[Expert Opinion] Cybersecurity Challenges for SMEs in 2021

Talkspirit
2021-10-02
6
min.

Temps de lecture: 6 minutes

Large companies aren’t the only ones hackers hit—far from it. According to a 2019 Verizon study, 43% of cyberattack victims are small and medium-sized businesses, and this statistic has only increased since the Covid-19-related surge in remote work. This puts company networks even more at risk.

Early 2021 is an ideal time to review the cybersecurity challenges facing SMEs. 

What are the main threats, and where do they come from? What actions should be taken to protect against them? What benefits can be expected from an effective cybersecurity approach?

To address these questions, we talked with two professionals particularly concerned about these challenges: 

  • Laurent Hausermann, IoT Security Engineering Director at Cisco
  • Winoc Coppens, Information Systems Director for French media outlet 20 Minutes

In this interview, they give us their analysis of the main cyber risks facing SMEs in 2021, as well as their key advice on how to fight cyberattacks.

Summary

The main cyber risks in 2021 for SMEs

In 2020, teleworking and the growth of BYOD (Bring Your Own Device, or the use of one’s personal equipment in a professional context) have encouraged and accelerated cyberattacks. According to a Proofpoint study, 9 out of 10 French companies were victims of cyberattacks during the last calendar year.

Three types of attacks target SMEs in particular:

Malware/ransomware

For Winoc Coppens, the first threat for SMEs is malware and ransomware

Malware includes “viruses that encrypt data, preventing employees (or even entire companies) from accessing files.” It’s one of the “simplest” attacks for hackers, who “fish for big bucks” by sending a corrupt message to a set of email addresses—with hopes that at least one recipient will open it on his or her workstation. 

In short, it consists of taking the company’s data hostage, and then demanding a ransom [hence the name ransomware] to unblock access to it,” explains Laurent Hausermann. 

“In this type of attack, attackers always operate in the same ways:

  • The attacker identifies an initial distribution point such as an email with malicious links sent to employees.
  • After the recipient clicks the link in the email, the malware is automatically installed on the employee’s computer—or even on the company’s server. 
  • We often observe a phase of lateral displacement where ransomware replicates itself very quickly from one server to another. By the end of its propagation, the company’s entire IT system is locked down.”

Once the data is blocked, the hackers return to the company to demand money in exchange for decrypting/unlocking the data. This is a classic racketeering practice that has continued to evolve with the digital economy.

Denial of Service (DDoS) attacks

DDoS attacks, or denial of service attacks, consist in “making a web site or service inaccessible by creating a massive influx of traffic that cripples the server,” explains Winoc Coppens. 

Except for SMEs whose business is selling products or services online, these attacks are less common than malware and ransomware, and don’t often wreak as much havoc. 

Internal threats

More difficult to detect, internal threats come from anyone who has access to your company’s sensitive data. These can include employees, suppliers, partners, and even former employees. 

These threats can be unintentional and linked to an accident or negligence on the part of a user, which happens most often. They can also be malicious, with an intent of harming the company.

“The ‘classic’ move, which happens from time to time, is that of a former or even current employee who’s frustrated by his or her fate, and comes back to connect and delete files,” warns Laurent Hausermann.

Key actions to take

To anticipate these various risks, Laurent Hausermann believes that the IT department must devote significant and proactive efforts to put in place both tools and preventive actions. The order of thought? The IT department has to spend around 10% of its total IT budget:”

Basic rules of IT hygiene 

For Cisco’s Director of Engineering and IoT Security, “the priority for SMEs is implementing basic rules of IT hygiene,” like:

  • regular backups
  • subscription to a cyber insurance policy, “which will allow you guidance from a specialist in case of an attack.”
  • implementation of a policy for regular system updates
  • implementation of a password management policy
  • deployment of antivirus software
  • conducting an annual safety audit

These IT hygiene practices are already an important bulwark against many risks (as recently pointed out by the CISA Cybersecurity & Infrastructure Security Agency, an entity dedicated to cybersecurity and reliant on the US government). 

Securing remote access 

Then it needs to “secure access to data and cloud platforms remotely”—especially with the proliferation of teleworking and access to remote services. 

For this, Laurent Hausermann outlines several good practices:

  • Set up a secure VPN.
  • Review remote access management and regularly update the list of users who can access company resources to fight against internal threats.
  • Use a two-factor authentication system, which allows the identity of the employee to be verified in two steps (via PC and cell phone).
  • Implement mobile device management (MDM) solutions to remotely erase data in case of loss or theft of the device.

Such is the spirit of the Zero Trust approach now favored by experts.

Also read:  Hybrid Work: How to Secure Company and Employee Data?

Network segmentation

Winoc Coppens also stresses the importance of “segmenting the network,” or dividing companies’ applications and infrastructure into different segments to contain cyberattacks and prevent them from spreading to other areas.

“The idea is to choose several modules and solutions and install them on different systems or servers. It’s well known that you shouldn’t put all your eggs in the same basket.” 

Another alternative to reduce attack surfaces is to limit the emails exchanged on a daily basis—especially internally.” Adopting a collaborative platform will allow you to exchange information live on a team chat, thus reducing internal email flows… and therefore the danger.

Also read: How Bergamot Reduced its Emails by 95% and Boosted Productivity with Talkspirit

Awareness and training

Finally, and most importantly, users must be regularly trained and made aware of the risks and good security practices. This is an essential step in making them aware of their role and getting them to adopt the right reflexes. 

To accomplish this, companies can “organize quarterly informational meetings on cybersecurity risks and make some of them mandatory,” proposes Laurent Hausermann. 

The goal is to empower users

“At 20 Minutes, we invite employees to apply the same best practices in their professional and personal spheres. The challenge of this awareness is that they end up seeing these precautions not as constraints but as reflexes that are in their own interest,” explains Winoc Coppens. 

To develop these training sessions, the company can rely on numerous online resources. For example, “ANSSI offers webinars and documentation on its website that are very useful for CIOs,” says Winoc Coppens. 

Also read:  Vincent Montet, EFAP: “Training Is One Answer to ‘Digital Darwinism.” 

There are several platforms for training. Laurent Hausermann mentions in particular the NetAcad program from Cisco, which offers online courses to develop computer skills. For the cybersecurity expert, “It’s important to offer this training opportunity to employees because— through knowledge and skills—they’ll be able to identify the cyber threats that surround them.”

“Another good practice is to join a CIO club” in order to exchange on the best solutions to implement and share feedback with peers.

Benefits of an effective cybersecurity policy

According to the same two professionals, putting these steps in action offers SMEs two important advantages:

A challenge of sustainability

“A company that has implemented several good cybersecurity practices gives itself a better chance of survival in the face of an attack,” says Laurent Hausermann. Indeed, some companies do not recover from such attacks, or if they’re already fragile, this can be their final blow (as happened to lingerie brand Lise Charmel in 2020).

However, still too few companies are taking the necessary steps. According to the National Cybersecurity Alliance, 60 percent of small and medium sized businesses that are victims of a cyberattack go bankrupt after six months, demonstrating their vulnerability to an unforeseen event.

A competitive advantage

Having an effective cybersecurity policy can also be a competitiveness factor for the SME, because it reassures not only customers and partners but also employees,” explains Winoc Coppens.

Indeed, decision-makers are demanding more and more guarantees from partners or subcontracting companies. They will have more confidence in an SME that pays particular attention to the security of its data, and will be more likely to work with it. 

In the future, Laurent Hausermann believes “governments and large companies will bolster IT security requirements in their tender offers and will require their suppliers to comply with these criteria.”

*
*   *

In 2021, CIOs and IT managers in French SMEs will need to double their efforts to effectively protect their companies from various cybersecurity threats. In addition to strengthening infrastructures, awareness and training will also be essential. This is a major challenge for IT and Human Resources departments alike.

Want to find out more about good cybersecurity practices and the tools to be implemented in a hybrid work context combining remote and onsite work? Read our white paper “Future of Work: Make Way for Hybrid Work.”

Access White Paper

In our white paper “The Future of Work: Make Way for Hybrid Work!” you’ll discover the eight main challenges of hybrid work; best practices that managers, HR, internal communication, IT, and employees all can adopt; and the tools for facilitating hybrid work.

Download



_
Author: Emmanuelle Abensur

Inscrivez-vous à notre newsletter
En vous inscrivant vous acceptez notre politique de confidentialité et consentez à recevoir des nouvelles de notre entreprise.
Envoyer
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
ALLER PLUS LOIN

Vous avez les ressources pour passer à l’action

2025-02-17
10
min.

Management toxique : de quoi s’agit-il, et comment y faire face ?

2025-02-17
10
min.

[Expert Opinion] How Can We Improve Diversity, Equity and Inclusion in the Workplace?

