If you think most data breaches are due to malicious insiders, you’d be wrong. Forrester found that only 12% of security incidents are caused by disgruntled employees with mal-intent. Whereas, a whopping 27% of security breaches were caused by employees’ inadvertent misuse of data.2

This means that if your company does experience a security breach, it’s 2x as likely to be perpetrated by a reliable employee rather than a disgruntled worker.

In short, your best employees could also be your greatest risk.

 

As an SMB, protecting against internal vulnerabilities is important because 50% of companies that experience a data breach fold within six months. Your business can’t afford to be without checks and balances to ensure internal risks are minimized.3

A comprehensive security-as-a-service solution should include ongoing internal vulnerability detection, alerts, and remediation options.

Even if your company is able to effectively detect internal vulnerabilities, experts recommend hiring a third party to evaluate risks at least once per year. Not all security service providers are the same. We can provide and perform this important task for your company.

To learn more about how to prevent internal vulnerabilities, call 910.538.3196.

1. Forrester report finds most data breaches are caused by employees, John E. Dunn, PC World, September 24, 2012.

2. PC World, 2012.

3. The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses, Louis A. Aguilar, The U.S. Securities and Exchange Commission, October 19, 2015.

Cybersecurity-as-a-Service Plan Comparison

Feature

Bronze* Silver

Gold

Platinum

Configure Basic Policy Set

Initial Configuration of SMART-TAGS

On-going Smart-Tag refinement

False Positive adjustments

Configure Suspicious Logon policies

Identify and configure Locked Down Computer policies

Configure specialized DMZ Patching Policy

Perform Weekly Internal Vulnerability Scan and Identify High-Risk Items

Configure Compliance Level Policies

Monitor Changes on Wired and Wireless Networks

Investigate Alert (authorized by customer in process flow)

Additional

Additional

Additional

Additional

Perform Remediation (authorized by customer in process flow)

Additional

Additional

Additional

Additional

 

*Bronze plan free for existing clients only