Brand

    If you do not know the product type, please index accordingly.

    How Small and Midmarket Businesses Can Fortify Their Defenses Against Today’s Threats

    Date:2018-06-11Click:0


    • 53% of midmarket companies have experienced a breach

    • Up to 5000 Average number of security alerts

    • Midmarket companies investigate 55.6% of security alerts

    • 29% of midmarket companies say breaches cost them less than $100K. 20% say it costs $1,000,000-$2,499,999


    Many small and midmarket businesses aspire to more effective cybersecurity practices just like larger counterparts. SMBs are dynamic - the backbone of innovation and the poster child of hardwork. They run even faster and work even harder than enterprise peers. And they are exposed to the same cyber threats.


    In today’s cyber threat landscape, every organization, large or small, is at risk for an attack. But increasingly, small/midmarket businesses are the focus of attacks1 and often serve as a launch pad or conduit for bigger campaigns. Adversaries view small/midmarket businesses as soft targets that have lesssophisticated security infrastructure and practices and an inadequate number of trained personnel to manage and respond to threats.


    Many small/midmarket businesses are only beginning to realize how attractive they are to cybercriminals. Often, that realization comes too late:after an attack. Recovering from a cyber attack can be difficult and costly—if not impossible—for these businesses, depending on the nature and scope of the campaign. This report will give an understanding of the risks smaller organizations face, share an understanding of how smaller organizations stack up against their peers with respect to security and share a bit of guidance to bear in mind in 2018 and beyond.


    Consider this finding from the Cisco 2018 Security Capabilities Benchmark Study: More than half (54 percent) of all cyber attacks result in financial damages of more than US$500,000 including, but not limited to, lost revenue, customers, opportunities, and out-of-pocket costs. That amount is enough to put an unprepared small/midmarket business out of operation—permanently.


    A recent study by the Better Business Bureau (BBB)2 helps to underscore how small/midmarket businesses can struggle financially to survive following a severe cyber attack. The BBB asked small business owners in North America, “How long could your business remain profitable if you permanently lost access to essential data?” Only about one-third (35 percent) said that they could remain profitable for more than three months. More than half reported that they would be unprofitable in under one month.


    By the way, we see SMBs as companies with fewer than 250 employees and define midmarket as companies with 250-499 employees. Both segments are included in this report.We analyze findings from SMB respondents in our 2018 Security Capabilities Benchmark Study, what we’ll refer to merely as our Benchmark study. It offers insights on security practices currently in use,and compares the full results to the past three years.Our SMB/midmarket data includes 1816 respondents across 26 countries.


    What’s a day of lost business between colleagues?

    Said no IT admin ever. System downtime, which undermines productivity and profitability, is a significant issue for businesses following a cyber attack. Research from the Benchmark Study found that 40 percent of respondents (250–499 employees) experienced eight hours or more of system downtime due to a severe security breach in the past year (Figure 1). Cisco saw similar results for larger organizations in the study sample (those with 500 or more employees). The difference,though, is that larger organizations tend to be more resilient than small/midmarket businesses following an attack because they have more resources for response and recovery.

    Also, 39 percent of respondents reported that at least half of their systems had been affected by a severe breach (Figure 2). Smaller businesses are less likely to have multiple locations or business segments, and their core systems are typically more interconnected. When these organizations experience an attack, the threat can quickly and easily spread from the network to other systems.


    Sleepless security nights

    When asked about the biggest security challenges they face, respondents are most concerned with three things:

    -- Targeted attacks against employees (think well-crafted phishing)

    -- Advanced persistent threats (advanced malware the world hasn’t see before)

    -- Ransomware

    Ransomware (interestingly not cited as a “top 3” concern of large enterprise)—is, as you surely know by now,malware that encrypts data, usually until affected users pay a ransom demand. It can create severe disruption and system downtime for small/midmarket businesses. Ransomware is also costly in a different way for these organizations: Cisco security experts explain that small/midmarket businesses are more inclined to pay ransoms to adversaries so that they can quickly resume normal operations. They simply can’t afford the downtime and lack of access to critical data—including customer data. (See Figure 3.)

    Other Threats SMBs Can’t Ignore

    Despite worries about ransomware, Cisco security experts suggest it is a diminishing threat as more adversaries shift their focus to illicit cryptocurrency mining (“cryptomining”). The appeal of this activity is threefold: It can be highly lucrative, payouts can’t be traced, and adversaries can worry less about the potential for criminal liability for their actions. (For example, there is no risk of patients being deprived of critical care because a hospital’s systems and essential data are locked up by ransomware.) Adversaries can also deliver mining software (“miners”) through various methods, including email-based spam campaigns and exploit kits.



    Cisco threat researchers explain that malicious actors using the new business model of illicit cryptomining “are no longer penalizing victims for opening an attachment or running a malicious script by taking systems hostage and demanding a ransom. Now, [they] are actively leveraging the resources of infected systems.”41For small/midmarket businesses unwittingly aiding illicit cryptomining operations, slower system performance might be the only red flag signaling they’ve been compromised—unless they have the right technology in place to detect when cryptomining activity is present.


    The 0.5% insider threat: 100% too high?

