Small businesses vulnerable to persistent breaches

Cyber security + Global news LewisR todayJuly 10, 2019 274 158 4

share close

Unfortunately, there is still a pervasive sentiment among some business owners that they don’t have enough data to warrant a security solution or that their data is unimportant to criminals. Despite current security tools and advice, small businesses continue to be especially vulnerable to long lasting breaches due to their inability to support or outsource the level of IT staffing required to run a comprehensive detection and response function, according to Cybewatch365

Dwell time remains a major problem

Researchers revealed that dwell time, the time between an attack penetrating a network’s defenses and being discovered, remains a major problem for smaller businesses.

The average dwell time for persistent malware for the small businesses inspected was 728 days, far in excess of the reported dwell times for large enterprises.

Dwell time for modern attacks that include ransomware are much lower: averaging 37 days between infection of the initial trojan and remediation due to how ransomware informs the victim.

Riskware and unwanted applications in their environment took longer than 90 days to remove. Although generally lower risk, we find networks that fail to control riskware is an indicator of lower readiness to respond to high-priority threats when they are uncovered. The dwell time for riskware was much longer for smaller businesses, averaging 754 days of dwell time.

Cyberwatch365 findings should be a wake-up call for SMBs that are overly confident in their business cybersecurity posture. The reality is that many lack the resources, technology, expertise, and visibility to protect their business, let alone their customers’ and partners’ data.

Modern cyber threats that evade legacy preventative and detection tools are a growing security gap for small businesses, many are unable to remediate the threats they do know about in a reasonable time-frame and end up spending a considerable amount of money in direct cost to remove the threats and restore operation leaving the vulnerability to surface again.




Written by: LewisR

Tagged as: , , , , , .

Rate it
Previous post

todayJuly 9, 2019

  • 349
  • 196

Ransomware LewisR

Top 10 Ransomware and Malware

TOP 10 RANSOMWARE Bad Rabbit follows the wider-reaching WannaCry and NotPetya strains of malicious code and has infected organizations primarily in Russia and Eastern Europe. Disguised as an Adobe Flash installer, Bad ...

Similar posts

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *

  • +44 (0) 203 744 7422