Cybersecurity and Medium Businesses: Five tips that can help them protect their data
Sunday 11 June 2023 13:29 - الأحد ٢٣ ذو القعدة ١٤٤٤
By ; Adel Elansary
Senior Regional Pre-Sales Manager, Egypt, Libya and Levant, Dell Technologies.
Whether it’s creating new job opportunities, driving innovation, or bringing competition to the marketplace, medium-sized businesses (MBs)are the lifeline of thriving economies. A report from the “the European Union in 2021, that small and medium businesses are 44.6% of all private businesses in Egypt.
Despite being a formidable contributor and cornerstone of growth and progress across the EMEA region, MBs are often the most vulnerable when it comes to cyber security and data protection. While protecting business data has become a critical priority for organizations of every size, the task has become increasingly complex and costly, not to mention time-consuming.
A Growing IT Challenge
It is estimated that 47 percent of all cyberattacks target medium businesses, with extremely costly consequences ranging from lost productivity to business success.
Attacks against major corporations grab front-page headlines, but, in reality, businesses of all sizes are vulnerable. Medium businesses, lacking the extensive resources and specialist skills of large corporations, are particularly at risk. On average, medium-sized businesses have limited IT staff personnel and with a lean team, time is precious. And as the challenges of data protection continue to mount, the pressure for IT teams to reduce cost and to “do more with less” continues to grow.
While there is no silver bullet for cybersecurity and no business is impenetrable, there are some very practical steps that medium businesses can take to make their business more resilient:
1. Educate and motivate users: According to a study conducted by Gartner, by 2025, human failure will be responsible for over half of significant cyber incidents, including social attacks, errors and misuse. Consider how employees are accessing data and which parts of your business contain data that is the most valuable. It is also critical to consistently educate your employees on cybersecurity issues and best practices, as they are the weakest link in the security chain! Educate them often and drive accountability to make sure all your data stays safe.
2. Focus on the data: We live in a data-driven world. IT runs wherever the business takes it, and data is created and accessed anywhere. Today, “infrastructure” means data storage and hyperconverged systems, servers, networking and data protection that may be physically distributed or delivered as a service but regardless of how IT infrastructure is consumed, it must be trusted and protected. We get caught up talking about protecting devices, but the device is just the container. Attackers care about what is in the container, not the container itself. The conversation should be about how to protect data, not devices. It is critical to regularly back-up data and utilize data-centric encryption, which is the preferred method for encrypting data as it moves across devices and the network.
3. Strengthen cyber resiliency and help reduce security complexity: According to the 2022 Dell Global Data Protection Index (GDPI) survey, 91% of organisations are either aware of or planning to deploy a Zero Trust architecture – a cybersecurity model that shifts how organizations approach security from relying solely on perimeter defenses to a proactive strategy that only allows known, authorized traffic across system boundaries and data pipelines. With embedded security features designed into the hardware, firmware and security control points, this holistic approach helps organizations achieve Zero Trust architectures to strengthen cyber resiliency by offering integrated data protection software, systems and services to help ensure data and applications are protected and resilient wherever they live.
4. Explore and invest in simple, scalable and efficient pay-per-use consumption models: With the availability of flexible payment and as a service solutions, medium businesses can count on experienced vendors for traditional data protection challenges like building and managing the physical infrastructure. Today, organizations can choose how they consume and pay for IT and scale as needed to address the changing needs of their business.
5. Reinforce your security posture with Managed Detection and Response (MDR) Services: Medium businesses often struggle to keep pace with the increasing number of ever-evolving security threats. Challenges abound, from finding and retaining knowledgeable security professionals, to interpreting fragmented data from disparate security products. Detection and Response is a fully managed, end-to-end, 24x7 solution that monitors, detects, investigates, and responds to threats across an organization’s entire IT environment. Whether an enterprise consists of 50 endpoints or thousands, MDR quickly and significantly improves the company’s security posture while decreasing the burden on IT personnel.
Finally, it’s important to note that medium businesses often find themselves stuck between technology solutions for medium business and enterprise business. The good news is they can use both. As long as the solution produces results for their business, it doesn’t matter which side the business leans toward. And against the backdrop of the challenges medium businesses face, from financing and fulfilling orders, to managing employees and meeting regulations, to just keeping the lights on, having flexibility in technology solutions and a successful cyber recovery strategy is critical.