2025-02-10
28
min.

Qu'est-ce que la méthode OKR ? Définition, avantages et exemples

2025-02-10
9
min.

[Expert Opinion] How to Build Resilience in the Workplace?

2025-02-03
6
min.

Improving Nonprofit Governance with Talkspirit: A Testimonial from the French Association of Diabetics

2025-02-03
10
min.

Qu'est-ce que le self-management ?

2025-01-30
10
min.

Le guide ultime pour faire des réunions de triage efficaces (+ un modèle d'ordre du jour inclus)

2025-01-30
9
min.

How to Train Your Managers to be Better Leaders

2025-01-27
6
min.

Qu'est-ce que la gouvernance partagée ?

2025-01-27
8
min.

Using Biomimicry as a Lever for Business Innovation and Resilience

2025-01-24
7
min.

Top 10 Technology Trends in 2025, According to Gartner

2025-01-22
5
min.

Ignite Potential: A New Chapter for Talkspirit

2025-01-02
7
min.

Top HR Trends in 2025, According to Gartner

2024-12-26
6
min.

5 Strategies That Can Help Improve Employee Autonomy at Work

2024-12-19
6
min.

HR: Watch Out for These Employee Burnout Signs

2024-12-12
min.

[Expert Opinion] Elmy’s Journey to Becoming a Mission-Driven Company

2024-12-09
5
min.

Regenerative Business: the Trend Taking Companies by Storm

2024-12-05
6
min.

How can companies combine digital sobriety with well-being at work?

2024-11-29
7
min.

Agile Methodology: What Are the Pros and Cons for Businesses?

2024-11-19
8
min.

Creating OKRs Aligned with Your ESG Goals: a Step-by-Step Guide

2024-11-13
8
min.

Implementing Accessibility in the Workplace: Key Strategies and Best Practices

2024-11-13
6
min.

8 Steps to Create a Collective Intelligence Framework that Speeds Up Decision-making

2024-11-12
7
min.

Comment mesurer l’impact social et environnemental d’une entreprise ?

2024-11-07
7
min.

Management agile : 7 clés pour embarquer vos équipes

2024-11-07
5
min.

Meta Meltdown: What Can We Learn from the Workplace Closure?

2024-11-06
8
min.

How Can You Promote Sustainable AI in the Workplace?

2024-11-04
5
min.

Collaborative Platform: Definition and Challenges

2024-11-03
5
min.

20 collaborative tools to improve employee productivity

2024-10-29
8
min.

Parole d’expert : Comment améliorer l’équité, la diversité et l’inclusion en entreprise ?

2024-10-28
6
min.

7 Best Practices for Leveraging Emotional Intelligence as a Leadership Tool

2024-10-23
7
min.

RH : Les symptômes de burnout auxquels il faut être attentif

2024-10-17
7
min.

Améliorer l’autonomie au travail, c’est possible avec ces 5 leviers

2024-10-10
5
min.

Do Purpose-Driven Companies Outperform Traditional Ones?

2024-10-09
10
min.

Best Leadership Practices for Boosting Employee Engagement

2024-10-08
7
min.

[Parole d’expert] Comment devenir une entreprise à mission ?

2024-10-08
6
min.

Turn your employees into ambassadors for your enterprise social network!

2024-10-01
8
min.

How Does AI Impact Employees Within an Organization?

2024-10-01
6
min.

How can AI shape the future of self-management: insights from the academic literature

2024-10-01
7
min.

10 exemples d’utilisation du biomimétisme en entreprise

Article
2024-10-01
6
min.

Gartner’s 10 technology trends for 2024

2024-09-30
9
min.

What Participative Decision-Making Can Bring to Your Organization

2024-09-30
8
min.

How the Next Generation Company Is Redefining the Future of Work

2024-09-30
6
min.

How Do You Tactfully Handle a Micromanaging Boss ?

2024-09-30
8
min.

How Do You Give Constructive Feedback to Your Peers in a Self-Managing Organization?

2024-09-30
8
min.

How Consent-Based Decision-Making Works

2024-09-30
8
min.

From Corporate Hierarchy to Agility: How to Create Engaged and High-Performing Teams?

2024-09-30
7
min.

Driving Culture Change with Holaspirit: Insights from Welser Profile

2024-09-26
6
min.

5 Interesting Ways AI Can Transform Knowledge Management Processes

2024-09-17
7
min.

Critères ESG : pourquoi et comment les intégrer dans votre stratégie RSE ?

2024-09-10
10
min.

How Can You Improve Organizational Agility in the Workplace?

2024-09-10
5
min.

L’entreprise à impact : LA réponse aux défis du développement durable

2024-09-09
9
min.

How to Improve Cross-functional Team Collaboration

2024-09-05
6
min.

[Expert Opinion] Amicio’s Best Practices for Agile and Effective collaboration

2024-09-03
6
min.

Les entreprises à mission sont-elles plus performantes que les entreprises traditionnelles ?

2024-08-29
7
min.

Raison d’être, vision, mission : de quoi parle-t-on ?

2024-08-29
7
min.

Performance Management: 4 Keys to Building Effective Teams

2024-08-22
6
min.

Managers: 8 Hacks for Improving Teamwork Efficiency

2024-08-20
6
min.

Entreprise régénérative : de quoi parle-t-on ?

2024-08-13
6
min.

7 techniques éprouvées pour responsabiliser ses collaborateurs

2024-08-12
6
min.

Sustainable performance: the art of combining productivity and social responsibility

2024-08-09
6
min.

How Do I Set Up My Internal Communication on Corporate Social Responsibility (CSR)?

2024-08-08
6
min.

5 Examples That Show How Different Organizations Can Leverage the Same Collaborative Platform

2024-08-06
6
min.

[Webinaire] Opportunités et risques de l’IA : ce que les entreprises nouvelle génération doivent absolument savoir !

2024-08-04
5
min.

How to implement an enterprise social network in your company

2024-08-02
7
min.

How will artificial intelligence transform the way we work?

2024-07-30
7
min.

Nos 15 podcasts de management préférés

2024-07-25
8
min.

Key Employee Engagement Data from Gallup's 2024 Study

2024-07-25
10
min.

13 Icebreaker Ideas for More Dynamic Team Meetings

2024-07-23
7
min.

6 bonnes pratiques pour améliorer la cohésion d’équipe

2024-07-22
5
min.

Why Scale Ups Opt for a Self-Management Tool?

2024-07-22
5
min.

Why Is Accountability Important in the Workplace?

2024-07-22
8
min.

The Pros & Cons of Going Teal

2024-07-22
3
min.

The Power of Spotify Squads

2024-07-22
8
min.

Setting Roles Into Your Organization

2024-07-22
6
min.

How to Implement Effective Self-Management in the Workplace

2024-07-22
7
min.

Empowering the right people in the right roles

2024-07-22
7
min.

Our Step-by-Step Guide to Effective Governance Meetings

2024-07-22
5
min.

How to Measure the Success of Holacracy in Your Organization

2024-07-22
5
min.

Integrative Decision-Making VS Consensus

2024-07-22
9
min.

How the Liberated Company Unleashes Your Employees’ Potential

2024-07-22
8
min.

How To Instil Self-Advocacy in Employees and Build Stronger Teams in the Process

2024-07-22
10
min.

💥 How can Scaleups Grow Faster and Successfully by Integrating Strategy into their Organization Structure?💥

2024-07-22
10
min.

Everything you Need to Know About Organizational Health

2024-07-22
4
min.

Finding Your Organization’s Purpose

2024-07-22
15
min.

50 Effective Employee Engagement Strategies

2024-07-22
9
min.

Effective Team Meeting: Strategies, Agendas, and Checklist Included

2024-07-19
8
min.

Why Should you Consider Implementing a Shared Leadership Model?

2024-07-19
10
min.

What is Shared Governance?

2024-07-19
7
min.

5 Tactics to Adapt Your Business to a VUCA World

2024-07-19
5
min.

How Does Employee Engagement Affect Business Results

2024-07-19
6
min.

Agile Trends 2024: What is the Next Wave of Agile Transformation?

2024-07-18
6
min.

What Makes Self-Managed Teams Unique?

2024-07-18
5
min.

The Influence of Company Culture On Employee Engagement

2024-07-18
7
min.

How Does a Flat Organization Actually Work?

2024-07-18
5
min.

Essential Meeting Room Equipment for Modernizing Your Workspace

2024-07-16
9
min.

What Does a Transparent Company Actually Look Like?

2024-07-16
13
min.

What Is Self-Management?

2024-07-16
17
min.

The Best Self-Management Tools for Your Organization

2024-07-16
7
min.

What is Sociocracy? Introducing a Toolkit for Agile Organizations

2024-07-16
8
min.

Teal Organization: Everything You Need to Know