Contact Us      General Enquiries: +44 (0) 1273 834 000   Support / Service Desk: +44 (0) 113 360 9696

PAV IT

  • About Us
    • Careers
    • Our Green Credentials
    • Privacy Policy
  • IT Certainty
    • Legal and Accountancy
    • Manufacturing Sector
    • Retail Sector
    • Case Studies
    • Customer Testimonials
  • Services
    • Backup and Disaster Recovery
    • IT Support Monitoring
    • Project Delivery
    • Cloud Services
    • Application Packaging
    • Pavilion Service Credits
  • News & Events
    • BLOG
    • Events
    • Newsletters
    • News
  • Technology Solutions
    • Communication and Collaboration
    • Modern Workspaces
    • Data and Governance
CONTACT SALESsupport
  • Home
  • Our latest Blogs
  • Blog
  • Small Businesses are Facing Big Cybersecurity Challenges in 2021
June 25, 2022

Small Businesses are Facing Big Cybersecurity Challenges in 2021

Thursday, 25 February 2021 / Published in Blog, Cisco

Small Businesses are Facing Big Cybersecurity Challenges in 2021

blog_header_challenges_in_2021

Lots of things have changed in the past year, but one thing hasn’t changed: businesses of all sizes are vulnerable to cyberattacks. In the first half of 2020, a massive shift took place and users started working very differently. Many more are working remotely in distributed ways. At the same time, many companies started moving away from traditional desktop office software toward cloud apps and cloud data storage.

With the rapid shift to remote work, many businesses are not set up to do things securely – for instance, they may be using free or unmonitored services to share files. Or, when you’re working from home, you might also be doing things on your work computer that you maybe didn’t do before, like listening to podcasts or music, checking your personal email, and so on. Maybe a message pops up asking you to re-confirm your login and password for O365, so you enter it without thinking… and now a phishing site has your company O365 credentials.

New trends in cyberattacks

The past year also saw a shift in the patterns of cyberattacks, with more phishing attacks taking place than in prior years. It’s likely that this trend will continue into 2021. As outlined in our recent cybersecurity report, the Cisco Umbrella research team observed four major trends in cyberthreats in the second half of 2020.

Trojans and droppers are getting a second life. Instead of a simple one-step malware infection, users are getting an initial infection and then a follow-up compromise later.

More multi-stage attacks are occurring. Users are not just getting infected in one step. Attacks are often multi-staged and are spread out over many hours or days. As an example, a user might click on a link in an email that takes them to a website, which then drops malware on their machine that doesn’t act right away.

Cryptomining continues to pose a significant threat. More criminals are harvesting user resources to mine cryptocurrency, whether the operation is running in the background of websites you visit or running on your own computer.

Pandemic themed campaigns continue to escalate. Attackers are taking advantage of fear and uncertainty around the global pandemic to launch themed attacks to capture attention and take advantage of victims.

How do we know this? With the data from the Cisco Umbrella global cloud architecture, we can see if a specific threat is trending in a specific geography, industry, or organization size. We can determine what is trending, as well as what is trending with specific verticals.

Small businesses are not immune to these trends. Research indicates that 62% of small businesses have been hit by cyberattacks. It’s also very likely that small businesses have not prioritized cybersecurity in their strategic planning. Either they don’t have the funds, or don’t think they are vulnerable to attacks. But cybercriminals often start with small businesses first and then move up the chain.

You’re also more vulnerable if you’ve gone remote very recently, since attackers are aware of the chaos that can result from a quick pivot in business operations. That’s why we’ve seen an uptick in phishing attacks: it’s easier to compromise someone when they are outside of their comfort zone.

The consequences for cyberattacks can be severe – for a large company, a data breach might result in an unwelcome news story and perhaps legal action, but it could quickly result in the end of your small business. Whether it involves passwords getting stolen, financials getting compromised, reduced brand reputation, or downtime, your small business likely can’t afford a major cybersecurity incident.

