{"id":15113,"date":"2015-11-13T17:37:48","date_gmt":"2015-11-13T17:37:48","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4795"},"modified":"2020-02-26T11:04:10","modified_gmt":"2020-02-26T16:04:10","slug":"cyberbreaches-smbs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cyberbreaches-smbs\/15113\/","title":{"rendered":"Costs of cyberbreaches for SMBs keep going up"},"content":{"rendered":"<p>According to a <a href=\"https:\/\/www.kaspersky.com\/about\/news\/product\/2015\/SMB-lose-around-38000-in-every-cyber-attack\" target=\"_blank\" rel=\"noopener nofollow\">study<\/a> by Kaspersky Lab and B2B International, every cyber-incident is costly to businesses: In 2015, losses due to cyberattacks for SMBs averaged $38K.<\/p>\n<p>That sum, researchers say, includes the cost of calling in specialists to clean up the after-effects, as well as missed business opportunities and losses caused by downtime \u2013 the costs keep growing.<\/p>\n<p>The study found that in the last year, almost a third of small and medium businesses suffered downtime and missed business opportunities, and 88% of them had to turn to third-party experts for help. On average, the latter accounted for about $11,000 of a company\u2019s expenses. Lost profits accounted for $16,000, while reputation losses \u2013 the damage to a company\u2019s image \u2013 was estimated at more than $8,000, according to the respondents.<\/p>\n<p>More than a third (39%) of companies confirmed they have lost confidential data as a result of a cyberattack, which is always a costly problem.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Costs of cyberbreaches for SMBs keep going up #smb #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FEYr4&amp;text=Costs+of+cyberbreaches+for+SMBs+keep+going+up+%23smb+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>At the same time, the study found, about 90% of organizations faced any kind of external threats at least once over the year, and 73% of respondents encountered certain internal threats, such as software vulnerabilities, or the risk of employees losing mobile devices or causing data leaks.<\/p>\n<p><strong>Priorities<\/strong><\/p>\n<p>Most successful cyberattacks occur not because criminals are ultra-smart geniuses; in fact, they are mostly not. They just know where to acquire their off-the-shelf cyber-lockpick. All they have to do next is to find a place to use it \u2013 i.e. find a weak spot. And searching for them is, in most cases, \u00a0indiscreet and indiscriminate: spammed-out phishing letters, malware, infected popular websites, etc. Criminals set traps and wait.<\/p>\n<p>Everyone can do so, but those who don\u2019t take precautions are much more likely to fall (I\u2019m kind of playing Captain Obvious here). Meanwhile, for many startups and small companies it is normal\u00a0to think of anything but cybersecurity \u2013 both at the early stages and until a cyber-incident happens.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Figure: in 2015 losses due to cyberattacks for SMBs averaged at $38k #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FEYr4&amp;text=Figure%3A+in+2015+losses+due+to+cyberattacks+for+SMBs+averaged+at+%2438k+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Market penetration, financial stability, business contacts, etc. \u2013 these are the main priorities for small business owners, while setting a secure digital framework for their operations is often not.<\/p>\n<p>If a company operates with cash, a strongbox would certainly be purchased; while its digital counterpart is often neglected for various reason, but most likely they\u2019re financial. Saving on business security solutions may lead to huge expenses, exceeding manifold the costs of a security software suite.<\/p>\n<p>Kaspersky Lab offers <a href=\"https:\/\/kas.pr\/KSOS_Trial_SM_KB\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> specifically designed for smaller business segment. For medium-sized companies there is <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security<\/a>. Both solutions are designed to provide reliable multi-level protection to all elements of the IT infrastructure. Easy to deploy and manage, they protect against cybercriminals while the company focuses on its key business goals. Without risk of falling in a trap set by criminally minded cyber-mediocrities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a study by Kaspersky Lab and B2B International, every cyber-incident is costly to businesses: In 2015, losses due to cyberattacks for SMBs averaged $38K.<\/p>\n","protected":false},"author":209,"featured_media":15521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2049,503,2304],"class_list":{"0":"post-15113","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kaspersky-endpoint-security-for-business","10":"tag-kaspersky-small-office-security","11":"tag-smb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberbreaches-smbs\/15113\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberbreaches-smbs\/15113\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberbreaches-smbs\/15113\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/kaspersky-endpoint-security-for-business\/","name":"Kaspersky Endpoint Security for Business"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15113"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15113\/revisions"}],"predecessor-version":[{"id":33595,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15113\/revisions\/33595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15521"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}