Vulnerabilities / Threats

9/20/2017
09:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SMBs are Huge Target for Hackers: 2017 Ponemon Study

  • Negligent employees are the #1 root cause behind data breaches across North America and the UK
  • Ransomware is hitting SMBs hard with more than 50% experiencing an attack
  • Attacks are becoming costlier to businesses with damage now over $1M

Keeper Security, Inc., the world's leading password manager and secure digital vault, today announced the results of a North American and UK study analyzing the state of cybersecurity in small and medium-sized businesses (SMBs). Sponsored by Keeper Security and conducted by the Ponemon Institute, the 2017 State of SMB Cybersecurity Report involved more than 1,000 IT professionals and found that 54% of respondents said negligent employees were the root cause of a data breach.

The study found that strong passwords and biometrics continue to be an essential part of security defense. However, 59% of respondents say they do not have visibility into their employees' password practices, such as the use of unique or strong passwords and secure password sharing. Safe password policies are also not strictly enforced by companies. Only 43% of respondents have a password policy in place and 68% said they do not strictly enforce their policy or are unsure.  

"The number one greatest cyber threat to a business is their very own employees," said Darren Guccione, CEO and Co-founder of Keeper Security, Inc. "Critical data is more accessible via mobile devices in our 24/7-connected, device-filled world. In fact, more than 50% of U.S. companies' sensitive data can be accessed via an employee's smartphone or tablet. Poor password policies, the rise of mobile-targeted attacks and the influx of Internet of Things devices in the workplace is a recipe for disaster. The best way to reduce these risks is through software that can lock an employee's device and at the same time, protect their passwords and other sensitive digital assets via a ubiquitous digital vault."

The risk of a cyber attack is increasing for companies of all sizes and industries when compared to last year. More than 61% of SMBs have been breached in the last 12 months vs 55% in 2016. The quantity of stolen data in an average breach nearly doubled to 9,350 records from 2016's average of 5,079 records. Internet of Things devices also stress SMB organizations with 67% very concerned about the impact of these devices in their office. More than half of respondents (56%) believe IoT and mobile devices are the most vulnerable endpoint their organization's networks.

The most prevalent attack vectors against smaller businesses were phishing/social engineering (48% of respondents) and web-based ( 43%). More respondents this year stated their organization had a phishing/social engineering attack, which coincides with the number of ransomware attacks their companies experienced.

The rise of ransomware is hitting SMBs hard. This year, more than half (51% of respondents) experienced either an unsuccessful or successful ransomware attack within the past 3 months to more than 12 months. Further, 53% of the 51% had more than one ransomware attack during this period. 79% said the ransomware was unleashed through a phishing/social engineering attack.

"We were alarmed to find that small and mid-sized businesses are becoming a huge target for hackers," said Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. "As both frequency and size of data breaches increases, SMBs must face the reality that a material adverse financial impact on their business is a real possibility. Attacks are becoming more costly with the average cost due to damage or theft of IT assets and infrastructure now exceeding $1,000,000. The average cost due to disruption to normal operations also increased to over $1,000,000 compared to the 2016 report. One cyber incident could very well put a small company out of business."

The complete study can be accessed at the following link: https://keepersecurity.com/2017-State-Cybersecurity-Small-Medium-Businesses-SMB.html

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.