SMBs seek cyber training, support as attack risk surges – Cybersecurity Dive

Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox.

A report from Sage indicates SMBs face considerable obstacles to preventing cyberattacks when compared to larger, higher resourced enterprises.
The Sage report highlights the continued cyber risk SMBs face. These organizations often lack internal security expertise or the resources to provide full time security protections or employee training. 
In the U.S. and Canada, up to 45% of SMBs consider education and awareness as their biggest challenge, Sage CISO Gustavo Zeidan said via email. 
“This indicates that access to required skills and having adequate resources to mitigate the risks are believed to be major gaps when compared to larger organizations with dedicated cybersecurity professionals and more resources available to them,” Zeidan said via email. 
The top cyber incidents SMBs face include distributed denial-of-service attacks, data loss, ransomware and credential theft, according to the report. 
The Sage report backs up prior research released in May from Proofpoint showing SMBs were being targeted for phishing and other malicious activity from advanced persistent threat actors. These attacks often targeted managed service providers, who tend to provide cybersecurity services to SMBs. 
The study is based on 2,100 online interviews with professionals at SMBs with less than 500 employees in the U.S., U.K., France, Germany, Portugal, Spain, South Africa, Canada and Australia.
Get the free daily newsletter read by industry experts
Jen Easterly said the government cannot solve challenges posed by rising threat activity without active participation and corporate oversight from the private sector.
After months of feedback from stakeholders, the agency made changes to better align with the NIST framework and update language on MFA.
Subscribe to Cybersecurity Dive for top news, trends & analysis
Get the free daily newsletter read by industry experts
Jen Easterly said the government cannot solve challenges posed by rising threat activity without active participation and corporate oversight from the private sector.
After months of feedback from stakeholders, the agency made changes to better align with the NIST framework and update language on MFA.
The free newsletter covering the top industry headlines

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *