SMEs Wake Up – You ARE the low-hanging fruit for cybercriminals

August 2024 Information Security

According to an IBM report, on average, it takes nearly 287 days to detect and contain a data breach. A lot of damage can be done in such a long period of time. For one thing, your reputation can go down the drain, along with your dream of selling this great little business it has taken you 20 years or more to build. This is according to Ethan Searle, Business Development Director, LanDynamix.


Ethan Searle

Searle says many SMEs are under the illusion that their size makes them impervious to cybercriminals. “Too often, small business owners underestimate the knowledge, skills, and ability of cybercriminals to pick the low-hanging fruit – those are the businesses that are most likely to lack cybersecurity measures, with the excuse that it is too costly for a company of their size.

“Cybercriminals today are no longer single hackers, but entire collaborative networks on a global scale. It is delusional to think these organised hackers only target large corporations with vast resources. It is never a case of the bigger the organisation, the more attractive the hit will be because the yield will be bigger. In fact, the opposite is true; smaller organisations are more vulnerable due to lack of focus and investment in protection, making them prime targets for hacking, as they require minimum effort and resources,” says Searle.

He explains how a cyber breach can have far more sinister implications for small businesses than large enterprises with greater financial reserves and investment in recovery systems. “SMEs are characteristically founded by entrepreneurs with a vision to grow their business into a saleable entity; however, a cyber breach can do irreparable damage operationally, financially, and of course, reputationally. All these impacts can be devastating to the resale value of a business. SMEs need to ask themselves if they are willing to risk this outcome.”

Digital security awareness is vital

Searle says while modern technology has enabled access to business data from anywhere, at any time, it has also vastly expanded the attack surface and presented hackers with new points of entry.

“So, you have small business owners with a limited number of employees, but all of whom have been supplied with the necessary apps and tools that enable them to perform their duties to the highest standard and with speed and ease. However, many SMEs are unaware of what is called ‘Shadow IT’, which is when employees are using tools that are not officially sanctioned by the company. These are convenient access points for cybercriminals. In addition, the proliferation of smart devices broadens the opportunity landscape even further,” notes Searle.

Don’t overlook security patching

“Security patches are defined as software and operating system updates that aim to fix security vulnerabilities in a program or product. These updates literally ‘patch’ a hole in your defence, preventing a hacker or piece of malware from exploiting a way into your network. The Ponemon Institute has reported that nearly 60% of data breaches could have been prevented by better patch management. Updating your software — whether through a rapid alert or regular software updates — can help keep your information secure against evolving threats. Remember these software updates not only help your cybersecurity, but also your compliance, and a compliant business is a far more saleable entity.

“If you are clever enough to have taken on a managed service provider (MSP), security patches are often sent as push notifications from the MSP administering your operating system, email, and web applications. One of the major advantages for small businesses who take this approach is cost, often an outsourced team suits SME budgets better than managing a full internal team – that’s even if you can find the necessary skills to do it effectively. Patching is an important practice to protect your company against malware, ransomware, and hacking attempts. A good MSP will ensure relevant patches are applied to your devices as soon as possible, thereby greatly reducing the risk to your business. A skilled MSP will deliver not only best practices in cybersecurity, but advice on the right technology solutions that will grow and secure your business and turn it into a highly saleable entity.

“If you didn’t think your ability to sell your business is intrinsically linked to your technology deployments and security practices, think again,” Searle concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...