menu szukaj
Weekly Online Magazine
ISSN 2544-5839

new articles each monday
zamknij
Work In Media

14.10.2024 Law in media

Illusory Security. Small and Medium Enterprises Easy Targets for Cybercrime

KF

35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.

Illusory Security: Small and Medium Enterprises Are Easy Targets for Cybercriminalsillustration: bing.com/create

The main reason for these fears is the increasing number of cyberattacks and the fact that these companies process large amounts of personal data, making them an attractive target for criminals.

Where Do These Fears Come From?

  • 59% of companies point to frequent, successful cybercriminal attacks as a cause for concern.
  • 29% highlight the processing of large amounts of personal data.
  • 26% believe they are an attractive target for data thieves.

At the same time, as many as 65% of entrepreneurs claim they are not worried about data theft. The primary reason given is good computer security (50%). Some companies believe they do not process a large amount of personal data (39%) or that they are not an attractive target for hackers (35%).

Attractiveness of SMEs for Hackers


In Poland, the SME sector employs 7.3 million workers, providing hackers with just as many potential victims. The vast majority of these companies (83%) store personal data in digital form, and 50% exclusively in electronic form. This data includes names, surnames, PESEL numbers, phone numbers, and addresses. Meanwhile, 38% of micro-enterprises store employee data on the owner`s computer, while medium enterprises do so on accounting computers (44%).

advertisement

It is surprising that 90% of companies in the SME sector declare that they properly protect their employees` data. The most confident are small (55%) and micro-enterprises (54%), which claim to have effective security measures. However, as many as 65% of the smallest companies do not regularly update their antivirus software. Medium enterprises also do not fare much better, as 44% of them neglect this basic principle of cybersecurity.

Data Protection Methods


Most companies in the SME sector secure their data using traditional methods:

  • 51% limit access to documents only to authorized persons,
  • 40% secure files with passwords,
  • 36% have alarms or anti-burglary doors,
  • 35% install up-to-date versions of antivirus programs.

Less popular methods include storing paper documents in safes (28%) and using remote locking in case external drives are lost (26%). The least frequently used methods involve default blocking of USB ports (19%) and requiring employees to regularly change their passwords (21%).

Experts warn that the lack of regular updates to antivirus software exposes companies to risk. Kamil Sztandera from ChronPESEL.pl, quoted by Newseria Biznes, notes that this illusory sense of security leads to underestimating threats, and SMEs may become easy prey for cybercriminals.



Share the article:

dodaj na Facebook prześlij przez Messenger dodaj na Twitter dodaj na LinkedIn

COMMERCIAL BREAK

See articles on a similar topic:

Local Media in Poland - The Press Owner Influence

Bartłomiej Dwornik
The editor-in-chief, according to the provisions of the Press Law, should be responsible for the content of the materials prepared by the editorial team as well as for the editorial and financial matters of the editorial office. This is the theory.

Cyber Attack on a Corporate Smartphone. How to Protect Yourself

KrzysztoF
Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.

What Data Google Collects. Privacy on the Internet

KF
According to a gs.statcounter.com report – May 2018, Google captures over 97% of internet users. Currently, many free applications are available to users. What does Google collect? When using the most popular search engine, we should be aware of how our data is collected and used.

Cyber Threats 2023: Phishing Dominates, AI Targeted

Krzysztof Fiedorek
The CERT Orange Polska 2023 report reveals a rapidly evolving cyber threat landscape. Phishing has taken a decisive lead, accounting for over 44% of reported incidents. Advanced social engineering techniques, deepfakes, and a surge in malicious ads lure users with promises of quick profits or easy opportunities.

GDPR in Media. Regulations Complicate Campaign Planning and Execution

BARD
Most Polish news portals and online stores have adopted consent mechanisms designed in a way that makes it hard to refuse consent

Data for Benefits: What Encourages Sharing Personal Information Online

Krzysztof Fiedorek
Most Poles are aware of the value of their personal data and do not share it without reason. However, one in five is willing to share data in exchange for benefits, and 16% of us do not remember if we have done so. These are the results of a study conducted by ChronPESEL.pl and the National Debt Register under the patronage of the UODO.

Local Media in Poland - Announcements

Bartłomiej Dwornik
Research by ComPress Agency, conducted among journalists in 2001, indicates that only 7 percent of them believe that PR specialists and press spokespeople understand journalists' needs well.

More in the section: Law in media

community

Facebook LinkedIn X Twitter Google RSS

Work in media

United States
New York • Washington DC • Los Angeles • Chicago • Houston • Phoenix • Philadelphia United Kingdom
London • Birmingham • Manchester • Liverpool • Glasgow • Edinburgh Canada
Toronto • Ottawa • Montreal • Calgary Australia
Sydney • Melbourne • Brisbane • canberra Ireland, New Zealand, India

advertisement





Reporter shopping

Reporter shopping

Affordable laptops, notebooks and netbooks
Affordable laptops, notebooks and netbooks
for writing
Digital SLR and compact cameras
Digital SLR and compact cameras
for photographers
Books and e-books about media
Books and e-books about media
for reading
Video drones and flying cameras
Video drones and flying cameras
for pilots
Gimbals for stabilizing video
Gimbals for stabilizing video
for those on the move
Software and apps for creative work
Software and apps for creative work
for digital creators
More occasions

advertisement
Read books and e-books

Read books and e-books

Okładka Understanding Media: The Extensions of Man
Understanding Media: The Extensions of Man
Okładka Media Control. The Spectacular Achievements of Propaganda
Media Control. The Spectacular Achievements of Propaganda
Okładka Social Media Marketing All-in-One For Dummies
Social Media Marketing All-in-One For Dummies
Okładka Beyond The Feed: A Social Media Success Formula
Beyond The Feed: A Social Media Success Formula
Okładka Trust Me, I`m Lying: Confessions of a Media Manipulator
Trust Me, I`m Lying: Confessions of a Media Manipulator
Okładka Hate, Inc.: Why Today`s Media Makes Us Despise One Another
Hate, Inc.: Why Today`s Media Makes Us Despise One Another
more books and e-books

Reporterzy.info

More about us

Our tools and services

Contact


© Dwornik.pl Bartłomiej Dwornik 2oo1-2o24