{"id":808,"date":"2006-11-20T00:00:00","date_gmt":"2006-11-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/20\/small-companies-ignorant-of-security\/"},"modified":"2021-12-30T11:38:12","modified_gmt":"2021-12-30T11:38:12","slug":"small-companies-ignorant-of-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/20\/small-companies-ignorant-of-security\/","title":{"rendered":"Small companies ignorant of security?"},"content":{"rendered":"<p>Small businesses must become more aware that they are the potential victims of cybercrime, former White House security adviser Howard Schmidt has urged.  Speaking at an IT security event at London&#8217;s House of Lords on Monday, Schmidt said all businesses are at risk through a lack of proper configuration of security equipment, or through not taking proper security precautions.  &#8220;SMEs (small and midsized enterprises) are not aware of being a potential victim&#8211;spending 40 pounds per year on antivirus is not a high priority,&#8221; he said at the event, organized by managed services specialist Claranet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;SMEs have to realize that just because they are small, it doesn&#8217;t mean they won&#8217;t be targeted.  Bad guys target wherever they can get money.  Individuals working on peer-to-peer networks often don&#8217;t realize they&#8217;re sharing the whole contents of their drive.  You can find Homeland Security vulnerability assessment documents online from employees (using P2P).&#8221;<\/p>\n<p>However, Schmidt said that SMEs will eventually start using managed software security services, with third-party providers managing both low-cost application level security and end-point hardware.  They want automatically self-healing and self-configuring software,&#8221; said Schmidt.<\/p>\n<p>Small businesses must take security into account in their planning and decide whether to outsource security, invest in training or allocate more resources.  If a small enterprise does have a full-time IT manager, that manager should become familiar with security standards such as ISO 17799, he said.<\/p>\n<p>McMurdie said that computer security should follow common-sense procedures.<\/p>\n<p>http:\/\/news.com.com\/Small+companies+ignorant+of+security\/2100-7355_3-6137381.html?tag=ne.fd.mnbc<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-808","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=808"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/808\/revisions"}],"predecessor-version":[{"id":3295,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/808\/revisions\/3295"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}