The Fort Worth Press - New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats

USD -
AED 3.672498
AFN 66.225448
ALL 82.354748
AMD 381.306752
ANG 1.790403
AOA 916.999728
ARS 1450.041202
AUD 1.508853
AWG 1.8025
AZN 1.708506
BAM 1.669113
BBD 2.01304
BDT 122.234929
BGN 1.670115
BHD 0.376784
BIF 2955.212672
BMD 1
BND 1.292068
BOB 6.906704
BRL 5.545302
BSD 0.999437
BTN 89.553321
BWP 14.05834
BYN 2.937462
BYR 19600
BZD 2.010139
CAD 1.379165
CDF 2558.498097
CHF 0.794698
CLF 0.023219
CLP 910.890282
CNY 7.04095
CNH 7.033835
COP 3831.44
CRC 499.163651
CUC 1
CUP 26.5
CVE 94.102035
CZK 20.7691
DJF 177.980132
DKK 6.37423
DOP 62.606677
DZD 129.990783
EGP 47.615602
ERN 15
ETB 155.268656
EUR 0.85345
FJD 2.283703
FKP 0.747408
GBP 0.746385
GEL 2.684998
GGP 0.747408
GHS 11.479313
GIP 0.747408
GMD 73.000162
GNF 8736.467948
GTQ 7.658565
GYD 209.104253
HKD 7.780485
HNL 26.330477
HRK 6.430401
HTG 131.040515
HUF 329.729642
IDR 16787.55
ILS 3.19744
IMP 0.747408
INR 89.664497
IQD 1309.318074
IRR 42100.000149
ISK 125.629923
JEP 0.747408
JMD 159.921827
JOD 0.708991
JPY 157.323504
KES 128.904639
KGS 87.44961
KHR 4011.008939
KMF 419.999895
KPW 899.999767
KRW 1479.519686
KWD 0.30723
KYD 0.832939
KZT 517.224164
LAK 21647.016655
LBP 89502.457841
LKR 309.450354
LRD 176.904827
LSL 16.76673
LTL 2.95274
LVL 0.60489
LYD 5.417492
MAD 9.161347
MDL 16.9207
MGA 4545.299379
MKD 52.527821
MMK 2100.286841
MNT 3551.115855
MOP 8.010719
MRU 39.998805
MUR 46.160159
MVR 15.449621
MWK 1733.11941
MXN 18.01467
MYR 4.078987
MZN 63.898809
NAD 16.76673
NGN 1458.790233
NIO 36.782276
NOK 10.122425
NPR 143.285314
NZD 1.733115
OMR 0.38519
PAB 0.999437
PEN 3.365792
PGK 4.251742
PHP 58.723501
PKR 280.0262
PLN 3.588675
PYG 6705.298013
QAR 3.64375
RON 4.344003
RSD 100.174525
RUB 80.441082
RWF 1455.246808
SAR 3.751046
SBD 8.146749
SCR 15.152485
SDG 601.500474
SEK 9.26555
SGD 1.292355
SHP 0.750259
SLE 24.050082
SLL 20969.503664
SOS 570.167952
SRD 38.441502
STD 20697.981008
STN 20.908808
SVC 8.745002
SYP 11058.461434
SZL 16.764525
THB 31.233499
TJS 9.210077
TMT 3.5
TND 2.925514
TOP 2.40776
TRY 42.815406
TTD 6.783841
TWD 31.566604
TZS 2474.999683
UAH 42.259763
UGX 3574.964156
UYU 39.240117
UZS 12015.259097
VES 282.15965
VND 26320
VUV 121.02974
WST 2.787828
XAF 559.804909
XAG 0.014498
XAU 0.000227
XCD 2.70255
XCG 1.801315
XDR 0.696218
XOF 559.804909
XPF 101.778521
YER 238.397851
ZAR 16.72522
ZMK 9001.202443
ZMW 22.612992
ZWL 321.999592
  • SCS

    0.0200

    16.14

    +0.12%

  • NGG

    -0.2800

    76.11

    -0.37%

  • CMSC

    -0.1200

    23.17

    -0.52%

  • GSK

    0.3200

    48.61

    +0.66%

  • AZN

    0.7500

    91.36

    +0.82%

  • BCC

    -2.9300

    74.77

    -3.92%

  • RBGPF

    0.0000

    80.22

    0%

  • BTI

    -0.5900

    56.45

    -1.05%

  • RIO

    0.6900

    78.32

    +0.88%

  • BCE

    -0.0100

    22.84

    -0.04%

  • JRI

    -0.0500

    13.38

    -0.37%

  • BP

    0.6300

    33.94

    +1.86%

  • CMSD

    -0.0300

    23.25

    -0.13%

  • VOD

    0.0400

    12.84

    +0.31%

  • RELX

    0.0800

    40.73

    +0.2%

  • RYCEF

    0.2800

    15.68

    +1.79%

New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats
New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats

New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats

PHILADELPHIA, PA / ACCESS Newswire / January 29, 2025 / While mass outages like 2024's CrowdStrike event can bring small businesses and major corporations alike to their knees, small technical issues or IT events are far more common and can shut down business functions with equally devastating effects. Cybersecurity threats raise the stakes even more, especially for small- and mid-sized businesses that rarely have strong protections in place to stave off potentially business-ending attacks.

