The Fort Worth Press - New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats

USD -
AED 3.67325
AFN 62.999686
ALL 83.000389
AMD 377.496907
ANG 1.790083
AOA 916.999878
ARS 1395.150898
AUD 1.417224
AWG 1.8025
AZN 1.696655
BAM 1.704371
BBD 2.014946
BDT 122.754882
BGN 1.709309
BHD 0.377549
BIF 2970
BMD 1
BND 1.283525
BOB 6.913501
BRL 5.246501
BSD 1.000436
BTN 93.206388
BWP 13.651833
BYN 3.093542
BYR 19600
BZD 2.012088
CAD 1.373695
CDF 2275.000546
CHF 0.790905
CLF 0.02312
CLP 912.898421
CNY 6.900451
CNH 6.88869
COP 3693.2
CRC 468.079358
CUC 1
CUP 26.5
CVE 97.04998
CZK 21.185038
DJF 177.720217
DKK 6.46496
DOP 58.824986
DZD 132.032159
EGP 52.237101
ERN 15
ETB 157.198647
EUR 0.86535
FJD 2.239785
FKP 0.750673
GBP 0.746275
GEL 2.715
GGP 0.750673
GHS 10.897874
GIP 0.750673
GMD 74.000062
GNF 8777.473613
GTQ 7.652926
GYD 209.305771
HKD 7.833035
HNL 26.570209
HRK 6.5191
HTG 131.227832
HUF 339.922033
IDR 16931
ILS 3.12734
IMP 0.750673
INR 92.966396
IQD 1310
IRR 1315124.999664
ISK 124.440077
JEP 0.750673
JMD 157.168937
JOD 0.709004
JPY 157.8535
KES 129.601538
KGS 87.447902
KHR 4010.000096
KMF 427.999847
KPW 899.987979
KRW 1491.679776
KWD 0.30627
KYD 0.833751
KZT 481.121429
LAK 21474.999866
LBP 89549.999743
LKR 311.846652
LRD 183.400113
LSL 16.830382
LTL 2.95274
LVL 0.60489
LYD 6.380161
MAD 9.35875
MDL 17.532561
MGA 4164.999848
MKD 53.321164
MMK 2099.739449
MNT 3585.842291
MOP 8.07209
MRU 40.109838
MUR 46.504986
MVR 15.450341
MWK 1737.000045
MXN 17.787655
MYR 3.939027
MZN 63.920974
NAD 16.830329
NGN 1356.999631
NIO 36.719764
NOK 9.518897
NPR 149.125498
NZD 1.70971
OMR 0.384505
PAB 1.000471
PEN 3.454497
PGK 4.302026
PHP 59.955026
PKR 279.149985
PLN 3.69984
PYG 6500.777741
QAR 3.644602
RON 4.408498
RSD 101.660985
RUB 86.148542
RWF 1459
SAR 3.754506
SBD 8.048583
SCR 14.850342
SDG 601.000128
SEK 9.32417
SGD 1.279125
SHP 0.750259
SLE 24.650258
SLL 20969.510825
SOS 571.500628
SRD 37.502039
STD 20697.981008
STN 21.5
SVC 8.753927
SYP 110.528765
SZL 16.829994
THB 32.635505
TJS 9.579415
TMT 3.5
TND 2.91125
TOP 2.40776
TRY 44.293575
TTD 6.781035
TWD 31.853999
TZS 2597.497688
UAH 43.994632
UGX 3781.362476
UYU 40.523406
UZS 12194.99951
VES 454.68563
VND 26290
VUV 119.408419
WST 2.73222
XAF 571.660014
XAG 0.014021
XAU 0.000217
XCD 2.70255
XCG 1.803034
XDR 0.710959
XOF 571.50087
XPF 103.600118
YER 238.549751
ZAR 16.854978
ZMK 9001.202744
ZMW 19.584125
ZWL 321.999592
  • RYCEF

    -0.7500

    15.85

    -4.73%

  • CMSC

    0.0300

    22.86

    +0.13%

  • RBGPF

    -13.5000

    69

    -19.57%

  • GSK

    0.5150

    52.575

    +0.98%

  • AZN

    1.1200

    189.54

    +0.59%

  • BCE

    -0.0200

    25.73

    -0.08%

  • RIO

    -1.5900

    86.13

    -1.85%

  • VOD

    0.1100

    14.48

    +0.76%

  • CMSD

    0.0050

    22.895

    +0.02%

  • BCC

    -1.5900

    70.25

    -2.26%

  • BTI

    0.7300

    58.82

    +1.24%

  • RELX

    0.0400

    33.9

    +0.12%

  • NGG

    -1.4600

    85.94

    -1.7%

  • JRI

    -0.1250

    12.198

    -1.02%

  • BP

    1.1450

    45.755

    +2.5%

New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats
New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats

New Year’s Cybersecurity Resolution: 5 Questions to Identify and Mitigate Hidden Security Threats

PHILADELPHIA, PA / ACCESS Newswire / January 29, 2025 / While mass outages like 2024's CrowdStrike event can bring small businesses and major corporations alike to their knees, small technical issues or IT events are far more common and can shut down business functions with equally devastating effects. Cybersecurity threats raise the stakes even more, especially for small- and mid-sized businesses that rarely have strong protections in place to stave off potentially business-ending attacks.

