SlideShare a Scribd company logo
1 of 29
Get the report: http://www.cisco.com/go/smbreport
If you own or
work for a
small or
medium-sized
business
You’ve likely already
overcome significant
challenges
Get the report: http://www.cisco.com/go/smbreport
Get the report: http://www.cisco.com/go/smbreport
And when you’re
faced with
unprecedented
situations
Get the report: http://www.cisco.com/go/smbreport
You come up with
ways to stay
productive and
competitive
Get the report: http://www.cisco.com/go/smbreport
In times of crisis, fresh ideas
emerge while you adapt to
new approaches to working.
Get the report: http://www.cisco.com/go/smbreport
And that’s true for
cybersecurity, too.
Indeed, our latest report
captures how other
SMBs are protecting
their organizations
from cyberattacks
Big Security in a Small
Business World
10 myth busters for
SMB Cybersecurity
Cisco Cybersecurity Report Series 2020
Get the report
cisco.com/go/smbreport
Get the report: http://www.cisco.com/go/smbreport
In the report you can also…
Get the report: http://www.cisco.com/go/smbreport
Find out how small and
medium-sized businesses
are tackling cybersecurity
challenges
Get the report: http://www.cisco.com/go/smbreport
And…
Get the report: http://www.cisco.com/go/smbreport
See how SMB
efforts compare
to those in larger
organizations
Get the report: http://www.cisco.com/go/smbreport
Based on a
survey of almost
500 SMBs
Defined here as organizations with 250-499 employees
Get the report: http://www.cisco.com/go/smbreport
…Spoiler alert,
they’re more than
holding their
own.
Get the report: http://www.cisco.com/go/smbreport
It can sometimes seem as
though vendors assume you
don’t take security seriously
Get the report: http://www.cisco.com/go/smbreport
and then proceed to
“cybersplain”
it to you
Get the report: http://www.cisco.com/go/smbreport
Our report contains
concrete evidence
that you take security
very seriously
Get the report: http://www.cisco.com/go/smbreport
So, let’s bust some
myths about how SMBs
are using cybersecurity
resources.
For example…
Myth 1: Smaller
businesses don’t test their
incident response plans
Get the report: http://www.cisco.com/go/smbreport
Actually, 45% of
SMBs test their
incident response
plans with drills
every six months
45%
Get the report: http://www.cisco.com/go/smbreport
Which is almost
identical to large
businesses
49%
How often does your
SMB test your incident
response plan?
Is it often enough?
Find out. Get the report
Myth 2: SMBs can’t
measure the efficacy of
their security programs
Get the report: http://www.cisco.com/go/smbreport
Actually, 86% of SMBs
have clear metrics for
measuring the
effectiveness of their
security
86%
How do you measure
your security
effectiveness?
Are you using the
right metrics?
Learn more. Get the report
Get the report: http://www.cisco.com/go/smbreport
Read the report
to gain tips from
other SMBs on
how they
manage their
security
Get the report: http://www.cisco.com/go/smbreport
Plus get insights on
how to securely
manage remote
workers…and much
more
Get the report
Cisco.com/go/smbreport
Busting myths for SMB cybersecurity

More Related Content

Similar to Busting myths for SMB cybersecurity

WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesSix Degrees
 
Report on Covid-19 Business Opportunities & Trends
Report on Covid-19 Business Opportunities & TrendsReport on Covid-19 Business Opportunities & Trends
Report on Covid-19 Business Opportunities & TrendsPawan Kumar
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Enisa rm deliverable2-final-version-v1.0-2006-03-30
Enisa rm deliverable2-final-version-v1.0-2006-03-30Enisa rm deliverable2-final-version-v1.0-2006-03-30
Enisa rm deliverable2-final-version-v1.0-2006-03-30pladott1
 
Safety's Innovation Cycle - How Safety Leaders Innovate
Safety's  Innovation Cycle  - How Safety Leaders InnovateSafety's  Innovation Cycle  - How Safety Leaders Innovate
Safety's Innovation Cycle - How Safety Leaders Innovatesafestrat
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureDave James
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesKevin Duffey
 
InsurTech Primer: Effective Startup & Corporate Collaboration
InsurTech Primer: Effective Startup & Corporate CollaborationInsurTech Primer: Effective Startup & Corporate Collaboration
InsurTech Primer: Effective Startup & Corporate CollaborationAlchemy Crew
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security InvestmentJojo Colina
 
CSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdfCSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdfSnahvaFray
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailInDefense Security
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationRamiro Cid
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationChris Ross
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...Niren Thanky
 

Similar to Busting myths for SMB cybersecurity (20)

WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 
Report on Covid-19 Business Opportunities & Trends
Report on Covid-19 Business Opportunities & TrendsReport on Covid-19 Business Opportunities & Trends
Report on Covid-19 Business Opportunities & Trends
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Enisa rm deliverable2-final-version-v1.0-2006-03-30
Enisa rm deliverable2-final-version-v1.0-2006-03-30Enisa rm deliverable2-final-version-v1.0-2006-03-30
Enisa rm deliverable2-final-version-v1.0-2006-03-30
 
