Cybersecurity is currently an important challenge also for small and medium-sized enterprises. Cyber-attacks are growing exponentially due to warfare, and during the Metalloid pandemic, cyber-crime increased by up to 600 percent!
Ten to fifteen years ago, companies had their own IT infrastructures in physically secure server rooms, networks were protected by firewalls and anti-virus programs, we didn’t know smartphones or the cloud. Today, everything is vastly different from the former way of life, the new is evolving very quickly, for example, smartphones and cloud services are an essential part of our lives and work environment, and the pandemic has also changed conditions so that in many cases private devices are used for work, including cloud services such as Microsoft 365, email or SharePoint services.
So the question is, how safe and secure are these devices and services enough to protect a company’s data?
An unflattering look through the numbers
Let’s go through some numbers and facts about who cyber attacks affect the most and why they are alarming:
- In recent years, according to Microsoft statistics, there has been a nearly 30% increase in successful phishing attacks on businesses, regardless of whether they operate on-premises or cloud environments.
- Also, 93% of healthcare organisations have experienced different types of attacks in the recent past.
- 25% of ransomware attacks targeted the industrial sector.
- Up to 43% of attacks are definitely focused on small businesses, which represent the majority of the Slovak market.
Yes, almost half of cyber attacks are focused on SMEs, and up to 51% of these companies allocate almost no resources to cybersecurity and protection.
Why this is alarming
Let’s illustrate this with a seemingly (!) trivial example. Every company uses email communication on a daily basis. And even if it seems that the emails a company receives can’t do any harm, up to 94% of malware is spread through them. For attackers, it’s one of the easiest ways to get into a company’s network. They are particularly interested in email servers that are rented from hosting companies, as they are obviously the place of least resistance. And let’s move on: attackers have learned to transmit malicious content even in files that are historically allowed. Office documents such as Word, Excel, PowerPoint and PDF make up up to half of malicious attachments in emails today.
The fact that 95% of successful attacks are the result of human failure is on the table.
Cyber attacks are a real threat, so cybersecurity should be a priority for every business, regardless of its size. Investing in modern security solutions and employee training are elementary steps.
How to defend against attacks? GAMO ways to help
We will introduce you to two suitable security tools that can be effectively used to protect devices and networks from cyber threats: Microsoft 365 Defender and ESET Protect. They represent security against viruses, malware, ransomware and other malicious software.
Both of these tools are similar in some ways, but differ in layout, colour or graphic elements. They offer equivalent basic functions such as system scanning, malware detection and ransomware protection.
In addition, Microsoft Defender brings advanced features such as SmartScreen browsing protection, email client protection and an integrated firewall.
ESET Protect, on the other hand, has advanced configuration and management options that might be more suitable for companies with their own IT departments and complex security requirements.
Let’s take a look at each of these tools separately.
Microsoft 365 Defender
A comprehensive suite of services for advanced cyber protection and threat detection for organizations, called Microsoft 365 Defender, is designed for cloud services such as Exchange Online, SharePoint, Teams and more. In particular, it provides effective and powerful security monitoring and management. The clear and intuitive dashboard displays important detailed information in the form of graphs and charts helping to monitor all security aspects, collect and analyze logs, identify threats and present them in time-ordered reports. It allows you to respond to incidents in a timely manner and protect your company’s systems.
Microsoft 365 Defender then monitors not only servers and workstations, but also network elements and IoT devices. Its capabilities therefore extend beyond corporate networks. It can monitor and protect devices anywhere on the Internet, including private devices and systems, as well as Linux.
The integrated platform also provides information about incidents or security threats and monitors their severity. In addition, it can also monitor internal activities such as service configuration and potential risks associated with “grey” IT. It also provides important recommendations on how to resolve incidents or how to prevent them from occurring in the first place.
However, it is important to note that purchasing the platform alone will not be sufficient.
Proper implementation and regular monitoring, as well as employee training, form an important part of enterprise cybersecurity. With a robust tool such as Microsoft 365 Defender, enterprise security will definitely be in safe hands, which will be appreciated not only by large companies, but also by small businesses.
Microsoft 365 Defender and Education
Employees should be sufficiently educated and informed in areas of cyber security. As we write above: up to 95% of successful attacks are caused by the human factor, according to Microsoft statistics. This is where Microsoft 365 Defender can offer training to increase employee awareness and skills in cyber security.
Security training focuses on simulating various phishing attacks so that employees understand and recognise them. The goal is to teach how to think and react before opening suspicious links and attachments. Indeed, it is alarming that employees open suspicious attachments within 10 seconds of receiving an email. The integrity and security of the business is then at one of the highest levels of risk in an unsecured area.
ESET Protect
A very successful alternative to Microsoft Defender is ESET Protect. It could be said that the solution provides 95% of what a typical SME in Slovakia needs. In some cases, ESET can even be a cheaper option compared to Microsoft and its implementation and deployment are faster.
While Microsoft Defender is integrated into the Windows operating system, ESET Protect is a standalone security product, so it is also suitable for Linux or Lotus Notes IBM users. It provides both email server and Microsoft 365 protection. ESET has a smaller range of device management than Defender, which really can’t compete with it in this respect, but for small businesses in Slovakia it will certainly suffice. Setting basic restrictions such as blocking USB devices, Bluetooth on mobiles, or the Teams app screen, will be sufficient for the purpose of security in many cases.
Whatever you choose, you will always just do the right thing
When choosing between these two cyber protection tools, each company should consider its needs and requirements. In particular, the comparison of features, integration with existing systems, user interface, support and price will certainly weigh in the balance. For a large operation with the need for comprehensive management and configuration options, ESET Protect could be the right choice. If a company prefers an integrated solution, part of an operating system with advanced features, it would choose Microsoft Defender.
However, it should also be noted that security software is constantly being developed, updated and improved. It is also advisable to consider other security measures such as a firewall, backing up data or choosing the right security policy.
It should be remembered that every responsible company should have an XDR or EDR solution deployed in addition to antivirus to ensure the security monitoring of its infrastructure and devices. One of the two aforementioned security tools will also serve this purpose. While your network and devices may not be able to circumvent certain attacks, they will ensure that you have enough time to react. In fact, the service’s security tools alert you to a threat within minutes, giving any security-conscious company time to stop a potential attack.
GAMO not only provides the implementation of the companies’ security tools, but also takes care of security monitoring, detection and incident response as part of the SLA service – all guaranteed and turnkey, with expertise and experience.
We ensure that our clients’ companies are prepared and able to respond adequately to and withstand potential cyber attacks.
Time and preparedness, these are simply the watchwords that move the world today, not only in cyberspace.