Five typical cybersecurity risks in SMEs

SMEs are an attractive target for cyber fraudsters. Companies are mostly aware of the dangers of cyber threats, but not all of them know about the security gaps in their own IT.

Often, security vulnerabilities in a company's own IT are unknown.
Image: ZVG / T&N

Check Point Research (CPR), the security researchers at cybersecurity specialist Check Point Software Technologies, recorded 65 percent more cyberattacks on Swiss companies last year than in the previous year. SMEs are an attractive target for cyber fraudsters. Their defense systems are usually less extensive than those of large companies and thus easier to circumvent. At the same time, the trade secrets and data of SMEs are often vital and therefore particularly valuable.

The challenge of IT security

SMEs are usually aware of the dangers of cyber threats. But in practice, it turns out that security vulnerabilities in their own corporate IT are often unknown. We have compiled five security vulnerabilities that we frequently encounter in small and medium-sized enterprises:

  1. Backup of enterprise data is insufficient. When backing up corporate data, the rule of thumb of the 3-2-1 backup strategy applies. This states: There should be at least three copies of the data. These should be backed up on two different storage media. Of these, one backup copy should be stored at an external location. External backup is neglected in many places. The problem: cyber attacks, but also power failures or elementary events can destroy even local data backups. The simplest way to outsource a backup copy is an automated backup to a service provider. It is particularly important that the external backup is separate from the company's own infrastructure and that the connection is encrypted end-to-end.
  2. Employees are not sensitized to impending cybersecurity dangers. One click on the wrong link and malware is activated ... One of the biggest security risks in the company are the users of the IT systems, i.e. the company's own employees. Sensitizing employees to cyber threats and preparing them for emergencies is now part of the mandatory program. Those who want to dispense with traditional training can make use of security awareness software. In addition to an e-learning platform, modern solutions offer the option of simulating attacks and checking the infrastructure for security gaps (penetration testing).
  3. No recovery plan exists. The IT systems fail. And now? A recovery plan documents how an organization can respond to an emergency from an organizational and technical perspective. The goal of a disaster recovery plan is to limit the damage and minimize the disruption to normal operations.
  4. Access to the IT network and Internet interfaces are not protected. Today, a firewall is part of the standard equipment of an organization. But not all firewalls are the same. An integrated intrusion detection or intrusion prevention system (IDS/IPS) is particularly important with regard to threats from the network. This monitors the network for anomalies and can detect rule violations and harmful incidents such as hacker attacks in good time.
  5. Operating systems, virus scanners and firewalls are not up to date. Maintenance work is usually not very popular. They are gladly postponed in favor of other priorities or only insufficiently done. However, serious and regular maintenance and updates are the basis for secure systems and are more important today than ever before. For example, patches are applied that close new security gaps.

IT security check uncovers vulnerabilities

It is hardly possible for smaller companies to keep up with the dynamics in the security sector. At the same time, the pressure on the security of corporate data is growing. Today, a collection of security products is no longer enough to provide all-round protection. A holistic approach is necessary. An external IT security audit helps SMEs to uncover vulnerabilities and define the protection needs of IT assets. In addition, a holistic security check shows the measures to be taken to eliminate the security gaps. It is always worthwhile to call in external experts to review your own IT security: With their expertise and an outside perspective, they create added value and close the gaps that exist in the company.

Author

Renato Casati is Co-Head of IT at T&N, a Swiss ICT service provider for IT and telecommunications solutions in the business environment.
> www.tn-ict.com

From Team Building to Tribal Journey

How do you move from transactional leadership to transformational leadership? And what role do the much-discussed values play? Three points of reference can provide answers.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Produce leather goods sustainably

The Marai brand produces elegant, high-quality bags and accessories for women and men. With sustainability specialist Nina Conrad, founder of Gutes Leder, the tannery G. Neuenschwander Söhne AG (GNS) gained a luminary in the field of sustainable leather production for Marai.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Calculate prices and promotions in omnichannel retailing

Today's customers choose the fastest and most convenient way to shop. Whether consumers order online, offline or in combination - for example via Click & Collect - no longer plays a major role. The result: stationary retail and e-commerce are merging. What challenges does this pose for everyone involved in the sales process? And how can the final price be right despite discount and couponing campaigns?

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

New chemicals in the plant? You should pay attention to this

The safe handling of hazardous substances and dangerous goods is demanding and is regulated by a large number of legal texts and guidelines. This article summarizes the most important aspects for the procurement of new chemicals. There are numerous parallels to the introduction of new employees.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Build apps and automate processes without programming knowledge

Companies can empower their IT-savvy employees in the departments to build their own apps and digitize and automate processes. Depending on the package, certain licenses are already included in Microsoft 365.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Mutual loyalty instead of bonus programs

The example of Qnamic shows how to run a company with a culture of trust. For years, this software company has hardly had any layoffs, even though more money could be earned elsewhere.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

How business-to-business sharing can be supported in a targeted way

Sharing has been growing rapidly for some time. However, there are only a few successful examples of resource sharing between companies. A research project of the University of Applied Sciences Northwestern Switzerland and the Lucerne University of Applied Sciences and Arts has investigated how sharing between companies can be supported. Methods were developed to accompany and promote business-to-business sharing.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Sustainability in the industry

Caring for the environment in a sustainable way costs money. With the exception of legal knock-out requirements and high energy costs or incentive taxes, financial viability is generally not a given. Nevertheless, social pressure is increasing and no company can afford to ignore the issue. Companies must invest in sustainability and then market what they do.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Shopping experience: shopping in two worlds

Smart changing rooms, shopping apps, click & collect or advice at the touch of a button: digital technologies and the bridge to e-commerce are making their way into local stores - and turning shopping into an experience. How retailers, customers and brands benefit.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Check the options when drawing your retirement plan

Some dream of early retirement, others can't imagine ever not working again. Before going for one option or the other, it's a good idea to examine the options. What is possible, and what can or will one afford?

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Smart with Data: Practical application of knowledge graphs

Knowledge graphs ("KG") are a technology that can contribute to the solution of some problems of enterprise-wide information and knowledge management. KG support enterprise-wide knowledge work actively and sustainably.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!
get_footer();