Small business, big risk

February 2012 Information Security, Access Control & Identity Management

Many small business owners believe that they do not need to worry much about computer and online security. “After all,” they reason, “who would want to target my business when there are so many bigger targets out there?”

While it is true that small businesses are not directly attacked as often as larger organisations, small and midsize businesses are still falling prey to cyberattacks that cost them sensitive data, productivity and corporate accounts cleaned out by sophisticated banking Trojans.

“The threat of identity theft is very real for consumers and businesses alike, but owners of small businesses may not realise the danger they face of having their personal identities compromised through their business,” explains Lutz Blaeser, MD of Intact Security. “Unfortunately, small business owners are being targeted more today than ever before due to the criminals’ ability to easily access important information and go undetected."

He explains that this is because many of these business owners have very fragile firewalls between their personal and business finances, which in turn can make them exceptionally vulnerable to identity theft. These small companies are also becoming more digital, but without the necessary security expertise they often expose themselves to serious vulnerabilities. “For that reason, hackers now have small businesses in their cross-hairs,” Blaeser adds.

He explains that there are three reasons why small businesses should be concerned. “Small businesses often end up affected by larger attacks, such as mass worm outbreaks or efforts to harvest credit card numbers; security is becoming tighter than ever at larger companies, so small business networks look increasingly tempting to attackers; and not all security threats come from outside an organisation.”

This is why IT security expert Avira has announced a new product aimed at micro and small business users: Avira Endpoint Security. Available for both Windows and Unix users, Avira Endpoint Security includes features designed to simplify security set-up and administration for businesses with more than three users.

Avira Endpoint Security consists of the Avira Management Console, Configuration Wizard, Avira Professional Security and Avira Server Security (both for Windows and Unix). The Configuration Wizard allows users to install, set up and manage distributed endpoint machines from one central point. This capability makes Avira Endpoint Security ideal for any business that wants to protect its network without the hassle of a complex installation, configuration or administration procedures.

“Avira Endpoint Security was built specifically for micro and small businesses needing both PC and Fileserver protection,” says Blaeser. “Avira Endpoint Security brings together the protection if desktop PCs and file servers in a single license, ensuring your network is secure against viruses, worms, Trojans, adware, spyware and other malware.”

Regardless of how or why your business is attacked, recovery usually takes significant time and effort. Imagine if your computer systems were unavailable for a week. Imagine if you lost all the data stored on all the computers in your company. Imagine if your biggest competitor was able to obtain a list of your customers along with sales figures and sales notes. “How long would it take before you noticed? What would these breaches cost your company? Could you afford these losses?” asks Blaeser. “It seems like common sense. You would not leave your building unlocked at night. The same is true with information security, and one product is all the protection you need. Securing your business is easier than you might think with Avira Endpoint Security.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.