{"id":25411,"date":"2024-10-31T16:00:43","date_gmt":"2024-11-01T00:00:43","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/10\/31\/news-19141\/"},"modified":"2024-10-31T16:00:43","modified_gmt":"2024-11-01T00:00:43","slug":"news-19141","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/10\/31\/news-19141\/","title":{"rendered":"\u200b\u200b7 cybersecurity trends and tips for small and medium businesses to stay protected"},"content":{"rendered":"<p><strong>Credit to Author: Scott Woodgate| Date: Thu, 31 Oct 2024 16:00:00 +0000<\/strong><\/p>\n<p>As October draws to a close, marking 21 years of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/01\/cybersecurity-awareness-month-securing-our-world-together\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Awareness Month<\/a>, cyberattacks continue to be a challenge for businesses of all sizes, however, small and medium businesses (SMBs) face distinct challenges when it comes to cybersecurity. Although SMBs face heightened cybersecurity threats, unlike large enterprises, they often lack the resources and expertise to implement extensive security measures or manage complex security solutions, making them prime targets for bad actors. Both the risks that SMBs face and their current level of security readiness are not widely understood. <\/p>\n<p>To help us better understand the SMB security needs and trends, Microsoft partnered with Bredin, a company specializing in SMB research and insights, to conduct a <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2295333\">survey focused on security for businesses<\/a> with 25 to 299 employees. As we share these insights below, and initial actions that can take to address them, SMBs can also find additional best practices to stay secure in the <a href=\"http:\/\/aka.ms\/becybersmartkit\" target=\"_blank\" rel=\"noreferrer noopener\">Be Cybersmart Kit<\/a>.\u00a0\u00a0<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-1024x577.jpg\" class=\"card-img img-object-cover\" alt=\"Decorative image of three bars - one blue, one yellow, and one green\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-1024x577.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-768x433.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-1536x865.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-2048x1154.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/Security_Blog_Abstract-06-630x354.jpg 630w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>SMB Cybersecurity Research Report<\/h2>\n<div class=\"mb-3\">\n<p>Read the full report to learn more about how security is continuing to play an important role for SMBs.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2295333\" class=\"btn btn-link text-decoration-none p-0\" target=\"_blank\"> \t\t\t\t\t\t\t\t<span>Discover more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-1024x1024.webp\" alt=\"Graphic of 7 top 7 cybersecurity trends for small and medium sized businesses\" class=\"wp-image-136243 webp-format\" style=\"width:600px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_8-1024x1024.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"1-one-in-three-smbs-have-been-victims-of-a-cyberattack\">1. One in three SMBs have been victims of a cyberattack&nbsp;<\/h2>\n<p>With cyberattacks on the rise, SMBs are increasingly affected. Research shows that 31% of SMBs have been victims of cyberattacks such as ransomware, phishing, or data breaches. Despite this, many SMBs still hold misconceptions that increase their risk and vulnerability. Some believe they are too small to be targeted by hackers or assume that compliance equates to security. It is crucial to understand that bad actors pose a threat to businesses of all sizes, and complacency in cybersecurity can lead to significant risks.&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>Microsoft, in collaborating with the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA), has outlined four simple best practices to creates a strong cybersecurity foundation. <\/p>\n<ul class=\"wp-block-list\">\n<li>Use strong passwords and consider a password manager.<\/li>\n<li>Turn on multifactor authentication.<\/li>\n<li>Learn to recognize and report phishing.<\/li>\n<li>Make sure to keep your software updated.<\/li>\n<\/ul>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-medium is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-300x300.webp\" alt=\"Graphic of 1 in 3 of all SMBs have experienced of a cyberattack\" class=\"wp-image-136241 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_1-300x300.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"2-cyberattacks-cost-smbs-more-than-250-000-on-average-and-up-to-7-000-000\">2. Cyberattacks cost SMBs more than $250,000 on average and up to $7,000,000&nbsp;<\/h2>\n<p>The unexpected costs of a cyberattack can be devastating for an SMB and make it difficult to financially recover from. These costs can include expenses incurred for investigation and recovery efforts to resolve the incident, and associated fines related to a data breach. Cyberattacks not only present an immediate financial strain but can also have longer term impacts on an SMB. Diminished customer trust due to a cyberattack can cause broader reputational damage and lead to missed business opportunities in the future. It\u2019s difficult to anticipate the impact of a cyberattack because the time it takes to recover can vary from one day to more than a month. While many SMBs are optimistic about their ability to withstand a cyberattack, some fail to accurately estimate the time needed to restore operations and resume normal business activities&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>SMBs can conduct a cybersecurity risk assessment to understand gaps in security and determine steps to resolve them. These assessments can help SMBs uncover areas open to attack to minimize them, ensure compliance with regulatory requirements, establish incident response plans, and more. Effectively and proactively planning can help minimize the financial, reputational, and operational costs associated with a cyberattack should one happen. Many organizations provide self-service assessments, and working with a security specialist or security service provider can bring additional expertise and guidance through the process as needed.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-medium is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-300x300.webp\" alt=\"Graphic of The average cost of an attack for SMBs is over $250,000 \" class=\"wp-image-136231 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_2-300x300.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"3-81-of-smbs-believe-ai-increases-the-need-for-additional-security-controls\">3. 81% of SMBs believe AI increases the need for additional security controls<\/h2>\n<p>The rapid advancement of AI technologies and the ease of use through simple user interfaces creates notable challenges for SMBs when used by employees. Without the proper tools in place to secure company data, AI use can lead to sensitive or confidential information getting in the wrong hands. Fortunately, more than half of companies currently not using AI security tools intend to implement them within the next six months for more advanced security.&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>Data security and data governance play a critical role in successful adoption and use of AI. Data security, which includes labeling and encrypting documents and information, can mitigate the chance of restricted information being referenced in AI prompts. Data governance, or the process of managing, understanding, and securing data, can help establish a framework to effectively organize data within.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-1024x1024.webp\" alt=\"Graphic of 81% of SMBs believe AI increases the need for additional security controls\" class=\"wp-image-136232 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_3-1024x1024.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"4-94-consider-cybersecurity-critical-to-their-business\">4. 94% consider cybersecurity critical to their business&nbsp;<\/h2>\n<p>Recognizing the critical importance of cybersecurity, 94% of SMBs consider it essential to their operations. While it was not always considered a top priority given limited resources and in-house expertise, the rise in cyberthreats and increased sophistication of cyberattacks now pose significant risks for SMBs that is largely recognized across the SMB space. Managing work data on personal devices, ransomware, and phishing and more are cited as top challenges that SMBs are facing.&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>For SMBs that want to get started with available resources to train and educate employees, security topics across <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/fy25-cam-cybersecurity-101-2024-09-16.pdf?ocid=cmmxk7wrl8x\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity 101<\/a>, <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/fy25-cam-phishing-2024-09-23.pdf?ocid=cmme8mu9ctq\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing<\/a>, and more are provided through Microsoft&#8217;s <a href=\"https:\/\/www.microsoft.com\/security\/business\/cybersecurity-awareness\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Awareness site<\/a>.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-1024x1024.webp\" alt=\"Graphic of 94% of SMBs consider cybersecurity critical to their companies\" class=\"wp-image-136234 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_4-1024x1024.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"5-less-than-30-of-smbs-manage-their-security-in-house\">5. Less than 30% of SMBs manage their security in-house&nbsp;<\/h2>\n<p>Given the limited resources and in-house expertise within SMBs, many turn to security specialists for assistance. Less than 30% of SMBs manage security in-house and generally rely on security consultants or service providers to manage security needs. These security professionals provide crucial support in researching, selecting, and implementing cybersecurity solutions, ensuring that SMBs are protected from new threats.&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>Hiring a Managed Service Provider (MSP) is commonly used to supplement internal business operations. MSPs are organizations that help manage broad IT services, including security, and serve as strategic partners to improve efficiency and oversee day-to-day IT activities. Examples of security support can consist of researching and identifying the right security solution for a business based on specific needs and requirements. Additionally, MSPs can implement and manage the solution by configuring security policies and responding to incidents on the SMBs behalf. This model allows more time for SMBs to focus on core business objectives while MSPs keep the business protected.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-1024x1024.webp\" alt=\"Graphic of Less than 30% of SMBs manage their security in-house\" class=\"wp-image-136236 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_5-1024x1024.