Contact Us Today!
Glasgow 0141 428 4301
Perth 01738 310 271
Full Service IT
Support & Consulting
Glasgow 0141 428 4301 | Perth 01738 310 271
Remote Support

8 Cybersecurity Myths Debunked

26 February 2020

1.    Myth – Your business is too small to be targeted by hackers
       Reality – Small businesses made up almost half of last year’s victims

2.    Myth - Strong passwords are enough to keep your data safe
       Reality – Two factor authentication and data monitoring is also needed

3.    Myth - Anti-Virus software will keep your business completely safe.
       Reality – Software can’t protect against all cyber attacks

4.    Myth - If WiFi has a password, it is secure
       Reality – Any public WiFi can be compromised, even with a password

5.    Myth - Cyber security threats are only external
       Reality – Insider threats are just as likely, whether human error or malign intent

6.    Myth - Annual employee security awareness training is sufficient
       Reality – Regular phishing exams and staff training prepares employees to recognise attacks 

7.    Myth - You will right away if you are hacked
       Reality – Modern Malware is stealthy and hard to detect

8.    Myth – Cyber Security is solely the IT Departments responsibility 
       Reality – Every staff member should be familiar with good cybersecurity practices 

Reality by the numbers
•    81% of hacking related breaches leveraged either stolen and/or weak passwords
•    62% of SME’s do not have an up to date or active cybersecurity strategy in place
•    60% of SME’s will go out of business within 6 months of a cyber incident.
Sources: Verizon Data Breach Investigations Report and Vistage Cyberthreats and Solutions for Small and Midsize Businesses Report

If you would like some information on Cyber Security for your business, please get in touch with Control IT Solutions on 01738 310271


TAGGED IN: Small Businesses , Threats To Small Businesses, Perth, Dundee, Fife, Scotland, Stirling, Perthshire, Ransomware, Managed Service Provider, Cyber Security