How to make your SME more resilient

According to the Flashpoint "2024 Global Threat Intelligence Report", hackers stole an almost unbelievable 17 billion pieces of personal data in 2023 alone. This is four times more than in the previous year and affects millions of people. 

The alarming increase in cases of fraud in all sectors can be attributed in particular to the weakness of defense mechanisms in companies. The reason for this is outdated protective measures. The need to improve the basics of cyber protection is not taken seriously by many SMEs or budgets are lacking. 

Do not underestimate cyber risks

Cyber threats are becoming increasingly complex and sophisticated. The days when attackers used simple malware or phishing campaigns are over. Cyberattacks have evolved and reached a new level of danger. 

What many SMEs do not yet really understand: Today, cybercriminals use advanced techniques that are often supported by sophisticated networks with significant financial resources. This gives them access to innovative technologies such as deepfake and AI-powered social engineering. This also makes it possible to bypass conventional security measures and obtain login credentials. 

According to IBM's Data Breach Action Guide, it takes an average of 277 days for a breach to be detected and contained: 207 days for detection and 70 days for containment. This means that during this time, hackers can choose the most promising target to take company data hostage.

Act now for more cyber security

Companies must act immediately to prepare for the latest cyberattacks and methods. The following small checklist helps to increase resilience against cyberattacks, among other things.

Step 1: Laying the foundations

These include, for example

  • Creation of protection plans
  • Introduction of a proactive security tool (such as our DEFENDERBOX)
  • Introduction of proper security controls and storage guidelines
  • Setting up immutable backups
  • Introduction of a "3-2-1" backup (three copies on two different media, one copy stored externally or in isolation)

Step 2: Risk management

This includes, for example

  • Regular performance of dark data and risk assessments
  • Identification and classification of sensitive data
  • Establishment of an isolated recovery environment in which data can be restored and checked
  • Ensuring the Runbooks documentation (according to the priorities of the company's business applications)

Step 3: Testing, review & training

Continuous further development of

  • Response and recovery plans through regular recovery exercises and simulations
  • Function of existing strategies
  • Regular scans for security vulnerabilities with extended networks
  • Team responses to "real" incidents through cyber awareness training, phishing tests and training by our partner KnowBe4

By creating a solid foundation and managing risks, SMEs can ward off current threats and minimize future dangers in good time. This includes proactive security tools such as the DEFENDERBOX with regular network scans for security gaps and vulnerabilities. But also training and tests that raise the awareness of all employees. 

Any questions? Please contact us. Try it out.

class="wp-image-6682"
class="wp-image-6682"

Current contributions


  • Over 80% critical security vulnerabilities
    Alarming results from our IHK cooperation on IT security at companies! Which critical security gaps were found in our pentests?
  • "Find & Fix" campaign to get to know each other
    Protect your company and find out which security gaps or vulnerabilities exist in your IT.
  • New DEFENDERBOX feature
    After each pentest (penetration test) with the DEFENDERBOX, our customers receive an email informing them of the status of the result.
  • DEFENDERBOX NIS-2 compliant
    Our DEFENDERBOX is NIS-2 compliant, i.e. the DEFENDERBOX reports document exactly all pentests that are valid as NIS-2 certification for the NIS-2 audits.
  • Targeted by cyber criminals
    If law firms fall victim to blackmail cyber attacks, the damage is particularly high. This is why ransoms are often paid. Investments in cyber security and insurance offer protection.
class="wp-image-6678"

Do you want to know how secure your company is? Try it out! Click here for a test installation of DEFENDERBOX.
The trial offer has been extended until September 30, 2024.

Comments are closed.