{"id":1951,"date":"2019-09-13T05:42:10","date_gmt":"2019-09-13T05:42:10","guid":{"rendered":"http:\/\/kusuaks7\/?p=1556"},"modified":"2024-04-08T10:40:58","modified_gmt":"2024-04-08T10:40:58","slug":"fifteen-small-business-cyber-security-statistics-that-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/fifteen-small-business-cyber-security-statistics-that-you-need-to-know\/","title":{"rendered":"Fifteen Small Business Cyber Security Statistics That You Need to Know"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1951\" class=\"elementor elementor-1951\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-36e94a6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36e94a6a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-187cc2ae\" data-id=\"187cc2ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01d2a93 elementor-widget elementor-widget-heading\" data-id=\"01d2a93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3 style=\"color: #aaa;font-style: italic\">Small businesses are a favorite target of cyber criminals \u2014 cyber attacks were up 424% in 2018<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f051bd elementor-widget elementor-widget-text-editor\" data-id=\"4f051bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYou may have heard the oft-quoted small business cyber security statistic that\u2019s something akin to \u201c60% of small companies that suffer a cyber attack are out of business within six months.\u201d Heck, like many major media outlets, we\u2019ve even quoted this stat ourselves in the past. However, it turns out that the organization that\u2019s often attributed for this small business cyber security statistic, the National Cyber Security Alliance (NCSA), actually recommends not citing this statistic for the following reason:\n<blockquote>\u201c<em>This statistic was not generated from NCSA research, and we cannot verify its original source. NCSA has not actively referenced this statistic for several years, but we discovered that it was included in an outdated infographic on our website. We have removed all of these references and do not recommend its ongoing usage. Members of the media, policy makers, small businesses and others are encouraged to rely upon more current and clearly sourced data<\/em>.\u201d<\/blockquote>\nWell, that\u2019s a bummer, right?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d661c67 elementor-widget elementor-widget-text-editor\" data-id=\"d661c67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile we here at Hashed Out may not be the internet\u2019s top resource for cyber security related information \u2013 though we strive to be and have more than two million readers \u2013 we still want to do the best job we can at providing you with the best and most useful information possible. This includes topics such as small business cyber security statistics.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73d1abd elementor-widget elementor-widget-text-editor\" data-id=\"73d1abd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWith this in mind, we\u2019ve put together a list of some of the small business cyber security statistics you SHOULD know in one convenient resource. We\u2019ll also discuss why SMBs make such attractive targets and what you can do to protect your business. Note: This article is one that we plan to continually update with new, fresh SMB cyber security statistics, so be sure to check back periodically for updates and new information!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdbf4e3 elementor-widget elementor-widget-text-editor\" data-id=\"bdbf4e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnyhow, as we like to say around here\u2026\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f905fc elementor-widget elementor-widget-text-editor\" data-id=\"2f905fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLet\u2019s hash it out.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da0a849 elementor-widget elementor-widget-heading\" data-id=\"da0a849\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>The Top Small Business Cyber Security Statistics<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18bc64c elementor-widget elementor-widget-text-editor\" data-id=\"18bc64c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen we originally wrote this article, we shared about a 2017 study from VIPRE Security that showed two-thirds (66%) of small and medium-sized businesses would suffer catastrophic consequences and would have to close their doors after a breach. Their survey of 250 SMBs\u2019 IT managers conveyed that the businesses would shut down for a minimum of one day or would be put out of business entirely if such an event were to occur.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7a4958 elementor-widget elementor-widget-image\" data-id=\"d7a4958\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Closed-300x243.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82d1d05 elementor-widget elementor-widget-text-editor\" data-id=\"82d1d05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile we hoped that our research on small business cyber security related stats would show that this number decreased over the past two years, unfortunately, that\u2019s not really the case. We\u2019ve compiled a list and will discuss some of the cyber security statistics you\u2019ll want to know about small businesses and mid-size companies:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a0863 elementor-widget elementor-widget-heading\" data-id=\"a5a0863\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>1. 43% of All Data Breaches Target SMBs<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47e73c9 elementor-widget elementor-widget-text-editor\" data-id=\"47e73c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tVerizon\u2019s most recent Data Breach Investigation Report (DBIR) shows that almost half of all breaches occurred at small businesses. This statistic speaks for itself and doesn\u2019t require more of an explanation.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f5fc81 elementor-widget elementor-widget-image\" data-id=\"5f5fc81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/SMB-target-300x300.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f21cf7a elementor-widget elementor-widget-text-editor\" data-id=\"f21cf7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nVerizon\u2019s most recent Data Breach Investigation Report (DBIR) shows that almost half of all breaches occurred at small businesses. This statistic speaks for itself and doesn\u2019t require more of an explanation.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-648e183 elementor-widget elementor-widget-heading\" data-id=\"648e183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>2. There Was a 424% Increase in Authentic and New Breaches of Small Businesses in 2018<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a380c elementor-widget elementor-widget-text-editor\" data-id=\"42a380c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe cyber security firm 4iQ states in its 2019 Identity Breach Report that cybercriminals targeted small businesses with cyber attacks at an inordinate rate in 2018 \u2014 up nearly 425% over the previous year.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aaa225 elementor-widget elementor-widget-heading\" data-id=\"2aaa225\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>3. 83% of SMBs Lack the Funds to Deal with the Repercussions of a Cyber Attack<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8359f2 elementor-widget elementor-widget-text-editor\" data-id=\"f8359f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInsuranceBee\u2019s Cyber Survey of more than 1,300 SMB owners shows that more than 80% of businesses lack the money they would need to recover from a cyber attack or data breach. Of those that report setting money aside for such an incident (17%), few have considered the reputational or legal costs they will likely face if an attack should occur. That\u2019ll take the buzz out of any victory they may have momentarily felt.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cd6317 elementor-widget elementor-widget-heading\" data-id=\"6cd6317\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>4. The Average Cyber Attack Carries a Price Tag of Nearly $3 Million<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21e287f elementor-widget elementor-widget-image\" data-id=\"21e287f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Pricetag-300x300.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b16f78 elementor-widget elementor-widget-text-editor\" data-id=\"7b16f78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen it comes to calculating the costs of a cyber attack, there are many considerations you must take into account: The cost of any ransom you may be expected to pay, the cost of any data that may be lost, sustained system outages, downtime, non-compliance fines, legal fees \u2013 not to mention potential lawsuits. The Keeper Security and the Ponemon Institute\u2019s 2018 State of Cybersecurity in Small &amp; Medium Size Businesses report states that downtime accounts for about $1.56 million of those costs.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ee1591 elementor-widget elementor-widget-text-editor\" data-id=\"2ee1591\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor an example of the \u201cextra\u201d costs businesses face, look no further than the recent AMCA data breach. The company, which also operates as Retrieval-Masters Creditors Bureau, Inc., has paid millions in such \u201cadditional\u201d costs \u2014 $4.2 million to report the breach, $3.8 million for notifications, etc. That\u2019s before getting into the penalties and lawsuits\u2026\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-662dd06 elementor-widget elementor-widget-heading\" data-id=\"662dd06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>5. SMBs Experience 8+ Hours of Downtime During a Breach<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49e9380 elementor-widget elementor-widget-text-editor\" data-id=\"49e9380\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCisco\u2019s 2018 Security Capabilities Benchmark Study shows that 40% of midmarket companies with 250-499 employees \u201cexperienced eight hours or more of system downtime due to a severe security breach in the past year.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d976f9 elementor-widget elementor-widget-heading\" data-id=\"0d976f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>6. 1 in 323 Emails to Small Businesses are Malicious<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1dbde1 elementor-widget elementor-widget-text-editor\" data-id=\"e1dbde1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSymantec\u2019s 2019 Internet Security Threat Report shows that employees of smaller organizations were more likely to be hit by email threats such as spam, phishing, and email malware than those who work at large organizations.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd18a66 elementor-widget elementor-widget-heading\" data-id=\"dd18a66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>7. 60% of SMBs Cite Employee Negligence as Cause of Data Breaches<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ddb2a8 elementor-widget elementor-widget-image\" data-id=\"7ddb2a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Negligence-300x155.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcde73 elementor-widget elementor-widget-text-editor\" data-id=\"fdcde73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Keeper Security\/Ponemon Institute\u2019s small and medium size businesses report shows the number of SMBs reporting negligent employees and contractors as the cause of data breaches increased to 60% in 2018 \u2014 whereas external threats (hackers) were reported as 37% of the causes.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-311341d elementor-widget elementor-widget-heading\" data-id=\"311341d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>8. 54% of SMBs Believe Their Companies are \u201cToo Small\u201d to Be Ransomware Targets<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7113097 elementor-widget elementor-widget-text-editor\" data-id=\"7113097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Keeper Security\/Ponemon Institute SMB report shows that some SMBs think that their organizations are too small to be attractive targets for cybercriminals. However, if you\u2019ve read virtually any recent cyber security reports or literature, you\u2019d know that no company is \u201ctoo small\u201d or \u201ctoo large\u201d that a cybercriminal won\u2019t take an interest. Like a modern version of Goldilocks \u2014 you know, if she was a cybercriminal rather than a trespasser breaking into bears\u2019 houses \u2014 she\u2019ll have no problems about trying the cyber defenses of every company to find a target that is \u201cjust right.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d376f0c elementor-widget elementor-widget-heading\" data-id=\"d376f0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>9. 77% of SMBs Anticipate Outsourcing Cyber Security<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b6b6e elementor-widget elementor-widget-text-editor\" data-id=\"a3b6b6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tContinuum reports in its State of SMB Cyber Security in 2019 report that nearly 80% of small businesses believe their cyber security tasks will be outsourced within five years\u2019 time.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f891811 elementor-widget elementor-widget-heading\" data-id=\"f891811\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h4>10. 62% of SMBs Lack the In-House Skills to Handle Cyber Security<\/h4>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8eb7dba elementor-widget elementor-widget-image\" data-id=\"8eb7dba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Huh-300x300.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b163da0 elementor-widget elementor-widget-text-editor\" data-id=\"b163da0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs disconcerting as it may be, it isn\u2019t surprising that many small businesses lack the in-house personnel. However, this is a practice that needs to stop considering that attacks on small businesses are the most common. Continuum\u2019s 2019 small business cyber security report shares that nearly two-thirds of SMBs say they don\u2019t have the employees to handle cyber security functions, and 56% report that they don\u2019t have any cyber security experts within their ranks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5464854 elementor-widget elementor-widget-heading\" data-id=\"5464854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h4>11. 62% of Phishing Simulations Hook at Least One Set of User Credentials<\/h4>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb5b243 elementor-widget elementor-widget-text-editor\" data-id=\"fb5b243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDuo\u2019s research shows that more than half of phishing campaigns resulted in at least one set of user credentials becoming exposed. Furthermore, the same study showed that 64% of phishing campaigns involved at least one out-of-date device.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d498a4 elementor-widget elementor-widget-heading\" data-id=\"8d498a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>12. Small Businesses Invest Less Than $500 Per Year in Cyber Security Products<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b46828 elementor-widget elementor-widget-image\" data-id=\"6b46828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/SMB-Budget-300x200.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c09696 elementor-widget elementor-widget-text-editor\" data-id=\"7c09696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis devastatingly low number is the average amount that Juniper Research\u2019s 2018 study says that small businesses spend on consumer-grade cyber security products each year. Considering that SMBs represent only 13% of the cyber security market, it\u2019s no surprise that small businesses make such an attractive target to cybercriminals.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81b7a03 elementor-widget elementor-widget-heading\" data-id=\"81b7a03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>13. 55% of Small Businesses Cite Resources and Knowledge as Challenges to Cyber Security Planning<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7575d71 elementor-widget elementor-widget-text-editor\" data-id=\"7575d71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA survey by the Better Business Bureau (BBB) indicates that the greatest challenges for developing a cyber security plan to increase small business cyber security is a lack of resources or knowledge.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2042c4 elementor-widget elementor-widget-heading\" data-id=\"d2042c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">14. Cyber Attacks Due to Weak or Stolen Employee Passwords Average $383,365\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1c298e elementor-widget elementor-widget-text-editor\" data-id=\"d1c298e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDid you know that the average cost of cyber attacks that result from compromised employee passwords is $383,365? This is one of the findings of the Keeper Security\/Ponemon Institute SMB report.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f49aab elementor-widget elementor-widget-heading\" data-id=\"5f49aab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>15. 68% of Small Businesses Don\u2019t Have Disaster Recovery in Mind<\/h4>\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dffee2 elementor-widget elementor-widget-image\" data-id=\"9dffee2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Recovery-Plan-2-300x300.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0d23e0 elementor-widget elementor-widget-text-editor\" data-id=\"a0d23e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNationwide reports that more than two-thirds of small business owners don\u2019t have a disaster recovery (DR) plan in place. Additionally, the report shows that 71% of small business owners choose not to buy business interruption insurance.