HOW MANY DAYS DOES IT TAKE YOU TO DETECT A CYBER ATTACK – AND AT WHAT COST?
Publication Date:03 February 2019Category:Security
INCREASINGLY SMBS ARE BECOMING THE PRELIMINARY FOCUS OF ATTACKS[I], WITH CYBERCRIMINALS VIEWING THEM AS SOFT TARGETS.
Did you know that globally there are 720 million digital hack attempts every 24 hours[i]? And that 53% of companies with up to 499 employees have experienced a breach in the last year[ii]?
It’s easy to think because you have a small-to-medium sized business cybercriminals will pass over attacking your company as there’s “not much to steal”, but in today’s digital landscape, every organisation, large or small, is at risk for an attack. And increasingly SMBs are becoming the preliminary focus of attacks[iii], with cybercriminals viewing them as soft targets that have less sophisticated security infrastructure and practices, and an inadequate number of trained personnel to manage and respond to threats.
CSO[iv] recently found that by using automated attacks, cybercriminals can breach thousands or more small businesses, making the size less of an issue than the network security. And with many SMBs insufficiently prepared for attacks, it’s no surprise that it can take on average 101 days to detect malicious activity[v].
Protection’s cheaper than the cure
Many SMBs are only beginning to realize how attractive they are to cybercriminals. Often, that realization comes too late: after an attack. Recovering from a cyber attack can be difficult and costly— if not impossible, depending on the nature and scope of the attack.
It can make running a business, especially a small-to-midsized one, a daunting prospect; our SMB survey[vi] highlighted that a third of business leaders stay up at night worrying about security of their data & IT systems. How can you arm yourself with all the tools you need to protect not only your company, but your customers too? And at what cost?
A recent study by the Better Business Bureau (BBB)[vii] helps to underscore how SMBs can struggle financially to survive following a severe cyber attack. The BBB asked small business owners in North America, “How long could your business remain profitable if you permanently lost access to essential data?” Only one-third (35%) said that they could remain profitable for more than three months. More than half reported that they would be unprofitable in under one month.
Act like an enterprise, without the overheads
It’s true – cyber attacks are costly, and getting ahead of them requires investment, both financial and resource wise. It will take time to evaluate your systems and work out what is best for you. One way to minimise the threat of cyber attacks is to avoid adding to the number of vendors you manage, and therefore the number of alerts you must respond to.
Whilst larger corporations have the time and budget available to procure the best systems, we know that SMBs don’t have the resource to find what’s best for them, let alone manage it on a daily basis. Having one integrated system reduces the challenge of having to identify what’s a real threat, and what isn’t.
Workplace Hub, an all-in-one scalable system, offers a robust and reliable infrastructure, giving SMBs a level of IT security and sophistication traditionally associated with large enterprises only. This is because Konica Minolta knows that secure data begins with secure infrastructure, and so we found the best partners to help provide world-leading security for our customers.
The silicon root of trust
Workplace Hub, in both its Hub and Edge solutions, utilise the HPE Gen10 Servers – “the World’s Most Secure Industry Standard Servers”[viii]. This bold, but backed-up, claim is founded on their unique silicon root of trust technology built into the hardware, and their belief that infrastructure should be the strongest defence.
The silicon root of trust provides a series of trusted handshakes from lowest level firmware to BIOS and software to ensure a known good state. In HPE’s unique root of trust implementation, the server essential firmware is anchored to the iLO 5 silicon—an immutable fingerprint that verifies all the firmware code is valid and uncompromised. This bond guarantees that only valid and uncompromised firmware code can boot.
Already, those cyber attacks are looking like a thing of the past…
Remember that statistic of it taking 101 days to detect a cyber attack? As part of the managed Workplace Hub support and service, we constantly monitor and update the security status. So for those rare situations where an attack gets through Workplace Hub’s robust server, the platform uses the Sophos XG Firewall to provide comprehensive next-generation protection that automatically blocks and responds to threats, exposes hidden risks and monitors what’s happening on your network. And all in real-time.
We’re fully equipped to manage the complex task of protecting your data and systems from malicious attacks. So you can check cyber attacks off your worry list. We’ve got you covered.
Want to know how else you can unlock your business’ potential?Read our whitepaper here to find out you can maximise your IT.