ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Good, the Bad and the Risky: Current State of IT Security for SMBs

The Good, the Bad and the Risky: Current State of IT Security for SMBs

Technology has revolutionized business. However, along with all the advantages and benefits technology affords us, it comes with a few risks and vulnerabilities that some businesses are still struggling to come to terms with. For example, storing records electronically makes them easier to organize and locate when they’re needed. It also makes them vulnerable to hacker and cyber-attacks. Still, most SMBs are working toward mitigating risks as opposed to abandoning the use of technology in their business operations - and a current assessment of the situation does show improvement over past years.

The following seven statistics examine the current state of IT security for SMBs, as well as why these numbers should be of importance to you and your business.

  • Only 36 percent of organizations report being fully aware of employee activity on their network.
    From terminated employees with continued access to your network to current employees spending the day on social media instead of working and even to Internet of Things devices connecting without knowledge or permission of a company, there are all types of unauthorized access that a business network has to be aware of. This study is saying that only 1/3 of companies have an idea of what is happening on their network. When it comes to network access, what you don’t know can hurt you - and cost your company money!
  • The percentage of businesses that that have at least some control over employee activity on their network grew from 62 percent in 2016 to 85 percent in 2017.
    This statistic is one of the few significant positive changes that is highlighted in this business IT risk report. SMBs are finally starting to recognize the importance of access control when it comes to IT security. The truth is, many major security breaches are caused by human error (some of it intentional) from employees who access a network or parts of a network outside of their job with malicious intent.

  • 65 percent of respondents admitted to having security incidents in 2016; the most common reasons cited were malware and human errors.
    SMBs are being targeted regularly by cyber criminals. Many of these respondents have failed to take the proper network security measures, despite a security incident. Historically, many SMBs are involved in a full-scale cyber-attack and experience loss before they fully enact and enforce network security.

  • 48 percent of organizations that have to comply with any cyber security standard still struggle to ensure continuous compliance and provide complete evidence of it to auditors.
    Certain industries require SMBs to comply with cyber security standards and regulations, regardless of their size and network security experience. Moving forward, it will be more and more common for the entries requiring compliance to request proof of compliance, including policy implementation and compliance audits. For SMBs who can’t meet these compliances, it is recommended that they contact a third party, like ClearView IT for guidance.

  • 79 percent of respondents say that detecting and mitigating human errors, both malicious or accidental is critical for reducing IT risks.
    The secret is out. Sometimes, humans make mistakes. Other times, they are just up to no-good. For example, malware may ravage a network as a result of an employee that accidently clicks on an attachment in their email. SMBs have started to acknowledge the element of risk generated on a regular base by humans. Businesses next need to take measures to mitigate the human threat with proper training of best practices, ensuring they take situationally-appropriate network security measures, and regularly update these measures to keep up with threats and risks.