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09accd7 elementor-widget elementor-widget-heading\" data-id=\"09accd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Why SMBs are More Vulnerable to Cyber Attacks and Data Breaches<\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b08bd63 elementor-widget elementor-widget-text-editor\" data-id=\"b08bd63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUnfortunately for consumers, many business owners still convince themselves that their businesses are \u201ctoo small\u201d to be of interest to hackers. CPO Magazine reports that this is even the case with some businesses that experienced data breaches in the past!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6485cfb elementor-widget elementor-widget-text-editor\" data-id=\"6485cfb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn reality, it should come as no surprise that small and midsize businesses make tempting targets for cybercriminals. Due to their small sizes and limited funds, SMBs often have access to fewer personnel and information and technology resources than their larger corporate counterparts. This is particularly important considering that small businesses are the drivers of economy in the U.S. The most recent data from the U.S. Small Business Administration (SBA) reports that there were 30.2 million businesses in the U.S. as of 2015. Of these, 5.9 million had paid employees.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea88167 elementor-widget elementor-widget-image\" data-id=\"ea88167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/SMBs-300x300.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-200b4f8 elementor-widget elementor-widget-text-editor\" data-id=\"200b4f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs a small company with more than 85 employees, we\u2019re certainly not going to sit here and bash the people who work at small businesses by saying that employees are the root of all evil. However, there is truth in the statement that employees do pose a serious risk for every business \u2014 small or otherwise \u2014 because of the decisions that are made by upper level management. Employees who lack the knowledge or training to avoid cyber threats are in positions to unwittingly put your company at risk by something as simple as clicking on the link in one phishing email. However, if IT security personnel and other employees alike are never given the training, funding, or resources they need, how can we hold them at fault?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb1223 elementor-widget elementor-widget-heading\" data-id=\"5cb1223\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>How You Can Protect Your Small Business from SMB Cyber Security Attacks<\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddcaa74 elementor-widget elementor-widget-text-editor\" data-id=\"ddcaa74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSSL only secures certain attack vectors. As such, you\u2019ll need to invest in additional security measures to increase the digital security of your small or medium-sized business.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18e9d13 elementor-widget elementor-widget-text-editor\" data-id=\"18e9d13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>Firewalls, antivirus, and endpoint security solutions<\/li>\n \t<li>Network penetration testing<\/li>\n \t<li>Establish computer use, device, and password policies<\/li>\n \t<li>Implement access management<\/li>\n \t<li>Email security solutions (such as anti-phishing solutions, spam filters, email signing certificates)<\/li>\n \t<li>Employee cyber security awareness training and phishing simulations<\/li>\n \t<li>Create an incident response and disaster recovery plan<\/li>\n \t<li>Create and maintain data backups regularly<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5631b72 elementor-widget elementor-widget-heading\" data-id=\"5631b72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>TL;DR?<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b4f1ba elementor-widget elementor-widget-text-editor\" data-id=\"9b4f1ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWe know you\u2019ve already got a lot on your plate and probably don\u2019t have time to read a long article. Here\u2019s what we covered in today\u2019s discussion on small business cyber security statistics:\n<ul>\n \t<li>VIPRE reported in 2017 that 66% of SMBs would close their doors if hit by a data breach.<\/li>\n \t<li>The majority of surveyed SMBs experience at least 8 hours of downtime during a breach.<\/li>\n \t<li>You need security beyond just SSL \u2013 this should include the use of firewalls, email security protections, secure CDNs, two-factor authentication (2FA), and endpoint security.<\/li>\n \t<li>Ensure all software, hardware, servers, and other devices are up to date.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Small businesses are a favorite target of cyber criminals \u2014 cyber attacks were up 424% in 2018 You may have heard the oft-quoted small business cyber security statistic that\u2019s something akin to \u201c60% of small companies that suffer a cyber attack are out of business within six months.\u201d Heck, like many major media outlets, we\u2019ve<\/p>\n","protected":false},"author":602,"featured_media":3941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3308],"class_list":["post-1951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3308,"user_id":602,"is_guest":0,"slug":"casey-crane","display_name":"Casey Crane","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_62b93d4d-9128-4c88-bf3a-1ca52c8ea99f-150x150.jpg","user_url":"https:\/\/www.thesslstore.com\/","last_name":"Crane","first_name":"Casey","job_title":"","description":"Casey Crane is Cybersecurity Journalist and SEO Content Manager at The SSL Store\u2122. She is a regular contributor to Hashed Out and Infosec Insights with experience in journalism and writing, including crime analysis and IT security."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/602"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1951"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1951\/revisions"}],"predecessor-version":[{"id":36593,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1951\/revisions\/36593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3941"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1951"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}