Text size:

"Surging security and cybersecurity threats don't discriminate by company size, industry, or geographic footprint. In today's high-risk security environment, an attack is all but inevitable," says Erik Eisen, CEO of CTI Technical Services, a leading provider of IT support and cybersecurity services. "Which is why every business today needs to make-and keep-a resolution to start the year with an evaluation of their network and security status to identify and address areas of weakness so they're around next year."

A Threatening Environment

According to a recent survey by New Relic, the median number of annual outages among respondents was 232, with more than half experiencing weekly low-impact disruptions. IT teams spend 30% of their time-the equivalent of 12 hours per 40-hour workweek-addressing interruptions ranging from network failures and third-party service issues to human error.

Cyberattacks are also surging, and small businesses are a favorite target. Attacks against small businesses increased by 150% over a two-year period at an average cost per incident ranging from more than $825 to nearly $654,000. More than 73% of US small business owners reported a cyberattack in 2023, most of which compromised user credentials. Further:

  • Financial motives are behind 98% of cyberattacks on small businesses.

  • System intrusion, social engineering, and basic web application attacks represent 92% of all small business breaches.

  • An average small business with less than 100 employees will receive 350% more social engineering attacks than larger enterprises.

"Despite the risk, the typical small business spends less than $500 a year on cybersecurity, and most don't have a dedicated cybersecurity budget," says Eisen. "It's an oversight that can have significant repercussions, as 60% of the small businesses that fall victim to cyberattacks close their doors within six months, unable to recover from the resulting downtime, reduced productivity, and remediation costs."

According to Nationwide claims data, it takes an average of 279 days for a small business to recover from a cyberattack, and the average associated costs are between $15,000 and $25,000. Further, 32% of small business owners who experienced an attack said it led to losing customer trust.

A Proactive Stance

When it comes to IT events and cybersecurity attacks, it is a matter of when, not if, for businesses of all sizes. However, there are several steps companies can take to mitigate their risk, starting with a self-assessment to determine areas of vulnerability. This doesn't require an IT expert; just answers to a handful of questions in the following five areas:

  1. Staff training: is your team trained in cybersecurity best practices, including recognizing phishing attempts and the need for strong passwords, and is this training updated regularly?

  2. Security safeguards: Are security measures in place that minimize human errors (e.g., email filters, browsing restrictions, multi-factor authentication, etc.), particularly around personally identifiable information (PII) access? Are they kept current?

  3. Software patches and updates: Are procedures in place for installing the latest patches and updates to software and systems to protect against emerging threats and harden existing vulnerabilities? Are they followed?

  4. Vendor security profiles: Do vendors, partners, and any other entity that may access the company's systems have proper cybersecurity and security protocols to prevent a breach on their end from impacting your operations?

  5. Business continuity: Is a business recovery and continuity plan in place to get operations back up and running after a breach? Is it regularly reviewed and updated as needed? Are staff aware of the plan and trained in its deployment?

Responses will help determine if broader protections are required and if engaging with an IT service provider is warranted. If it is, look for a provider with cybersecurity experience that offers, at minimum, proactive monitoring, regular security assessments, and staff training. Prospective partners should also have a deep understanding of industry-specific compliance requirements.

Along with the above, CTI delivers:

  • Comprehensive services: CTI provides a wide range of technical services, including cybersecurity, data recovery, and workplace solutions.

  • Personalized customer support: CTI emphasizes building long-term relationships with clients by tailoring their services to specific needs, ensuring a personalized and customer-focused approach.

  • Advanced technological expertise: CTI strongly emphasizes staying ahead of technological trends, leveraging cutting-edge tools and processes that outperform older or less adaptive technology.

  • Transparent pricing and policies: CTI maintains a clear, upfront pricing structure and offers fair service terms with no hidden fees or complicated contracts.

  • Nationwide reach with localized support: CTI serves clients nationwide while maintaining a local, approachable touch that provides flexibility and scale.

Finally, during the evaluation process, be sure to ask prospects about their response times and disaster recovery capabilities and obtain-and check-references.

"Security and cybersecurity protocols don't have to break the bank, but they do need to be a budget priority," says Eisen. "Many policies can be implemented internally. For those that can't, the right IT partner will have the skills, experience, and flexibility to lower your risk profile in 2025 and beyond."

For more information on CTI's security and cybersecurity services, visit ctitechnicalservices.com.

About CTI Technical Services

CTI Technical Services is a trusted IT service provider specializing in network design, information architecture, and comprehensive IT support for clients nationwide. With expertise in serving dental and health practices, hospitality, small businesses, and golf courses, Philadelphia-based CTI offers a full suite of services, including managed IT services, cybersecurity, cloud solutions, telecommunications, and network infrastructure design and implementation. Committed to security, efficiency, and reliability, CTI ensures that every client's technology is optimized to protect their business and support seamless operations. For more information, visit ctitechnicalservices.com.

Media Contact:
Liz Goar
NPC Creative Services
[email protected]

SOURCE: CTI Technical Services



View the original press release on ACCESS Newswire

F.Carrillo--TFWP