8914 Stone Green Way , Louisville, Kentucky 40220-4072

Support: (502) 473-6407 | Sales: (502) 473-9330

Argentum IT

Get Support

  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us

Newsletter Content

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Home
Categories
Tags
Categories:   All Categories
Suggested keywords
x
Search

Using 2017's Examples to Maintain Network Security in the New Year

Newsletter
Dean Lause
Tuesday, 12 December 2017
0 Comments
Using 2017's Examples to Maintain Network Security in the New Year

Network security is a crucial consideration for every single business, especially ones that utilize the Internet. There were a lot of negatives and some positives that came out of 2017 in regards to cybersecurity. Below we have listed some of the most troubling cybersecurity statistics collected in 2017, and we’ve followed it up with suggestions on how to keep your business safe in 2018.

Statistic for 2017: In the United States, 61% of small businesses experienced a cyberattack and 54% experienced a data breach that had severe financial consequences in 2017. This year saw phishing/social engineering scams out number web-based attacks for the first time. Phishing (or the attempt to use fraudulent emails that look legitimate to obtain sensitive information to exploit for financial gain), and social engineering (or the psychological manipulation that persuades others into offering personal information), make up about 48% of all cyberattacks.

SMB Action for 2018: One way to reduce the risk that your company will fall victim to phishing and social engineering to make sure that your employees are aware of up-to-date cybersecurity best practices and follow them at all times. Even something as simple as opening an email attachment can have a catastrophic impact on your business. Creating a Acceptable Use of Technology policy is a great way to make sure that your employees know what is expected of them when it comes to technology and your business.

Statistic for 2017: Despite that fact that many business owners feel like their employees and/or contractors would never do anything to cause data loss or put their network at risk, more than half (54%) of the data breaches for small business in 2017 came from employee/contractor negligence, up from just 48% the previous year. While negligence was at the top of the list of was followed closely by third party mistakes (43%) and errors in system or operating processes (34%). Surprisingly, however, nearly ⅓ of those companies who experienced a breach stated that their company could not determine what caused the incident.

SMB Action for 2018: Short of having a computer forensics unit on standby, businesses will need to improve their resilience by properly training their staff in, at the very least, the industry standard of protecting an organization’s network. Enforcing strict guidelines on how people access and interact with data will go a long way toward mitigating organizational risk. Employing the use of virtual private networks (VPNs) to encrypt remote access data flow provides a strong defense against the interception of data.

Organizations will also need to follow strict procedure to close any vulnerabilities they may have with software systems, or former employee, contractor, or vendor access to their network infrastructure. The more diligent organizations are in training staff, and enacting a fast-acting strategy against closing vulnerabilities, the better chance they have of coming through 2018 unscathed.

Statistic for 2017: One question that is frequently overlooked during most run-of-the-mill security surveys is what it is that small businesses believe to be the most likely target of cybercrime attacks on their business - and are therefore most likely to be protected by SMBs. According to the results of this survey, about 63% of small business owners felt that the theft of their customer records was of primary concern. Followed by the theft of their intellectual property at 48%.

SMB Action for 2018: Since the protection of all data depends on diligence, protecting customer records, intellectual property, as well as employee’s personal information and the organizational financials is really a large effort that has to be understood and performed by every single person in your organization. Companies today are constantly under threat and have to organize their security strategy to be both proactive and reactive. Hackers know what they’re looking for and designing a strategy and following through is the only way the modern organization is going to be able to protect itself 100% of the time.

Statistic for 2017: When it comes to detection and prevention, small business technology scored rather dismally. In fact, 61% of small businesses responded that the technologies currently in use by their organization could NOT detect and block most cyberattacks. For 2017, 66% of responding businesses said that they had already experienced exploits and malware attacks that had evaded the current intrusion detection systems, if they had any to speak of and 81% had attacks evade their anti-virus solutions.

SMB Action for 2018: Today’s RMM tools, firewalls, and antivirus programs are thorough, but are often not always updated in real time. Today it is important to depend on solutions that don’t keep you at risk long than you need to be. Companies will have to invest time and capital into defending themselves in 2018, just as they have had do to over the past several years. There is some real risk that relying on software alone will catch most of the threats, but only an actively monitored network is truly safe.

Statistic for 2017: When it comes to ransomware, the majority of small businesses that have not yet been victims of ransomware still believe that they are too insignificant in size to be targeted by cybercriminals. Less than 50% of small business respondents said that ransomware was a serious financial threat, were concerned that negligent employees put their company at risk, and felt that the prevention of these types of attacks were a priority.

ns ib 1

Of those SMBs that have been victims of one or more ransomware attacks, 51% that it was within the past twelve months or less. With 10% experiencing attacks in the past three months or less, 14% within 3 to 6 months, 18% within 6 to 12 months and 9% within 12 months or more. There were three predominant types of ransomware reported by those who were attacked. 39% were faced with encryption ransomware, 30% were faced with locker ransomware and 31% were faced with both.

SMB Action for 2018: Ransomware can be a business ruiner, period. In 2018, companies will have to come to grips with the new normal in which many different strands of ransomware will be available to hacker all over the world. Furthermore, companies will have to consider themselves the prime target for this type of threat. If over a third of businesses are exposed to some fashion of ransomware, expect that number to rise exponentially. It is a problem that has to be at the forefront of any organization's cybersecurity considerations in 2018.

Statistic for 2017: In one of the most concerning aspects of this extremely informative study, of those small businesses who were attacked more than 60% paid the ransom. The average ransom paid out was $2,157. Of the 40% who did not pay, they cited the following reasons for not paying: 67% said it was because they had a full backup and would not lose the data and 52% said they did not trust the criminals provide the decryption cypher upon payment.

SMB Action for 2018: First, it must be made clear that UNDER NO CIRCUMSTANCES SHOULD A SMALL BUSINESS PAY A RANSOM. Ransomware attacks are becoming less and less likely to return data after payment. In fact, many businesses are faced with multiple payments that culminate in data loss AND significant monetary damages. Small businesses can no longer afford not to have both a security solution that helps them keep ahead of the latest ransomware threats, as well as data backup solutions that will be there to fall back on in the event that ransomware does get the best of them. For those businesses who felt that they couldn’t afford to have a data recovery and network security solutions in the past are now finding that they can’t afford not to.

Statistic for 2017: It seems like each year, there are more government compliance and regulatory standards that small business technology is required to meet. For example, the Health Insurance Portability and Accountability Act (HIPAA) has made a lot of headlines over the past several years, demanding that healthcare facilities take certain precautions when it comes to the management of electronic health records. However, a surprising amount of small businesses have yet to experience government enforced standards for their industry. 41% of all small businesses say they do not have to comply with any type of standard or guideline.

ns ib 2

SMB Action for 2018: Network security cannot be thought of as optional. Just because your industry or business doesn’t fall under the umbrella of federal or state data security mandates, doesn’t mean that you should look at network security as unimportant. We’ve outlined through this article just how difficult sustaining a business is when you lose any data, let alone customer or vendor data. With 41% of surveyed companies not complying with even payment card index regulation, there is likely an opportunity for your organization to enhance its network security efforts. Hackers and social engineers aren’t becoming less prevalent, so the modern business should absolutely act accordingly. By aligning your organization’s network security policy with your organization’s computing strategies, you will go a long way toward mitigating risk, and keeping your data secure.

If 2017 taught us anything, it’s that everyone has to be cognizant of the treats of conducting business in the connected world. By being protective and really focusing on protecting yourself and your organization from software vulnerabilities, hackers, social engineering, and the many other threats we all face, you will be able to conduct business as usual; which, is all you can ask for with the exorbitant amount of situation that threaten the sustainability of your business.

For more information about these statistics or strategies to keep your organization from become just another victim, call Argentum IT’s IT professionals today at (502) 473-6407.

Tags:
Cybersecurity Network Security History

About the author

Dean Lause

Dean Lause

Dean Lause is a technologist to the highest degree. When he was in middle school, he learned and developed small programs using BASIC programming code on his Commodore 64. He was one of the first to post to bulletin boards on the newly emerging “Internet” and built a mini-network in his home. He competed in his senior year of high school, placing 1st regionally, 2nd in State and 17th Nationally in computer specialist competitions. Today, he enjoys technology as much as he did then. In fact, he has a “Smart Home,” with connected devices controlled by A.I., mobile apps, and voice commands. When he is ready to go to sleep, all he needs to say is “Good night,” and Voila! all of the lights in the entire house turn off, the doors lock, the TV/DVR turn off, the house alarm is set and the alarm clock for the morning is ready to go! After a 4-year stint in the Army as a computer specialist, Dean spent the next 20 years in Fortune 500 Enterprise IT environments. He quickly building his IT skill set, becoming an expert in VMWare and Citrix and various other technologies. Dean served as the Director of Network Infrastructure & Security of North American Operations in his last role before joining Argentum IT and completing his MBA with a specialty in Accounting in 2011. Dean understands not only the technical side of how devices work together and integrate within an environment, but also understands and designs the environment from a business point of view for productivity. He strives to provide cost-savings, efficiency and practicality to solve the real issues that are present for each individual client he works with. Leveraging his 20+ years’ of enterprise-level experience, for the past ten years, Dean has consulted with numerous Fortune 500 companies across the country on issues relating to network infrastructure and security, Citrix XenDesktop, VMWare implementation and capacity planning, Office 365/Exchange Email Migrations as well as Mobile Device Management and Disaster Recovery Planning. He has also been engaged to develop and improve technology processes as well as accomplish technology projects on time and budget. Today, Dean uses all of these skills and more to aid small to medium-sized businesses to utilize technology to run their companies more profitably and efficiently. As Chief Technical Officer of Argentum IT, LLC for the past ten years, Dean has supervised a proactive service desk who educates clients on technology best practices, designed multiple infrastructure environments for clients (both big and small), to fit their needs and built a sizeable hosted infrastructure environment – including VMWare and Citrix “products”. Dean’s breadth of experience affords him a unique view of IT and business challenges, which allows him to help customize and develop unique solutions to solving IT and Cyber Security challenges.

Author's recent posts

More posts from author
Wednesday, 04 June 2025 Mastering the 3-2-1 Data Backup Rule
Monday, 02 June 2025 If Your IT Resource Can't Explain ROI in 60 Seconds, It’s Time to Look Elsewhere
Friday, 30 May 2025 What Goes Into Data Backup? (It’s More Than You Think)
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, 05 June 2025

Captcha Image

Customer Login

Remember me
  • Forgot your password?
  • Create an account

News & Updates

On A Mission To Simplify IT, Dean Lause Turned His Parents IT Struggles Into Inspiration And Became The Premier IT Solution For Small and Medium Sized Businesses in Louisville, Kentucky

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Read More

Contact us

Learn more about what Argentum IT can do for your business.

(502) 473-6407

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.

Powered by JoomConnect
  • Home
    • Login / Logout
    • Create an Account
    • My Support Portal
    • My Subscriptions
    • Downloads
    • Billing Portal
    • My Virtual Desktop
    • Sitemap
    • Privacy Policy
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Video Gallery
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Barracuda Total Email Protection
      • Cisco-Certified Solutions
      • Fully Hosted Security as a Service
      • Enterprise Mobility Management Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Microsoft Azure
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • IT for Law
      • Manufacturing IT
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
      • Supply Chain and Logistics
      • eManagement Solutions
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • HP Official Dealer
      • Printer Management
      • Lenovo Official Reseller
      • Printer and Copier Support
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • Microsoft SharePoint
      • Microsoft SQL Server
      • Microsoft Partner Network
      • Document Management
      • Identity Management
      • Intranet Solutions
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Unified Communications
      • Conferencing and Collaboration
    • Media & Internet Services
      • Website Design
    • Cybersecurity
      • Cybersecurity Overview
      • Network Security
      • Business Security
      • Unified Threat Management
      • Endpoint Security Solutions
      • Asset Tracking
      • Mobile Device Management
      • Email Encryption
      • Multi-Factor Authentication
      • Spam Protection
      • Content Filtering
      • Phishing Simulation
      • Dark Web Monitoring
      • Penetration Testing
      • Compliance Standards
    • Surveillance and Access Control
      • Access Control Solutions
      • Security Cameras
  • Understanding IT
    • Blockchain
    • GDPR Compliance
    • Automation
    • Ransomware
    • Shadow IT
    • Your Virtual Identity
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • The Internet of Things
    • Network Security
    • SOX
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
    • News & Press Releases
    • Our Newsletters
  • Blog
  • Support
    • How to Request Support
    • Help Desk
    • Remote Support Tool
  • Contact us