Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form

Ten attack methodologies small business needs to know about

Posted on May 4, 2018May 4, 2018 By Davey Winder

IT Security Thing asked the security industry what attack methodologies SMBs need to worry about currently, here’s what it said…

The UK Department for Digital, Culture, Media and Sport, in association with Ipsos MORI and the University of Portsmouth, has published the 2018 Cyber Security Breaches Survey.  Some of the statistics within the report should certainly be food for thought, for both the IT security industry and British businesses alike. The one that caught our attention here at IT Security Thing was that more often than not a breach does not incur any specific financial cost. Or, more accurately, the explanation that caught our attention: “This is reflective of the fact that most breaches or attacks do not have any material outcome (a loss of assets or data) so do not always need a response.”

Sorry folks, but if your network has been breached that always requires a response or your network is going to be breached again and again. Just because data wasn’t compromised the first time, that doesn’t mean the attackers have not gleaned some intelligence that could help them to do so in the future. Especially if ‘no response needed’ was the determination of the security people. Perhaps this is down to another statistic from the report, that only 20% of businesses had staff participate in any kind of cyber security training, a number that drops to 15% for charities. For smaller businesses and charities, the report states “basic technical controls might also be improved.” Then there’s the finding that 20% of businesses “never update their senior managers on cybersecurity issues” apparently. At the smaller end of the business scale, more say that cybersecurity is a very high priority than did so in the 2017 research report; but that number is still only 42%.

With all that in mind then, here’s the industry response IT Security Thing got to our big question.

Click here to read complete article

Threat Intelligence Tags:attack methodology, industry, Intelligence, small business

Post navigation

Previous Post: Cross-border transactions are low-hanging fruit for attackers
Next Post: Cloud still hangs over patient data sovereignty concerns

Related Articles

New iPhone Security Warning As Malicious Lockdown Mode Trick Revealed Apple
Samsung Confirms Hackers Compromised Customer Data Starting July 2019 Hacking
New Critical Security Warning For iPhone, iPad, Watch, Mac—Attacks Underway Analysis
New Emergency Chrome Security Update After Critical iOS 16.6.1 Release Analysis
Windows Users Urged To Update As Microsoft Confirms New Zero-Day Exploits Infosecurity
Stolen Reddit Data To Be Published Unless API Changes Dropped, Hackers Say Cybercrime

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government Hackers Hacking Health healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Twitter Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2025 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy