January 17, 2018 By Larry Loeb 2 min read

Human error remains one of the top vulnerabilities leading to cyberattacks, according to recent research. A new report from Kaspersky Lab found that employee carelessness accounted for 46 percent of breaches in the past year, suggesting an urgent need for stronger policies and increased security awareness.

Weak IT Security Policies Put SMBs at Risk

Unsurprisingly, only 12 percent of the nearly 8,000 employees surveyed said they fully understood their organization’s IT security policies. Another 24 percent said their organization lacks a concrete cybersecurity framework altogether.

In addition, roughly half (49 percent) of employees said they consider cybersecurity to be a shared responsibility. This is particularly troublesome for small and midsized businesses (SMBs), many of which have employee-owned devices on their networks and inadequate or nonexistent policies to govern them. Others divide responsibility inefficiently among the IT department and nontechnical workers.

For these reasons, SMBs have historically been prime targets for common cyberthreats such as ransomware. Lack of skilled IT employees and financial resources only exacerbates this problem.

Improving Security Awareness

The study also noted that executives, HR leaders and finance specialists were among the most at-risk employees. According to TechRepublic, these employees’ access to sensitive information makes them particularly valuable targets for threat actors.

“The issue of unaware staff can be a major challenge to overcome, especially for smaller businesses where a cybersecurity culture is still being developed,” Vladimir Zapolyansky, head of SMB business at Kaspersky Lab, said in a press release. He further noted that businesses should focus on increasing security awareness among employees and implement solutions that are simple enough for nontechnical workers to use but powerful enough to protect the organization from advanced cyberthreats.

The SMB Security Conundrum

The security conundrum facing SMBs is complex, since effective solutions require significant time, effort and financial resources, which are rare commodities. Still, the main issue revealed in the Kaspersky report — low security awareness among employees — is something all organizations can and should improve with better engagement among top leadership and better communication between security professionals and nontechnical employees.

More from

Working in the security clearance world: How security clearances impact jobs

2 min read - We recently published an article about the importance of security clearances for roles across various sectors, particularly those associated with national security and defense.But obtaining a clearance is only part of the journey. Maintaining and potentially expanding your clearance over time requires continued diligence and adherence to stringent guidelines.This brief explainer discusses the duration of security clearances, the recurring processes involved in maintaining them and possibilities for expansion, as well as the economic benefits of these credentialed positions.Duration of security…

White House cements CISA’s role as national coordinator for cybersecurity

2 min read - In 2013, the Obama Administration rolled out "The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience", a forerunner to the Cybersecurity and Infrastructure Security Agency (CISA), created "to strengthen and maintain secure, functioning and resilient critical infrastructure."The directive was groundbreaking in 2013, noting the importance of the rising risk of cyberattacks against critical infrastructure. But as cyber risks are constantly shifting, every cybersecurity program needs to be re-evaluated, and CISA is no exception. That’s why, in April 2024, President…

How a new wave of deepfake-driven cybercrime targets businesses

5 min read - As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.Between 2023 and 2024, frequent phishing and social engineering campaigns led to account hijacking and theft of assets and data, identity theft, and reputational damage to businesses across industries.Call centers of major banks and financial institutions are now overwhelmed by an onslaught of deepfake calls using voice cloning technology in efforts to break into customer…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today