch up?




IF YOU HAVEN’T ALREADY, START THINKING ABOUT SECURITY NOW

Actually, there are plenty of reasons to start thinking about cybersecurity
right now. The advice from industry and government to SMBs is united in this
regard and aligns with the Chinese proverb: “The best time to plant a tree was
20 years ago; the second-best time is today.”

At the recent RSA Conference, I had the occasion to speak with Candid Wüest,
vice president of cyber protection and research at Acronis, about cybersecurity
for the SMB and how a resource-strapped entity should be looking to protect
themselves. He spoke pragmatically about the situation small companies find
themselves in and suggested the following low-cost, high-return fundamental
strategies (along with the basic rubric of don’t defer, get the car moving, and
revise as you are able):

 * Maintain visibility into your network — if an SMB has one, then it is
   incumbent upon administrators to know every item touching the network.
 * Implement multifactor authentication (MFA) everywhere possible.
 * Ensure all network access is role-based — no one who doesn’t need to see a
   system should be able to touch it (again, with access granted through MFA).


VERIFY WHERE YOUR DATA IS COMING FROM

This sound advice was echoed by Utamico CTO Nils Gerhardt, who availed himself
to be interviewed during the same RSA Conference. SMBs must start somewhere, and
the first step is to implement multifactor authentication everywhere, Gerhardt
said. From the point of view of a Europe-headquartered entity, he further
recommended that companies put in place the ability to verify the provenance of
their data.



That’s just smart practice for any business, and why many countries are looking
to keep tabs on where data comes from, regulate what data should be protected,
and in some cases determine how it should be treated. Small business operators
should be aware that regulatory regimes are also for their protection, not just
the big guys — regimes such as GDPR and the European Data Act (EDA), which
details data ownership and “gives individuals and businesses more control over
their data through a reinforced data portability right, copying or transferring
data easily from across different services, where the data are generated through
smart objects, machines, and devices.”



There’s more government help available for SMBs than might be immediately
apparent. Recent United States and United Kingdom government efforts are timely
and readily available to address shortcomings and bring resources to the table
for the SMB.


US HELP FOR SMALL AND MEDIUM-SIZED BUSINESSES

The United States has created a “Small Business Cybersecurity Community of
Interest” (COI) within the rubric of the National Cybersecurity Center of
Excellence (NCCoE). The NCCoE, established in 2012, provides businesses with
practical information on securing their information technology. At the inaugural
community of interest event in March 2023, US Deputy Secretary of Commerce Don
Graves commented that: “This initiative will help to make sure that NIST’s
guidance is both meaningful and practical for smaller companies and other
organizations to put into use. Beyond benefiting the NCCoE and its participants,
this new community of interest promises to improve the return on all of NIST’s
investments in cybersecurity research, standards, guidelines, and practices.”

The NIST COI initiative is designed to get SMBs into the mix and to bring to the
forefront resources so they may become cybersecurity aware and hardened. Couple
this with the plethora of resources provided by the Cybersecurity and
Infrastructure Security Agency (CISA) and every SMB has a healthy slate of
resources to advance their knowledge considerably. Topics addressed by CISA for
the SMBs include securing supply chains and assessing vendors and vendor
security posture. 


UK HELP FOR SMALL AND MEDIUM-SIZED BUSINESSES

The UK’s National Cybersecurity Centre (NCSC) offers its own cyber action plan,
which includes a free assessment for small organizations. The online assessment
normally takes between three-to-five minutes to complete. The assessment walks
the user through a basic cyber hygiene survey. The results are analyzed
immediately, and the user is given a “personalized action plan” that the
business can do right now to heighten its cybersecurity posture as their
takeaway.

Lindy Cameron, NCSC CEO, noted that while small businesses are the backbone of
the UK economy, “we know that cybercriminals continue to view them as targets.
That’s why the NCSC has created the Cyber Action Plan and Check Your Cyber
Security to help them boost their online defenses in a matter of minutes. I
strongly encourage all small businesses to use these tools today to keep the
cybercriminals out and their operations on track.”




OTHER GOVERNMENTS OFFERING CYBER HELP FOR SMBS

The US and UK are not alone in providing sound advice and resources for smaller
enterprises. The Canadian Centre for Cyber Security has a small-business
information portal as well as offering Cybersecure Canada, a cybersecurity
certification program for small and medium-sized organizations. Australia also
has guidelines for its SMB owners.

SMBs who avail themselves of advice from industry professionals such as Gerhard
and Wüest and research the resources available to them from national and local
governments will find that they are able to achieve a modicum of cybersecurity
at little or no cost. Then, as advised, continually assess their situation, and
as able to close those gaps which carry the highest risk. The important message
is that these resources are out there to get you started, but you might have to
do a little digging to find them. It’s absolutely worth the effort.

Next read this
 * The 10 most powerful cybersecurity companies
 * 7 hot cybersecurity trends (and 2 going cold)
 * The Apache Log4j vulnerabilities: A timeline
 * Using the NIST Cybersecurity Framework to address organizational risk
 * 11 penetration testing tools the pros use

Related:
 * Business
 * Data and Information Security
 * Government

Copyright © 2023 IDG Communications, Inc.

7 hot cybersecurity trends (and 2 going cold)


CSO Online CSO provides news, analysis and research on security and risk
management Follow us
 * 
 * 
 * 
   

 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2023 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World













CSO WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS