Did you know that small and medium sized businesses are the most appealing target for hackers? Small businesses have multiple points of vulnerability, making them easier to take advantage of. So although you may think hackers only go after big corporations with lots of money; that is rarely the case. Take this short quiz and find out if your business could be at risk.
1. Employees put company data at risk when doing which of the following?
- Opening infected attachments
- Clicking links embedded with spam
- Infrequently changing passwords
- All of the above
Answer: All of the above. These negligent activities by employees rank at the top of the list when when it comes to SMB security vulnerability.
2. Detection of data breaches among SMBs occurs by accident.
Answer: True. Of all SMB organizations, 65% have sensitive or confidential business information that is not encrypted or safeguarded making the work of hackers even easier going 3 to 9 months without detection (Tweet This)
3. Employees frequently store sensitive data on their unsecure mobile devices.
Answer: True. More than 50% of employees frequently or very frequently store sensitive company data on their unsecure laptops, tablets, smartphones or other mobile devices creating a 50% chance of confidential information falling into the wrong hands.
4. __________ or less of SMBs routinely back up their data.
Answer: 50%. Lack of routine data backup by SMBs combined with 1/3 operating without a disaster recovery plan means when a security breach happens, many SMBs will experience significant downtime recovering and recreating valuable data. (Tweet This!)
5. SMBs that experience security breaches jeopardize losing which of the following?
- Confidential data
- All of the above
Answer: Data breaches negatively impact the reputation of a company and its associates. The direct costs associated with reimbursement to customers, data recovery and productivity means SMBs could experience the fall out of an incident for years to come.
6. SMBs that routinely monitor and manage user privileges and entitlements are more secure.
Answer: True. One of the most important security measures a company can implement is to manage and monitor end-user privileges and entitlements, yet most do not. Additional measures include conducting employee criminal background checks, hiring IT security personnel, and enforcing IT user policies. (Tweet This)
So, how did you do? Don't panic; there are easy ways to protect your business. For starters, stress and enforce company security policies to employees. Be sure you are using effective anti-malware software that is meant for small businesses, and that you are updating it regularly. The last thing you need to worry about is a security breach; taking a few precautionary steps could save you major time and hassle later!
Written by: JD Sherry is Vice President of Technology and Solutions for Trend Micro. He is responsible for providing guidance and awareness regarding Trend Micro's entire security portfolio aimed at protecting both commercial and government cloud ecosystems.
(Image via freedigitalphotos.net)