    As respondent companies move more data and processes to the cloud, they must also take steps to manage another potential threat: rogue insiders. Without tools to detect suspicious activity (such as downloading of sensitive customer information), they are at risk of losing intellectual property, sensitive financial and client data through corporate cloud systems.


    A recent investigation by Cisco threat researchers highlights the risk: From January to June 2017, they examined data exfiltration trends using machine-learning to profile 150,000 users in 34 countries who were using the cloud. Over 1.5 months, researchers found that 0.5 percent of users made suspicious downloads. Does half a percent seem bad?Put another way, this means two employees at a 400 person firm would be insider threats. That is 100 percent too high.Specifically, those users downloaded, in total, more than 3.9 million documents from corporate cloud systems. That’s an average of 5200 documents per user during a 1.5-month period.


    Challenges

    The best defense against the threats described earlier—requires coordination and orchestration of IT resources.Those resources are most commonly the people, processes, and technology that businesses can amass to deter attacks.

    However, even more so than their larger counterparts, smaller businesses are challenged to coordinate these resources in ways that yield insights into threats and stop or mitigate attacks before they cause damage.The perennial lack of security talent that affects enterprises impacts smaller counterparts even more.


    SMB security tech trends

    Moving forward, smaller organizations indeed seek to address the cybersecurity challenges that threaten their organizations with new tools to stop threats.

    Benchmark Study respondents said that if staffing resources were available, they would be more likely to:

    -- Upgrade their endpoint security to more sophisticated advanced malware protection/EDR – the most common response at 19 percent.

    -- Consider better web application security against web attacks (18 percent)

    -- Deploy intrusion prevention, still seen as a vital technology to stop network attacks and exploit attempts.(17 percent). (See Figure 5.)


    As organizations consider new technologies, a challenge is determining how well their products interoperate to keep businesses protected. The management burdens of combing through many consoles to respond to threats or security incidents should not be underestimated.


    “Many people think that if they go with a multivendor, best-of-breed approach, it will protect them better,” says Ben M. Johnson, CEO of Cisco partner Liberty Technology in Griffin, Georgia. “But what we see is that it’s harder to manage, costs more, and decreases security effectiveness overall.”


    Machine Learning: Security Help or Hype? 

    We’ve all heard about machine learning given its recent hype. It turns out midmarket businesses rely about the same amount as larger peers on behavioral analytics solutions that can effectively detect attacks.Solutions using machine learning and automation are

    relied on slightly less heavily by midmarket businesses when compared to organizations with more than 1000 employees (Figure 4).

    Machine learning is most effective when it is an additional detection layer in an already deployed product as opposed to buying a separate product in order to “do machine learning.” This way teams gain the benefit of machine learning to detect anomalies and threats at machine speed without any new team burdens.


    Mobile Midmarket

    Businesses also recognizethat their security approaches must meet the demands of the modern workenvironment—  in particular, the shift tomobility and the embrace of mobile devices. Fifty-six percent of respondentssaid that  defending mobile devices fromcyber attacks is considered very challenging or extremely challenging. 


    Midmarket and the Cloud

    In recognition of their security challenges,many  respondents are looking to thecloud to bolster  defenses without addingpeople or straining existing  resources.The question is whether moving security  tothe cloud is enough of a strategy to ward off attacks. Also, businesses can’t simply offload security  responsibility by moving data to the cloud:They must  still be knowledgeable aboutthe security controls  imposed by cloudproviders as well as how potential  breachesin the cloud might impact on-premises  resources.  


    The adoption of cloud services amongmidmarket  businesses is clearly on therise, based on Cisco’s  research. In2014, 55 percent of these businesses said they hosted some of their networks via a form of the  cloud; in 2017, that number increased to 70percent  (Figure 5).  

    Many respondents believe that the cloud canhelp  close some gaps in their defensesas well as resolve  some shortcomings intheir infrastructure and the  abilitiesof their staff. In fact, according to Cisco’s research, midmarket businesses’ top reason for hosting  networks in the cloud is the belief that itoffers better  data security (68percent); the second most popular  reasonis that the business lacks enough internal IT workers (49 percent). (See Figure 6.) 


    Midmarket businesses also favor the cloud because of  its scalability—that is, reducing thebusiness’ reliance on  its internalresources—and the flexible shift to operational expenditures instead of capital expenditures (Figure 6). 


    People: Finding staff to strengthen security

    The good news is that the Benchmark Study shows that 92 percent of midmarketbusinesses have an executive responsible and accountable for security. (SeeFigure 7.) 

    Given ample staff resources, midmarket businesses would be willingto add more security tools such as advanced endpoint protections or web appfirewalls.


    Midmarket has something in common with larger counterparts: ashortage of IT staff hindering the ability to shore up defenses. There simplyaren’t enough people in-house to manage tools that could improve security,according to Cisco’s research. 


    For that reason, many small/midmarket businesseslook to outsourced assistance to gather the talent they need to increase theirknowledge of threats, save money, and respond to breaches more quickly. The desirefor unbiased insight was the most common reason given by midmarket businessesfor outsourcing their security tasks (Figure 8), followed by costeffectiveness andthe need to respond to security incidents promptly. 

