14.10.2024 Law in media
Illusory Security. Small and Medium Enterprises Easy Targets for Cybercrime
KF
35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.
The main reason for these fears is the increasing number of cyberattacks and the fact that these companies process large amounts of personal data, making them an attractive target for criminals.
Where Do These Fears Come From?
- 59% of companies point to frequent, successful cybercriminal attacks as a cause for concern.
- 29% highlight the processing of large amounts of personal data.
- 26% believe they are an attractive target for data thieves.
At the same time, as many as 65% of entrepreneurs claim they are not worried about data theft. The primary reason given is good computer security (50%). Some companies believe they do not process a large amount of personal data (39%) or that they are not an attractive target for hackers (35%).
Attractiveness of SMEs for Hackers
In Poland, the SME sector employs 7.3 million workers, providing hackers with just as many potential victims. The vast majority of these companies (83%) store personal data in digital form, and 50% exclusively in electronic form. This data includes names, surnames, PESEL numbers, phone numbers, and addresses. Meanwhile, 38% of micro-enterprises store employee data on the owner`s computer, while medium enterprises do so on accounting computers (44%).
It is surprising that 90% of companies in the SME sector declare that they properly protect their employees` data. The most confident are small (55%) and micro-enterprises (54%), which claim to have effective security measures. However, as many as 65% of the smallest companies do not regularly update their antivirus software. Medium enterprises also do not fare much better, as 44% of them neglect this basic principle of cybersecurity.
Data Protection Methods
Most companies in the SME sector secure their data using traditional methods:
- 51% limit access to documents only to authorized persons,
- 40% secure files with passwords,
- 36% have alarms or anti-burglary doors,
- 35% install up-to-date versions of antivirus programs.
Less popular methods include storing paper documents in safes (28%) and using remote locking in case external drives are lost (26%). The least frequently used methods involve default blocking of USB ports (19%) and requiring employees to regularly change their passwords (21%).
Experts warn that the lack of regular updates to antivirus software exposes companies to risk. Kamil Sztandera from ChronPESEL.pl, quoted by Newseria Biznes, notes that this illusory sense of security leads to underestimating threats, and SMEs may become easy prey for cybercriminals.
COMMERCIAL BREAK
See articles on a similar topic:
Local Media in Poland - Court Cases
Bartłomiej Dwornik
Investigative journalists in local newsrooms often remain in the shadow of their colleagues from national outlets, despite frequently being the first to uncover a scandal.
Harassment of Female Journalists in Poland. Zamenhof Institute Report
RINF
Over half of female journalists have experienced harassment. The report and a dedicated website for the project, offtherecord.zamenhof.pl, present real, anonymous stories of harassed female journalists, along with numerical data documenting the scale of the issue.
Local Media in Poland - Corrections
Bartłomiej Dwornik
The regulations regarding corrections are perhaps the most frequently violated rule in Polish media. There is a clear division between those who never admit to mistakes and those who can humbly accept their faults.
Cyber Attack on a Corporate Smartphone. How to Protect Yourself
KrzysztoF
Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.
What Data Google Collects. Privacy on the Internet
KF
According to a gs.statcounter.com report – May 2018, Google captures over 97% of internet users. Currently, many free applications are available to users. What does Google collect? When using the most popular search engine, we should be aware of how our data is collected and used.
Cyberwarfare on the Internet. The ESET Report
KF
Governments, corporations, and even the education sector are becoming targets of advanced cyber attacks. The report for the period from October 2023 to March 2024, prepared by ESET, sheds light on the intensification of activities by Advanced Persistent Threat (APT) groups, which conduct espionage, sabotage, and destabilization operations in key sectors on behalf of states.
Deepfake. A Powerful New Weapon in The Information War
Krzysztof Fiedorek
One of the newest threats to the credibility of information is deepfake technology. Deepfake is a type of false video or audio material where the person in the recording appears to speak or behave in a way that does not align with reality.