These are just five of the many items that Netwrix Risk Report can tell SMBs about all of the threats that they are facing every day. For those of you who don’t have time to read IT risk reports, a partnership with ClearView IT will go a long way toward making your network and data safe - against all types of threats, including the human element.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 07 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Covid-19 Passwords Holiday Browser Managed Service Windows 10 Apps IT Support Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Internet of Things Remote Work Saving Money Operating System Government Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Gadgets Remote WiFi App Virtualization Server Spam Blockchain Mobile Device Management Bandwidth Business Technology Encryption Information Apple Employee/Employer Relationship Gmail Information Technology Office Two-factor Authentication Office 365 History Budget Big Data Access Control Data Security Wi-Fi Health Conferencing BDR Cybercrime Analytics Cost Management IT Management Training Vendor Help Desk Hacking Document Management Voice over Internet Protocol Save Money Patch Management Employer-Employee Relationship Hacker Remote Monitoring Compliance Remote Computing IBM Website Applications Legal Vulnerabilities Data storage Mobile Office Search... Best Practice Managed Services Money Data loss Retail Project Management Customer Service Alert BYOD Unified Threat Management Firewall Computing Hiring/Firing Vendor Management Outlook Augmented Reality Word Hard Drive Password Twitter Chrome Google Maps Scam Router Law Enforcement End of Support Printer VPN The Internet of Things Mobile Computing YouTube Monitoring Healthcare Update Marketing Remote Workers Running Cable Laptop Travel Windows 11 Windows 7 Virtual Reality Social Engineering Free Resource Storage Cryptocurrency Paperless Office Antivirus Black Market How To Cleaning Maintenance Sports Robot Social SaaS DDoS User Websites iPhone Meetings Mobility Education Cortana Content Filtering Data Breach Holidays Automobile Processor Processors Cooperation How To Microchip Video Conferencing Flexibility PowerPoint Administration Virtual Machines Computer Repair Tech Terms Presentation Multi-factor Authentication Specifications Professional Services Hack Identity Theft Notifications Managed IT IT Consultant Digital Unified Communications Wireless Technology Saving Time Google Docs Customer Relationship Management eWaste Co-Managed IT Bluetooth Managed Services Provider Taxes Entertainment Computers Bitcoin Distributed Denial of Service Downtime Virtual Private Network Office Tips Private Cloud Telephone Memory Safety Current Events Physical Security Virtual Desktop Experience Excel Solutions Politics Machine Learning Settings Images 101 Integration Start Menu HIPAA Display Computer Care Solid State Drive Downloads Disaster Virtual Assistant Vulnerability Employees Chromebook Software as a Service Drones Avoiding Downtime Data Protection Lithium-ion battery Equifax Windows 8 Supercomputer Entrepreneur SSID Google Calendar LiFi Health IT Media Virus Documents Tactics Development Application Hard Drive Disposal Employer/Employee Relationships Business Intelligence Relocation Username Be Proactive Displays Virtual Machine Advertising Motion Sickness Startup Optimization Tech Support Freedom of Information Comparison Reviews Work/Life Balance Google Drive Inbound Marketing Navigation 2FA Securty Addiction email scam Teamwork Knowledge Data Storage Workplace Strategies Corporate Profile Domains Mobile Security Hypervisor Legislation Employer Employee Relationship News Medical IT In Internet of Things Television User Tip Shopping Telephony Evernote Paperless Hacks Electronic Payment Network Management Network Congestion Cabling SQL Server Reliable Computing PCI DSS Writing Tablet Licensing G Suite Emails Humor Tracking Fake News Mouse Proxy Server Gig Economy VoIP Business Communications Service Level Agreement Internet Service Provider Phone System Public Speaking Computing Infrastructure Azure Scalability Streaming Media Management Regulations Compliance Smart Technology Device security Managed IT Service Web Server Wireless Headphones Memes Proactive IT Digital Payment Keyboard Microsoft Excel Administrator SharePoint Text Messaging Tech Human Resources Bring Your Own Device Going Green Net Neutrality Worker Hard Drives Business Cards intranet Error Financial Data Access Wireless IT Music Public Cloud Computer Accessories Shortcut Bookmark Risk Management Time Management Term Google Apps Download Heating/Cooling Piracy Environment Social Networking Audit Windows XP Telework Supply Chain Spyware HTML Browsers Smartwatch Nanotechnology Communitications File Sharing Microsoft 365 Botnet Google Play Rental Service Redundancy Upload Procurement Micrsooft Software License Social Network FinTech Workplace Flash Cache Data Analysis CES Telephone Systems Unified Threat Management Screen Reader IT Assessment Business Growth Workers Security Cameras Trends Supply Chain Management Mobile Technology Value Devices Cyber security CCTV Printing Customer Resource management Organization Scams Troubleshooting Fileless Malware Banking Touchscreen Staffing Smart Devices Google Wallet Tip of the week Messenger Emergency Gamification Remote Working Deep Learning IP Address Company Culture Computer Malfunction Regulations Trend Micro Telephone System AI Cables Vendor Mangement Directions Digital Security Cameras Business Metrics Backup and Disaster Recovery Electronic Health Records Hosted Solution Samsung Transportation Books Content Uninterrupted Power Supply Desktop Wasting Time Webcam Accountants eCommerce Society Modem Electronic Medical Records Point of Sale Language Business Mangement Business Owner Videos Recovery Database Surveillance Tablets Competition Reading Shortcuts Monitors Managing Costs Visible Light Communication

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?