McAfee and Office Depot study indicates dissonance between respondents' perception and reality McAfee says that SMBs are suffering from a false sense of security, basing their claims on a recent study conducted with Office Depot. Those who took part in the study showed a high degree of confidence that their data and devices were safe from attackers, despite industry research and evidence that proves otherwise.[Security spending continues to run a step behind the threats]McAfee’s claims come from the 1,000 SMBs participated in the Office Depot Small Business Index in September. According to the data, 66 percent of the SMB owners who took part were confident that their data and devices were secure and safe from criminal hackers, with 77 percent reporting that their organizations have never been attacked.According to the 2013 Verizon Business Data Breach Investigations Report (DBIR), 40 percent of the incidents examined involved businesses with less than 1,000 employees, and a majority of them were in the retail or food service industry.When asked for details, 80 percent of the respondents to Office Depot’s survey admitted to not using data protection. Only about half of them confirmed that they’re using email and Internet security measures. And almost all of them — 91 percent — said they don’t use endpoint or mobile device security. Yet, the frightening admission comes from the 14 percent of SMB owners who said they haven’t implemented security measures of any kind in their environment. “A business that doesn’t have any security measures in place is putting their data and customers’ trust in jeopardy. As enterprises have increased their security defenses, hackers have started to target their attacks downstream to SMBs,” said Bill Rielly, senior vice president of SMB at McAfee.As incident research gets stronger, organizations are waking-up to the fact that single sets of best practices cannot be applied to businesses of all sizes, across industries of all types. Criminals have long targeted the low-hanging fruit, and over the last few years, SMBs have filled that role. But while having no security at all is a step backwards, unless the solution is geared towards the organization’s goals and needs, designing and implementing a defensive posture can become a costly, daunting task. In fact, Verizon makes note of this in their most recent DBIR. “Any attempt to enforce a one-size-fits-all approach to securing our assets may result in leaving some organizations under-protected from targeted attacks while others potentially over-spend on defending against simpler opportunistic attacks,” the report explains.As an example, the report notes that businesses in the retail and food service sectors should focus on the basics as attackers routinely target poorly configured remote administration services and POS systems, but the basics are not enough for the finance and insurance sectors that have to contend with physical attacks as well as those aimed at critical Web applications and services.Organizations in the engineering, manufacturing, IT services, and consulting sectors also have a different set of issues to deal with, because they face an entirely different set of attacks aimed at exploiting human weaknesses (social engineering).[Why mere compliance increases risk]“Cyber attacks on small businesses rarely make headlines, so it is easy for these business owners to be lulled into a false sense of security, as indicated in this survey. It is especially important for small business owners to secure their systems, as they may not have the resources to survive a cyber attack, unlike a large corporation,” Congressman Chris Collins (R-NY-27), said in a statement. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe