Your SMB Is Not Ready For A Cyberattack


A big concern for many companies is whether they would weather the considerable storm of a cyber attack. 

Cyber attacks frequently impact a company's server message block—and therefore can negatively affect an entire organization.

A server message block (SMB)—notably different than the SMB acronym that encompasses small- to medium-sized businesses—is a "network communication protocol used by Windows-based computers that allows systems within the same network to share files." SMBs allow computers to connect to a shared network and access files from other computers in the same way as if the files were on a local hard drive. 

But while SMBs are an essential feature for continuity and efficiency within a company, they may also put that company at risk of breach or malicious activity. Do you know if your company has taken steps to mitigate this risk?


FireEye Survey Reveals Majority of Companies Not Ready for a Cyber Attack

The cybersecurity company FireEye recently commissioned a survey by independent market research organization Kantar that involved more than 800 chief information security officers from North America, Asia, and Europe to inquire about these companies' readiness to respond to and protect against cyber attacks.

Among their data, the FireEye survey found that U.S.-based companies appear to be leaders in transition to cloud-based network protocols. The survey also found that:

  • More than half (51%) of CISOs surveyed did NOT feel as if their company is prepared for nor would respond effectively to a cyber security breach
  • Over a third (37%) of CISOs endorse that their companies either have untested plans, poorly updated plans, or no plans in place to adequately prepare for a cyber attack
  • Almost 40% of U.S.-based CISOs confirm that their company plans to increase their budget for cyber security and breach preparation by 10% or more in the coming fiscal year 

Clearly, cyber security is a major concern that senior-level management at multiple companies are prepared to invest considerable resources into. 

Despite this, many companies seem ill-prepared for the very real chance of a breach. Are you wondering how your company stacks up?


Is Your Organization Ready? 4 Ways to Prepare for a Cyber Attack or Information Breach

  1. Be sure you're asking the right questions—and asking them often. At least twice per year, encourage company leaders to ask investigative questions that can help identify holes in your preparedness. You may consider questions such as:
    1. What are our company's current policies surrounding cybersecurity?
    2. What are the most vulnerable breach points we have within our company? Where are we most at risk? 
    3. What are the current cybersecurity threats we may face? 
    4. What is our company's readiness and recovery plans for a cyber attack?
  2. Identify and correct your weak spots. Common vulnerable breach points include weak passwords, old or outdated technology, unencrypted data, malware exposure, human error, and (on a more macro level) lack of security culture within your organization. Be prepared to take meaningful action in order to address these weak spots, and ensure other security areas that are working remain optimized.
  3. Educate, educate, educate. Ensure that all employees within your company understand how to spot potential threats, and help them take on an ownership role in protecting your company's (and your clients') digital privacy.
  4. Build a solid response and recovery plan. It's been said that failing to plan is planning to fail. And in the case of cyber attacks and breaches, no amount of preparation can offer you 100% protection against a breach. So, be sure to have a solid plan in place that outlines what to do in the event of a breach, what systems and protocols should be activated, and when and how you should safely communicate news of the breach to your clients and/or the media.

Contact Integrity Technology Solutions today to learn about how we can help your company weather the storm of a cyber attack—or better yet, minimize your risk from coming under attack in the first place. Let our team help you keep your SMB secure.

Free Disaster Recovery eBook.

Read On