Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Connect Directly

The Cash Drawer Lock Box And SMB Security

Since information security first sprouted into its own industry, the small business market has been the red-headed stepchild of the newfound art.

Since information security first sprouted into its own industry, the small business market has been the red-headed stepchild of the newfound art.For years, SMBs have fallen through the cracks of good security practices, mostly due to an industry focus on big corporations, highly regulated markets, and high-risk organizations with management teams who understood the risk and could quantify the value of security solutions. Few qualified security professionals are both qualified and interested in helping these little gems of our democratic society.

When I was first approached about writing content for SMB security, my initial reaction was to say no. Why? They don't get it. I said to myself, "SMBs don't understand the value of security, and they don't have a way to pick apart the threats that apply to them and make smart decisions about the technology." While that's true in most cases, I then had a different thought: "OK, so let's change that. Let's give them the information they're missing and help." So, my friends, here I am, on Dark Reading's new SMB Security Tech Center.

If SMBs don't think about security the way enterprises do, then let's start with what these small business owners do understand about security. Take a look around a small office -- of any type -- and see what security is in place. You'll see locked exterior doors, possibly an alarm system, maybe remotely accessible cameras, and GPS tracking in company vehicles. Certainly the cash drawer is locked and counted regularly. Some offices might have gone so far as to have secured guest wireless and strong domain authentication on their servers. In the South, you may even find a firearm or two in the main office -- you know, just in case. But they'll always have that cash drawer locked.

When you ask small business owners what they're worried about and protecting against, they'll talk about burglary, vandalism, and theft of various things, including cash, electronics, materials, and vehicles. The more IT savvy of them may even note customer data. Several may also have fears of disgruntled employees. But what you probably won't hear about are worries about botnets, malware, remote attacks on their data, and compromises of their financial resources. You won't hear those concerns until something bad happens, however. I've personally been involved in consulting more than a handful of SMBs who have been the victims of massive compromises that almost put each of them out of business.

This difference between the big security mentality and the small business mentality is easy to explain. Larger organizations and SMBs differ greatly in their resources, regulations, obligations, transactions, policy, and overall mindset. I guarantee you almost all SMB owners or management teams would declare that nothing will ever happen to them because they're not big enough to target.

Enterprises with more resources better understand the risks and quite frankly, even if they don't, they're big enough fish to get caught in the nets of compliance, regulations, and audits. As far as obligations go, the larger the enterprise is, the more customers, partners, and automation it has and the bigger the threat landscape. That doesn't mean SMBs aren't susceptible to the same types of threats and attacks. The delivery method may be slightly different, but the results can be the same: devastating.

There are many great solutions for small businesses wanting to take the first steps in securing the infrastructure inside and out. For now, just keep those cash boxes locked.

Jennifer Jabbusch is a CISO and infrastructure security specialist at Carolina Advanced Digital. By day she architects enterprise security solutions and by night, well, she does the same thing. For Dark Reading, she melds her enterprise experience and intimate knowledge of small business operations to deliver relevant security guidance for SMBs everywhere. Jennifer Minella is VP of Engineering and consulting CISO at Carolina Advanced Digital, and an author, speaker and consultant for infrastructure security for government, education and Fortune 100 and 500 corporations. View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...