{"id":1992,"date":"2013-05-08T00:00:00","date_gmt":"2013-05-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/08\/few-businesses-appear-ready-to-defend-themselves-from-cybercrime-report-findsfew-businesses-appea\/"},"modified":"2021-12-30T11:40:25","modified_gmt":"2021-12-30T11:40:25","slug":"few-businesses-appear-ready-to-defend-themselves-from-cybercrime-report-findsfew-businesses-appea","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/08\/few-businesses-appear-ready-to-defend-themselves-from-cybercrime-report-findsfew-businesses-appea\/","title":{"rendered":"Few businesses appear ready to defend themselves from cybercrime, report findsFew Businesses Appea"},"content":{"rendered":"<p>Few companies may be ready to handle an attack from criminals lurking in cyberspace, and fewer know about the government\u2019s three-year-old cyber-security efforts, according to a national study. The study\u2019s authors concluded that results, while only a small snapshot of the millions of businesses big and small in Canada, point to gaps in how companies protect themselves from cybercrime, a finding that could be chalked up to little monetary damage to companies that fall victim to hackers. The cost of cybercrime to those businesses that fell victim to an attack was low, on average about $14,000 per incident, according to the companies surveyed.&nbsp;&nbsp;&nbsp;Cybercrime victims also reported little effects on their business reputation, according to the study from the International Cyber Security Protection Alliance, a non-profit group based in the U.K. Experts suggest that financial-effect figures may have to rise dramatically before small- and medium-sized businesses beef up their IT defences, since few appear ready to defend themselves from attackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The study released Wednesday found that of the businesses surveyed, about 70 per cent had no procedure in place to deal with a successful hack and only 22 per cent actually looked to identify where they were most vulnerable.<\/p>\n<p>There was even less awareness of the government\u2019s cyber-security strategy, with about seven per cent of respondents aware of the document that was released in 2010, and about 12 per cent aware of the government\u2019s cybercrime prevention campaigns.<\/p>\n<p>Of the 520 businesses surveyed in the national study, 69 per cent reported some kind of digital attack against them in the previous 12 months, with one-quarter saying the attack had \u201cconsiderable\u201d effects on their business. <\/p>\n<p>The telephone survey of 520 companies across Canada touched on companies in six industries \u2014 financial services, airlines and shipping, telecommunications, critical infrastructure, aerospace and defence, and retail \u2014 and companies with revenues from under $1 million up to more than $100 million.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1992","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1992"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1992\/revisions"}],"predecessor-version":[{"id":4479,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1992\/revisions\/4479"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}