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"6-80-intend-to-increase-their-cybersecurity-spending-with-data-protection-as-top-area-of-spend\">6. 80% intend to increase their cybersecurity spending, with data protection as top area of spend&nbsp;<\/h2>\n<p>Given the heightened importance of security, 80% of SMBs intend to increase cybersecurity spending. Top motivators are protection from financial losses and safeguards for client and customer data. It\u2019s no surprise that data protection comes in as the top investment area with 65% of SMBs saying that is where increased spending will be allocated, validating the need for additional security with the rise of AI. Other top areas of spending include firewall services, phishing protection, ransomware and device protection, access control, and identity management.&nbsp;&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>Prioritizing these investments in the areas above, SMBs can improve security posture and reduce the risk of cyberattacks. Solutions such as Data Loss Prevention (DLP) help identify suspicious activity and prevent sensitive data from leaving leaking outside of the business, Endpoint Detection and Response (EDR) help protect devices and defend against threats, and Identity and Access Management (IAM) help ensure only the right people get access to the right information.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-1024x1024.webp\" alt=\"Graphic of 80% of SMBs intend to increase their cybersecurity spending\" class=\"wp-image-136237 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_6-1024x1024.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"7-68-of-smbs-consider-secure-data-access-a-challenge-for-remote-workers\">7. 68% of SMBs consider secure data access a challenge for remote workers&nbsp;<\/h2>\n<p>The transition to hybrid work models has brought new security challenges for SMBs, and these issues will continue as hybrid work becomes a permanent fixture. With 68% of SMBs employing remote or hybrid workers, ensuring secure access for remote employees is increasingly critical. A significant 75% of SMBs are concerned about data loss on personal devices. To safeguard sensitive information in a hybrid work setting, it is vital to implement device security and management solutions so employees can securely work from anywhere.&nbsp;&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>How can SMBs approach this?<\/strong><\/p>\n<p>Implement measures to <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/fy25-cam-devices-2024-09-16.pdf?ocid=cmm0j3jwxr8\" target=\"_blank\" rel=\"noreferrer noopener\">protect data and internet-connected devices<\/a> that include installing software updates immediately, ensuring mobile applications are downloaded from legitimate app stores, and refraining from sharing credentials over email or text, and only doing so over the phone in real-time.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-1024x1024.webp\" alt=\"Graphic of 68% of SMBs find secure data access for remote workers a challenge\" class=\"wp-image-136239 webp-format\" style=\"width:450px\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-1024x1024.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-150x150.webp 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-768x768.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-1536x1536.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-2048x2048.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/10\/SMBCybersecurity_Final_7-1024x1024.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"next-steps-with-microsoft-security\">Next steps with Microsoft Security<\/h2>\n<ul class=\"wp-block-list\">\n<li>Read the <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2295333\" target=\"_blank\" rel=\"noreferrer noopener\">full report<\/a> to learn more about how security is continuing to play an important role for SMBs.<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>Get the\u202f<a href=\"http:\/\/aka.ms\/becybersmartkit\" target=\"_blank\" rel=\"noreferrer noopener\">Be Cybersmart Kit<\/a> to help educate everyone in your organization with cybersecurity awareness resources.<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/small-medium-business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u202fBookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/31\/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected\/\">\u200b\u200b7 cybersecurity trends and tips for small and medium businesses to stay protected<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/31\/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Scott Woodgate| Date: Thu, 31 Oct 2024 16:00:00 +0000<\/strong><\/p>\n<p>The challenges that small and midsize businesses (SMBs) face when it comes to security continue to increase as it becomes more difficult to keep up with sophisticated cyberthreats with limited resources or security expertise. Research conducted highlights the top seven SMB cybersecurity trends and steps that can be taken to stay protected.\u200b<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/31\/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected\/\">\u200b\u200b7 cybersecurity trends and tips for small and medium businesses to stay protected<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21877],"class_list":["post-25411","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-security-strategies"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25411"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25411\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}