SMEs need a different approach to cyber security

1 October 2019 Information Security

Even though the small to medium enterprise (SME) segment is the lifeblood of South Africa’s economy, not enough is being done to educate business owners about the importance of cybersecurity. This is especially relevant when safeguarding the perimeter from compromises that can put the entire organisation at risk.

The statistics make for grim reading.

A company will be down for at least 14 days a year while trying to restore its systems following a cyberattack. Almost half of all firewalls are provisioned with the wrong rules sets, rendering the network vulnerable to a ransomware attack that, on average, demands R 200 000. And of those organisations that decide not to pay it, 70% will close within six months. And if that is not bad enough, half of all businesses do not even have a backup or disaster recovery plan in place.

Clearly, there is significant potential in the SME market to drive cybersecurity growth. However, smaller companies require a different approach to how vendors position solutions for enterprises. For one, more aggressive price points are needed as SMEs are beholden to cash flow and cannot afford enterprise-class offerings. For these owners, it is less about the value-adds cybersecurity can provide and more about working as effectively as possible to protect their data.


Craig Freer, Vox

Integrated protection

Not many small business owners understand (or even care) what phishing, 419 scams, and the like are. They are so focused on delivering on their business needs, that these security concerns often fall by the wayside. This means a 360-degree approach is required that offers protection across all touch points so decision-makers can drive the strategic requirements of the company.

Such an approach starts at the perimeter where an SME must implement an effective firewall solution that offers the appropriate level of ransomware protection. Furthermore, it must integrate with a backup plan that enables the business to restore documents if the worst should happen and ransomware does get through.

Even then, the best firewall in the world will be useless if it is not provisioned properly. This is where a trusted partner becomes vital as it will guide the SME on how best to integrate the firewall if it is not going to become a glorified router.

Unfortunately, many leave this until it is too late. Once a business is hit by ransomware, there is very little to be done for them. It then revolves around damage control and trying to mitigate the loss of mission-critical data in ways that do not force the SME to close its doors a few months down the line.

At your service

With more than 380 000 new threats emerging daily, it is imperative to have a strong firewall capable of protecting the peripheral of the network. Using infrastructure-as-a-service as a foundation, the SME can apply policies and protection where they are needed most. However, this must be continually managed if it is to deliver permanent protection.

This is where managed services become critical for an SME. The service provider can make changes on-demand, perform ongoing health checks, provide reports, and even perform quarterly assessments as part of the firewall offering at a price point the SME can afford.

The digital world of business needs a different way of addressing cyber security concerns. And given how the cloud is permeating everything SMEs are doing, this makes it the ideal platform to drive more sophisticated defences that can be part of a managed offering.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.