Cybersecurity challenges affecting small businesses

Small businesses face key problems when tackling cybersecurity challenges.

Poor attribution: Many businesses don’t know where or how an attack starts, and it’s even worse for a small organization without a dedicated team. Did it come from an email, a password compromise, or a visit to a malicious website? To make sense of an attack, you first need to know who was hit, where, when, and how.

Gaps in visibility and coverage: With users working remotely, roaming while traveling, it’s difficult to see the complete picture of your security situation. Just because a business is smaller doesn’t necessarily mean attacks are less frequent or assets are simpler to protect.

Limited security resources: Small businesses are facing unprecedented financial strain. With even more resource limitations than usual, cybersecurity might be close to last on the list of priorities.

Too many vendors: It’s hard to stay on top of security alerts from multiple vendors. What do you do when there is an incident? How can you avoid chaos?

Your business is unique, and you need a unique security approach to match. Instead of trying to use a one-size-fits-all approach designed for a larger enterprise, you can develop a custom take what you need and leave the rest. Small businesses with limited time and resources should focus on end-to-end security that delivers the most bang for the buck and accomplishes five key tasks:

  • Protect customer business and financial data
  • Protect users on and off the network
  • Secure the network, cloud, and every endpoint
  • Keep employees connected, protected, and productive
  • Grows along with your business

By Lorraine Bellon

Original article can be found HERE

JOIN OUR LINKEDIN LIVE EVENT ON MARCH 11TH

Designing in Automation and Productivity to Support the Modern Workplace

REGISTER TO ATTEND

What you can read next

New Attack On Home Routers Sends Users To Spoofed Sites That Push
New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware
WatchGuard event
How to Mitigate Cyber Threats
How Microsoft 365 Helps Better Leeds Communities
How Microsoft 365 Helps Better Leeds Communities

Recent Posts

  • Sophos Event Blog Header

    Better cyber protection doesn’t have to cost you more

    Most campaigns that vendors / resellers run is ...
  • Cyber Insurance Blog

    Cyber insurance: there’s bad news and there’s good news

    The threat environment is more challenging than...
  • Evolving Cyberattacks header

    How Common Types of Cyberattacks are Evolving

    Cyberattacks are ever changing. Read about cybe...
  • Watchguard MFA Header

    Protecting User Identity and Securing Business Trust with Multi-Factor Authentication

    THE EVOLUTION OF AUTHENTICATION – HOW WE GOT HE...
  • CRN Nomination 2022 Header

    CRN Best Company to Work For Nomination 2022

    Why is your company such a great place to work?...

Categories

  • Applications
  • Blog
  • Cisco
  • Commvault
  • Events
  • Legal
  • Manufacturing
  • Microsoft
  • Mimecast
  • Networking
  • News
  • Newsletters
  • Other News
  • Retail
  • Sophos
  • Watchguard

pavilion logo small

A leading IT infrastructure solution and support provider that has been delivering flexible and modular solutions and consultancy to businesses across the UK since 1988.

GET IN TOUCH

  • General Enquiries: +44 (0)1273 834 000
  • Support Desk: +44 (0)1273 834 433
  • Email: info@pav.co.uk
  • PAV I.T. Services
  • The Old Corn Mill, Bullhouse Mill
  • Lee Lane, Millhouse Green
  • Sheffield S36 9NN
  • View on Google Maps
  • About Us
    • Careers
    • Our Green Credentials
    • Privacy Policy
  • IT Certainty
    • Legal and Accountancy
    • Manufacturing Sector
    • Retail Sector
    • Case Studies
    • Customer Testimonials
  • Services
    • Backup and Disaster Recovery
    • IT Support Monitoring
    • Project Delivery
    • Cloud Services
    • Application Packaging
    • Pavilion Service Credits
  • News & Events
    • BLOG
    • Events
    • Newsletters
    • News
  • Technology Solutions
    • Communication and Collaboration
    • Modern Workspaces
    • Data and Governance

Pav IT © 2022 All rights reserved.

  • GET SOCIAL
TOP