SMBs Remain a Focus of Cyber Attacks in 2018



smb-cyber-attack-statistics-2018-1With a majority of SMBs experiencing an increase in attack frequency and sophistication in 2018, cybersecurity efforts need to be a primary emphasis for IT teams in the SMB.

SMB cybersecurity is constantly being characterized as being underprepared, citing a lack of funding, expertise, and executive support. New data from endpoint protection vendor Barkly points to the SMB being a bigger target for cybercriminals.

In a recent survey of 100 IT pros in the SMB, Barkly uncovered the following:

  • 57% of SMBs reported an increase in attack volume over the past 12 months
  • Two-thirds reported an increase in attack sophistication
  • Only 36% of SMBs expect their security budget to increase in 2019

This is certainly disturbing. SMBs that fall into my previous characterization are ripe to become a victim of a cyberattack. Barkly also provided the top five most frequent attack types on the SMB:

  • Attacks abusing Microsoft Office programs
  • Attacks installing cryptominers
  • Ransomware attacks
  • Attacks abusing other legitimate Windows applications (e.g., PowerShell)
  • Attacks utilizing worming/lateral movement components

This specific attack data gives SMBs real insight into where they need to place their security focus. By working backwards from these kinds of attack vectors, it’s clear to see that in all these cases, the need for an attacker to compromise a user and their endpoint is necessary.

That means these attacks likely begin with phishing scams or drive-by downloads from compromised websites.

So, how can the SMB beef up security without breaking the bank?

SMBs need to look for cost-effective ways to significantly augment security. Security Awareness Training provides a 37% reduction in malware infections, requires no real IT expertise to implement, and is a cost-effect means to elevate your organization's security.


Get Your Ransomware Hostage Rescue Manual

RansomwareManual-2020-CoverThis 20-page manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with ransomware. You also get a Ransomware Attack Response Checklist and Prevention Checklist. You will learn more about:

  1. What is Ransomware?
  2. Am I Infected?
  3. I’m Infected, Now What?
  4. Protecting Yourself in the Future
  5. Resources

Don’t be taken hostage by ransomware. Download your rescue manual now! 

Get Your Manual

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://info.knowbe4.com/ransomware-hostage-rescue-manual-0

Topics: Cybersecurity

Subscribe To Our Blog


Ransomware Hostage Rescue Manual




Get the latest about social engineering

Subscribe to CyberheistNews