HP Networking
Discover how the new HP Networking combines the technologies and alliances of 3Com, ProCurve and TippingPoint into the next networking leader.

It's 2:00 A.M. Do you know where your data is?

taf.jpgWhenever I leave home, I always double check that I’ve locked all my doors and windows and, if I’m going to be home after dark, that some lights will be on when I return. I’ve even gone to the effort of installing timers, so that certain lights turn on and off at appropriate times. The last thing I want is a break-in, especially considering that I might lose the personal data that’s stored on my electronic devices.

 

What would be the worst thing your company could lose?   Many small and midsize businesses (SMBs) put security at the bottom of their list.  Here are some good reasons your organization needs to be more proactive when it comes to securing your intellectual property and sensitive proprietary data:

 

  • SMBs are facing a significant increase in cyber-attacks.  87% of small businesses had a security breach in the last year (up from 76% a year ago). [1]
  • Security breaches are costly.  According to a recent survey, “the average loss resulting from IT security incidents for mid-sized companies came in at roughly $50,000, of which approximately $36,000 is accounted for by the incident itself, while the remaining $14,000 comes from other associated expenditures.”[2]
  • The bring-your-own-device (BYOD) trend is adding new security challenges.  A recent article in SmallBusinessComputing.com states that “personal mobile devices rank among the greatest security threats your company faces” and adds that “several studies show that data breeches come more commonly from internal sources, .e.g., your employees, than from outside sources.”

In the event of a security breach, your company also stands to take a hit to its revenue, its productivity and, perhaps most insidious, its reputation.

 

According to a recent news item, thieves are taking advantage of the typically minimal security measures of small and midsize businesses, including those of technology startups: “Once they identify intellectual property worth stealing, the actual operation is often easy, given that the typical startup faces budget limitations and prioritizes Nerf guns, food deliveries and all-hours access to the office over robust security.”[3]

 

Securing the weakest link

 

91405-20121026.jpgMost people think of cyber security when discussing data theft, but the very real chance of a physical break-in exists. A friend of mine who works at a small consultancy that lacks the resources for a 24-hour surveillance system told me her building was broken into over the weekend. Among the items the thieves targeted were mobile devices such as laptops and tablets. While many thefts are purely opportunistic, others involve intricate planning, especially those concerning intellectual property.

 

Consider too that your network is only as secure as its weakest link. If your employees transfer company data to their mobile devices, you need to be sure you can clear all that data in the event those devices are stolen. It also makes sense to put in place a detailed security policy and educate your workforce about that policy, so that they understand the security implications of introducing personal devices to the company network.

 

According to a study by AMI-Partners[4], 25 percent of small and 51 percent of midsize North American businesses plan to implement additional security solutions this year to handle the increased risk introduced by the bring-your-own-device (BYOD) trend and the proliferation of company-owned mobile devices. These same companies have either already deployed (27 percent small and 48 percent midsize) or plan to deploy solutions this year (23 and 39 percent, respectively) to remotely locate and lock or wipe mobile devices that have been stolen or lost.

 

Take a proactive approach to security

The security of your business is important to us. Partner with us to help safeguard all your hard work—and your future innovations. Explore our range of “Just Right IT” networking solutions to help you build, maintain and expand a secure network infrastructure.



[1] 2013 Information Security Breaches Survey, Department for Business Innovation & Skills, United Kingdom

[2] 2013 Global Corporate IT Security Risks Survey, B2B International and Kapersky Labs
3“Tech startups take risks overlooking security,” San Francisco Chronicle, October 11, 2013.

[4] AMI-Partners, “2012 – 2013 North America SMB Mobility Landscape, Opportunity Assessment & Outlook,” 2012.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation