Cisco's Paul Barbosa outlines the key takeaways and surprises from the 2018 SMB Cybersecurity Report
October 1, 2018
More than half of all cyberattacks result in financial damages over $500,000, including lost revenue, customers, opportunities and out-of-pocket costs. That’s enough to put an unprepared small- to mid-sized business out of operation.
More than 80 percent of organizations that have been impacted by a data breach have introduced a new security framework and 79 percent have reduced employee access to customer data, according to new benchmark data.
You may be already planning your 2018 budget, and a new or expanded security operations center (SOC) could be high on the list. New data shows that almost one in three organizations have their sights on having a leading SOC within three years, up from one in seven today. How should you invest? How should you measure impact?
There is a world of difference between knowing the right thing to do and actually following through and doing it. Think about doctors who repeatedly remind their patients to quit smoking, or to be careful with their cholesterol, to get regular exercise and adopt healthier eating habits instead of eating bacon with every meal. We know what we should do. Quite often, though, that knowledge is not enough to actually change our behavior.
When it comes to potential cyberattacks, the Boy Scouts’ motto says it all: “Be prepared.” In other words, make sure you’re always in a state of readiness. This is especially true when you’re talking about installing multi-component security solutions.
Whether it’s done to meet compliance requirements or just as a general best practice, most organizations are now testing their own networks for security weaknesses, and if they’re not, they should be. The many different types of tests can be confusing for the uninitiated; we will take a look at the common types with their strengths and weaknesses.
In order to help enterprise cybersecurity leaders reduce the amount of time spent integrating threat management and monitoring solutions, this solution provides application testing to add proven tool options to IntellaStore II for security, analysis, forensics, or network and application performance monitoring.
Our special report this month features 26 security leaders who are changing the industry, inspiring many and leading with innovation. Security experts discuss the CCPA, public-private relationships, mobile device security and how aware employees can mitigate active shooter events and workplace violence.