Safety's Innovation Cycle - How Safety Leaders Innovate
Safety's  Innovation Cycle  - How Safety Leaders InnovateSafety's  Innovation Cycle  - How Safety Leaders Innovate
Safety's Innovation Cycle - How Safety Leaders Innovate
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
InsurTech Primer: Effective Startup & Corporate Collaboration
InsurTech Primer: Effective Startup & Corporate CollaborationInsurTech Primer: Effective Startup & Corporate Collaboration
InsurTech Primer: Effective Startup & Corporate Collaboration
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
CSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdfCSM_Guideline_v2.0_en.pdf
CSM_Guideline_v2.0_en.pdf
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for Retail
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk Aggregation
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...
 

Recently uploaded

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 

Recently uploaded (20)

ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 

Busting myths for SMB cybersecurity

  • 1. Get the report: http://www.cisco.com/go/smbreport If you own or work for a small or medium-sized business
  • 2. You’ve likely already overcome significant challenges Get the report: http://www.cisco.com/go/smbreport
  • 3. Get the report: http://www.cisco.com/go/smbreport And when you’re faced with unprecedented situations
  • 4. Get the report: http://www.cisco.com/go/smbreport You come up with ways to stay productive and competitive
  • 5. Get the report: http://www.cisco.com/go/smbreport In times of crisis, fresh ideas emerge while you adapt to new approaches to working.
  • 6. Get the report: http://www.cisco.com/go/smbreport And that’s true for cybersecurity, too.
  • 7. Indeed, our latest report captures how other SMBs are protecting their organizations from cyberattacks
  • 8. Big Security in a Small Business World 10 myth busters for SMB Cybersecurity Cisco Cybersecurity Report Series 2020 Get the report cisco.com/go/smbreport
  • 9. Get the report: http://www.cisco.com/go/smbreport In the report you can also…
  • 10. Get the report: http://www.cisco.com/go/smbreport Find out how small and medium-sized businesses are tackling cybersecurity challenges
  • 11. Get the report: http://www.cisco.com/go/smbreport And…
  • 12. Get the report: http://www.cisco.com/go/smbreport See how SMB efforts compare to those in larger organizations
  • 13. Get the report: http://www.cisco.com/go/smbreport Based on a survey of almost 500 SMBs Defined here as organizations with 250-499 employees
  • 14. Get the report: http://www.cisco.com/go/smbreport …Spoiler alert, they’re more than holding their own.
  • 15. Get the report: http://www.cisco.com/go/smbreport It can sometimes seem as though vendors assume you don’t take security seriously
  • 16. Get the report: http://www.cisco.com/go/smbreport and then proceed to “cybersplain” it to you
  • 17. Get the report: http://www.cisco.com/go/smbreport Our report contains concrete evidence that you take security very seriously
  • 18. Get the report: http://www.cisco.com/go/smbreport So, let’s bust some myths about how SMBs are using cybersecurity resources. For example…
  • 19. Myth 1: Smaller businesses don’t test their incident response plans
  • 20. Get the report: http://www.cisco.com/go/smbreport Actually, 45% of SMBs test their incident response plans with drills every six months 45%
  • 21. Get the report: http://www.cisco.com/go/smbreport Which is almost identical to large businesses 49%
  • 22. How often does your SMB test your incident response plan? Is it often enough? Find out. Get the report
  • 23. Myth 2: SMBs can’t measure the efficacy of their security programs
  • 24. Get the report: http://www.cisco.com/go/smbreport Actually, 86% of SMBs have clear metrics for measuring the effectiveness of their security 86%
  • 25. How do you measure your security effectiveness? Are you using the right metrics? Learn more. Get the report
  • 26. Get the report: http://www.cisco.com/go/smbreport Read the report to gain tips from other SMBs on how they manage their security
  • 27. Get the report: http://www.cisco.com/go/smbreport Plus get insights on how to securely manage remote workers…and much more

Editor's Notes

  1. From raising seed money to knowing when to hire… it’s tough…
  2. Exhilarating, meaningful, and personal... but tough… like trying to keep your operations afloat through a pandemic or recession...
  3. In times of crisis, fresh ideas emerge while you adapt to new approaches to working.
  4. ..if you’re operating with a reduced staff?
  5. Add this to the LinkedIn post: As part of our Cybersecurity Report Series, get insights into how cybersecurity can play a crucial role in empowering Small and Medium-Sized Businesses.
  6. (defined here as organizations with 250-499 employees)…
  7. (“cybersplaining” if you will)…
  8. And your innovative approach is also paying dividends... It’s time to bust some myths about the way in which SMBs are using their cybersecurity resources.
  9. And your innovative approach is also paying dividends... It’s time to bust some myths about the way in which SMBs are using their cybersecurity resources.