Text size:

"Surging security and cybersecurity threats don't discriminate by company size, industry, or geographic footprint. In today's high-risk security environment, an attack is all but inevitable," says Erik Eisen, CEO of CTI Technical Services, a leading provider of IT support and cybersecurity services. "Which is why every business today needs to make-and keep-a resolution to start the year with an evaluation of their network and security status to identify and address areas of weakness so they're around next year."

A Threatening Environment

According to a recent survey by New Relic, the median number of annual outages among respondents was 232, with more than half experiencing weekly low-impact disruptions. IT teams spend 30% of their time-the equivalent of 12 hours per 40-hour workweek-addressing interruptions ranging from network failures and third-party service issues to human error.

Cyberattacks are also surging, and small businesses are a favorite target. Attacks against small businesses increased by 150% over a two-year period at an average cost per incident ranging from more than $825 to nearly $654,000. More than 73% of US small business owners reported a cyberattack in 2023, most of which compromised user credentials. Further:

  • Financial motives are behind 98% of cyberattacks on small businesses.

  • System intrusion, social engineering, and basic web application attacks represent 92% of all small business breaches.

  • An average small business with less than 100 employees will receive 350% more social engineering attacks than larger enterprises.

"Despite the risk, the typical small business spends less than $500 a year on cybersecurity, and most don't have a dedicated cybersecurity budget," says Eisen. "It's an oversight that can have significant repercussions, as 60% of the small businesses that fall victim to cyberattacks close their doors within six months, unable to recover from the resulting downtime, reduced productivity, and remediation costs."

According to Nationwide claims data, it takes an average of 279 days for a small business to recover from a cyberattack, and the average associated costs are between $15,000 and $25,000. Further, 32% of small business owners who experienced an attack said it led to losing customer trust.

A Proactive Stance

When it comes to IT events and cybersecurity attacks, it is a matter of when, not if, for businesses of all sizes. However, there are several steps companies can take to mitigate their risk, starting with a self-assessment to determine areas of vulnerability. This doesn't require an IT expert; just answers to a handful of questions in the following five areas:

  1. Staff training: is your team trained in cybersecurity best practices, including recognizing phishing attempts and the need for strong passwords, and is this training updated regularly?

  2. Security safeguards: Are security measures in place that minimize human errors (e.g., email filters, browsing restrictions, multi-factor authentication, etc.), particularly around personally identifiable information (PII) access? Are they kept current?

  3. Software patches and updates: Are procedures in place for installing the latest patches and updates to software and systems to protect against emerging threats and harden existing vulnerabilities? Are they followed?

  4. Vendor security profiles: Do vendors, partners, and any other entity that may access the company's systems have proper cybersecurity and security protocols to prevent a breach on their end from impacting your operations?

  5. Business continuity: Is a business recovery and continuity plan in place to get operations back up and running after a breach? Is it regularly reviewed and updated as needed? Are staff aware of the plan and trained in its deployment?

Responses will help determine if broader protections are required and if engaging with an IT service provider is warranted. If it is, look for a provider with cybersecurity experience that offers, at minimum, proactive monitoring, regular security assessments, and staff training. Prospective partners should also have a deep understanding of industry-specific compliance requirements.

Along with the above, CTI delivers:

  • Comprehensive services: CTI provides a wide range of technical services, including cybersecurity, data recovery, and workplace solutions.

  • Personalized customer support: CTI emphasizes building long-term relationships with clients by tailoring their services to specific needs, ensuring a personalized and customer-focused approach.

  • Advanced technological expertise: CTI strongly emphasizes staying ahead of technological trends, leveraging cutting-edge tools and processes that outperform older or less adaptive technology.

  • Transparent pricing and policies: CTI maintains a clear, upfront pricing structure and offers fair service terms with no hidden fees or complicated contracts.

  • Nationwide reach with localized support: CTI serves clients nationwide while maintaining a local, approachable touch that provides flexibility and scale.

Finally, during the evaluation process, be sure to ask prospects about their response times and disaster recovery capabilities and obtain-and check-references.

"Security and cybersecurity protocols don't have to break the bank, but they do need to be a budget priority," says Eisen. "Many policies can be implemented internally. For those that can't, the right IT partner will have the skills, experience, and flexibility to lower your risk profile in 2025 and beyond."

For more information on CTI's security and cybersecurity services, visit ctitechnicalservices.com.

About CTI Technical Services

CTI Technical Services is a trusted IT service provider specializing in network design, information architecture, and comprehensive IT support for clients nationwide. With expertise in serving dental and health practices, hospitality, small businesses, and golf courses, Philadelphia-based CTI offers a full suite of services, including managed IT services, cybersecurity, cloud solutions, telecommunications, and network infrastructure design and implementation. Committed to security, efficiency, and reliability, CTI ensures that every client's technology is optimized to protect their business and support seamless operations. For more information, visit ctitechnicalservices.com.

Media Contact:
Liz Goar
NPC Creative Services
[email protected]

SOURCE: CTI Technical Services



View the original press release on ACCESS Newswire

F.Carrillo--TFWP