Category

Facts & Figures

Category

This category is a catch-all for any uncategorised content.

SMEs tend to believe that hackers are much more interested in large companies. However, this is a wrong assumption. In most cases, hackers use tools which autonomically search the internet for weak points in the defense systems of organizations’ IT systems – without making a distinction based on the size of the organization – and try to work their way in. The fact that smaller organizations’ security systems are often less sophisticated than those of large companies, makes those smaller organizations more vulnerable.

People change jobs all the time. This entails quite some extra work – mainly administrative tasks – on the employer’s side. One of those tasks is to delete all passwords and close all accounts the former employee was using. This seems like a logical and important step and yet it is often overlooked. This leads to the existence of so-called ‘orphan accounts’, which could be hazardous for your company…

When you are confronted with a data breach, you’ll want to close the leak first, which results in IT-related costs. You also have to communicate quite intensively to several stakeholders during the entire process. On top of that, your organization might also have to pay regulatory fines (SOx, GDPR, NIS, …) and legal costs. And last but not least, long tail costs, caused by the loss of customers, and a damaged reputation and goodwill make the total cost even higher.