Back to Avast SMB Blog

Cybersecurity Monitor (Vol. 1): SMB Stats, Stories and News

The Monitor The Monitor , 27 September 2018

We scour the internet every week here at The Monitor, to stay up-to-date on IT security news. Instead of keeping our findings all to ourselves, we're now providing it as this curated collection which includes the latest cybersecurity news, stories and reports as it relates to businesses with anywhere from 2 to 2000 employees.

This collection aims to spotlight news and information by major publications, local news agencies and even (this week) those in the accounting industry who are keeping a watchful eye on the state of cybersecurity on their bread and butter clients, small and medium businesses. So grab a coffee, Mountain Dew or your favorite "energy" drink and enjoy this week's roundup. 


You may not have even heard of these IT jobs, but demand for them is soaring
New York Post | September 23, 2018
Most won't be posting jobs for a Chief Listening Officer or Cyberthreat Intelligence Analyst anytime soon, but according to the New York Post, want ads for these positions are starting to heat up as the need to hire informational security analyst is set to increase by 28 % by 2026. Click for the full article


5 biggest cybersecurity challenges at smaller organizations
CSO Online | September 18, 2018

Security has often been thought of as an afterthought, or even a reactive measure at smaller companies. One of the takeaways from the survey of 400 IT and cybersecurity professionals with SMBs included that 27% of respondents say their biggest cybersecurity challenge is that business managers don’t understand or support strong cybersecurity. What other concerns did they have? Click for the full article


Cyber Safe: Small business targeted in over 42 percent of cyber attacks
Fox 21 News Colorado Springs | September 19, 2018

Fox 21 News out of Colorado Springs warns that 42% of cyber attacks are targeting small businesses. An ethical hacker that featured in the story shared that 60% of small businesses go out of business after getting hit by an attack". Business owners lamented how a little protection goes a long way. The owner also added that they "can't afford not to protect [my business] or my customers". Click for the full article


What Security Worries Small and Midsized Firms Have 
AccountingWeb | September 11, 2018

Accounting Web warns of the ease at which hackers are targeting smaller companies. They go on to state that the goal of these thieves is not always to steal a list of credit cards or intellectual property, but to breach the system in order to achieve an objective systematically through the use of attacks classified as Advanced Persistent Threats (APTs). APTs include the attempt to duplicate a company's process in order to trick them into transferring large cash payments directly to criminals.  Click for the full article


Why that email from your boss could be a scam waiting to happen
TechRepublic | September 10, 2018

Impersonation fraud (aka Business Email Compromise) is on the rise, with a reported one in 12 businesses falling victim to it this year. While the article and stats are coming out of the UK, the same holds true for companies within the US.  Click for the full article

Want this delivered to your inbox?

Subscribe to The Monitor

Related articles

Industry Pros Gather for IT Nation – Cybersecurity a Top Priority

As information technology professionals gather in Orlando, Florida for one of the IT industry’s biggest conferences – cybersecurity stands out as a key priority.  

24 October 2019 3 min read

Security appliances – is "all in one" really all you need?

On premise and UTM security appliances often offer "all in one" protection. When in fact, most appliances sized for the mid-market fail to provide the essentials layers of security to adequately protect your clients. If you are using or planning to use an on-premise security appliance to keep your customers safe from cyberthreats, here are a...

05 September 2019 6 min read

The Hidden Costs of Network Security and UTM Appliances for SMBs

The interesting and attractive part of a network security appliance is that you can just plug it in to your network, get it configured, purchase a support contract with your hardware vendor, and then you're all set. When one takes a look with a focus on other costs, however, the flaws and blemishes become clear. Let's take a look at some of...

21 August 2019 8 min read