    Outsourcing help is a goodway for businesses to make the most of limited resources. But these companiescan run into trouble if they assume that an outsourced provider or a cloudpartner will provide all of the capabilities that they lack in-house. 


    ChadPaalman, CEO of NuWave Technology Partners in Kalamazoo, Michigan, a Ciscopartner, finds that many small/midmarket businesses are unaware of exactly howmuch (or how little) analysis and monitoring their outsourced securityproviders offer.


    “Many business leaders are not educatedabout their  networks. They assume thatif they have a firewall, then  they havea padlock on the door and no one can get in. They also assume that if their security has been outsourced  to a managed service provider (MSP), logmonitoring is  happening, or the serviceincludes intrusion detection.” 


    The bottom line, however, is that small/midmarket businesses count on theiroutsourced partners to deliver:  

    -- Outsourcedadvice and consulting services (57 percent), 

    -- Incidentresponse (54 percent),  

    -- Securitymonitoring (51 percent).  

    However,they are less likely to outsource tasks such as threat intelligence (39 percent). (See Figure 9.)  

    The good news is that midmarket businessesappear  to be setting aside some of theirlimited resources for  understanding andresponding to threats for things like  bolsteringthreat intelligence and incident response. 


    Processes:Regular check-ins for  managing security  

    Comprehensive, regular security processes—suchas  controls for high-value assets andreviews of security  practices—helporganizations identify weaknesses in  theirsecurity defenses. Such processes are not as prevalent in small/midmarket businesses as they should  be, perhaps owing to the lack of staffing.  


    For example, according to the Cisco 2018Security  Capabilities Benchmark Study,midmarket businesses  are less likelythan larger organizations to agree that  theyreview security practices regularly, that they have  tools in place to review securitycapabilities, and that  they routinelyinvestigate security incidents (Figure 10). 

    On a positive note, 91 percent of midmarket businesses  said they conduct drills to test theirincident response  plans at least once ayear. However, as with their reliance  onthe cloud and outsourced partners, the question is  whether such incident response plans areadequate to  push back on increasinglysophisticated attackers. 


    Connecting people, processes, and technology:  The orchestration challenge  

    If small/midmarket businesses addmore security products and vendors to their defenses—  and shift IT resources to managing theseproducts—will their organizations better manage security? The opposite may be true, at least in terms of understandingand orchestrating  security alerts. 


    Mostsmall/midmarket businesses today  recognizethat as they create a more  complexproduct and vendor environment,  theirresponsibilities increase. For instance, 77 percent of midmarket businesses found it somewhat challenging or very challenging  to orchestrate alerts from these many  solutions (Figure 11).  

    When businesses try to analyze  these alerts, the combined challenges  of people, processes, and technology  can cause many alerts to be left  uninvestigated, as the benchmark  study found (Figure 12): 

    Recommendations for the future  

    Technology  

    As organizations consider new tools,ideally, they can avoid adding to the  numberof vendors they manage and alerts they must respond to.  


    With that in mind, are products built withopenness in mind? How will  theyintegrate with others in terms of sharing data and threat intelligence?  Is there management console integration?  


    If a vendor says products are built to fitand work with others – does this  happenout of the box or will the buyer have to do considerable API work?  


    Machine learning, while surrounded with hype,has its place in security.  However, lookfor machine learning as a detection layer inside already  deployed products versus a stand-aloneproduct from another vendor  that addsanother product to manage.  


    Peopleand Process  

    To put it plainly, developa strategy to improve cybersecurity. Only 38 percent of small/midmarket businesses have an active cyber-risk strategy  in place, according to the Vistage ResearchCenter, a resource center for  business leaders.1  


    Does your planning include end usersreceiving appropriate training? Do your  insurancepolicies cover the loss of business stemming from a cyber attack?  How about creating business continuity andcrisis communication plans to  enablefaster recovery and help prevent reputational damage.  


    Also, IT leaders must explain in clear termswhat business management  really wants toknow with respect to breaches:  

    -- Whatis the impact to the organization?  

    -- Whatmeasures the security team is taking to contain and investigate  the threat. How long it will take to resumenormal operations.


    “By adopting a set of security platforms  and toolsthat all  work together, versus  disparate pieces that  may actually conflict  with each other, you  get an amplification  of security effectiveness, as well  as asimplification of  management.”  

    Ben M. Johnson,  CEO of Liberty  Technology 


    “Small/midmarket  businesses should  assess these risks and develop  response plans  before a breach—not  after.” 

    Chad Paalman,  NuWave Technology  Partners 



    Conclusion 

    Afinal recommendation for small/midmarket businesses to drive improvements incybersecurity is to recognize  thatincremental change is better than no change. In short, they should not let adesire to be “perfect” in their security approach get in the way of becoming “better.” Perfect, as in all things,does not exist.  

    Small/midmarketbusinesses also must understand that there is no “silver bullet” technologysolution to solve all  of theircybersecurity challenges. The threat landscape is too complex and dynamic. Theattack surface is always  expanding andchanging. And, in response, security technologies and strategies mustcontinually evolve as well.