• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Small Companies Often in the Dark About Cyberattacks

October 17, 2017 by Elizabeth V Calise 4 Comments

Almost 60% of small businesses have been victims of a cyberattack in the past year; however, most them were not aware they were attacked. Nationwide conducted its third annual survey which included over 1,000 businesses with fewer than 300 employees for the study. 58% of participating companies were victims of a cyberattack. The types of attacks ranged from phishing scams to ransomware. Companies who are targeted tend to have fewer cyberdefense systems, lower budget for threat protection and less name recognition. The most common forms of attack were computer viruses (36%), phishing attacks (29%) and Trojan horses (13%). Many of these companies were not prepared for any type of cyberattack. Around 58% of the firms do not have a dedicated team or vendor to monitor for cyberattacks. 76% did not have a plan action for when an attack takes place, 57% did not have plan for protecting employee data and 54% did not have a plan for protecting customer/client data. Recovery was slow and expensive for these companies. Around 20% of the companies spent about $50,000 and recovery took over six months. Additionally, 7% spent over $100,000 and recovery took over a year.

https://www.technewsworld.com/story/84865.html

Filed Under: Week 07: NetCat and HellCat Tagged With:

Reader Interactions

Comments

  1. Jonathan Duani says

    October 17, 2017 at 5:57 pm

    Really interesting article. I think this is a real problem and we are going to be seeing it more and more moving forward. I think it comes form they simply do now have the money to properly keep up with cost of cyber security.

    Log in to Reply
  2. Donald Hoxhaj says

    October 22, 2017 at 3:06 pm

    Elizabeth – Your response to Cyber-attacks on SMEs is quite interesting to read. I have to agree that SMEs definitely face a lot of challenges because of lack of resources, poor understanding of cyber security threats, and lack of capital to invest in such measures. One interesting aspect that I found in your response is the fact that the recovery is slow and expensive. This is an important point that you made because if recovery is costly, then it puts SMEs again into problems because they cannot afford enough to implement anti-malware solutions quickly. This not only affects their capital expenditure, but also the operations on the whole.

    Log in to Reply
  3. Younes Khantouri says

    November 8, 2017 at 6:42 pm

    Elizabeth,
    Sharing this type of articles is very important to educate people and small companies to think more about creating their own IT security departments that would be in charge of educating employees and protecting their IT infrastructures. I believe these types of articles give a strong sign to these small companies to think seriously about security by hiring more IT people and define a good budget to run these security departments. These companies don’t really work hard enough to secure there IT departments, especially if they are small.

    Log in to Reply
  4. Ronghui Zhan says

    December 1, 2017 at 4:27 pm

    For an extreme example, an usual startup company, what is priority for them? Growing up their business, they must put resource on their priority. Data presented above only make statistical sense. There are countless small business. What makes them think they will be attacked? For bad guys, how come do they find out those nameless company? Do you think someone outside of company or someone inside of company has higher possibility find out the weakness of company?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in