Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: SMEs in urgent need of cybersecurity overhaul
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: SMEs in urgent need of cybersecurity overhaul
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cybersecurity ExecutivesExpert OpinionsSMB

SMEs in urgent need of cybersecurity overhaul

Editorial Team
January 10, 2025 at 11:47 AM
By Editorial Team Editorial Team
Share
Brian Buiwe, Technology Specialist at Sage
Brian Buiwe, Technology Specialist at Sage
SHARE
Brian Buiwe, Technology Specialist at Sage
Brian Buiwe, Technology Specialist at Sage

In an exclusive interview with Cyber Intelligence, Brian Buiwe, Technology Specialist at Sage, explains how SMEs and other smaller organizations urgently need to re-address their approach to cybersecurity.

Cyber Intelligence: How aware are smaller organizations of the growing need for cybersecurity in the face of rapidly growing cybercrime and industrial cyber-espionage?

Brian Buiwe: There is a huge knowledge gap among C-suite executives of small-to-medium-sized enterprises (SMEs), as well as among other professionals such as senior doctors and lawyers, where cybersecurity is concerned. Many do not yet grasp the urgent need for cybersecurity. The mainstream media has actually done a very poor job of keeping them informed of the growing threat facing all sectors.

Cyber Intelligence: Then how do you begin their education in cybersecurity?

Brian Buiwe: It is important to start with a broad view of the issue. For example, we conducted some recent training based around the topic of data security, which is about as wide a topic as you can have. But this enabled us to introduce ancillary topics such as the use of personally identifiable information (PII) in order to understand what constitutes sensitive data. We then broaden the discussion to explain further protocols that can be introduced to safeguard that sensitive information.

Cyber Intelligence: Many small-to-medium-sized organizations supply products or services to larger bodies that hold vast amounts of sensitive and critical data. How aware are SMEs of third-party risk?

Brian Buiwe: This is another area that can be addressed through regular training sessions. SMEs must be made aware of the growing need for compliance with new rulings coming into force across the US and overseas. For example, a company that is based in Texas may supply services to California, in which case it must also comply with California state compliance regulations. Those who provide services on an international basis may also have to comply with upcoming European regulations such as the Digital Operational Resilience Act (DORA.), which comes into force later this month.

Cyber Intelligence: Can you give an example of the type of organization that you helped with compliance issues?

Brian Buiwe: For example, a company in a medically adjacent field, such as dentistry, etc, will have responsibilities to safeguard third-party data of which its board may be unaware. When the responsibility for cybersecurity is explained in terms of mandatory compliance, these organizations are generally less anxious to comply, as they understand it is a legal requirement for doing business.

Cyber Intelligence: How much of a problem for SMEs is staff ignorance regarding using the same devices for work and leisure?

Brian Buiwe: This can be a problem, as many SMEs still continue to encourage staff to use their own devices for business use. The Bring Your Own Devices to work (BYOD) approach is still seen as a cost-saver by many SMEs. The organizations concerned are often unaware of how many services and potentially weaponized apps staff have downloaded onto devices they also use for work. In some cases, it is necessary to advise SMEs to invest in supplying employees with dedicated devices for work. This can also help with establishing a work/life balance for staff, who may otherwise suffer burnout from feeling that their devices make them potentially available 24/7. But there is no ‘one-size-fits-all” solution. It really depends on the type of data each organization handles and which staff require access. In some cases, staff may be allowed to continue using existing devices with further training on how to make them secure.

 Cyber Intelligence: Do SMEs still see cybersecurity as an afterthought when planning business growth?

Brian Buiwe: This can be a problem that many organizations need to face up squarely when they start to grow. An organization with 50 staff or less is in a position to adopt one-off cybersecurity fixes. But when that organization starts to grow, it is no longer advisable for them to do so, as entry points for bad actors will multiply as the business starts to take off. As Sage advises companies on all aspects of their digital and IT strategy, we can also advise on how to incorporate up-to-date cybersecurity safeguards and protocols at appropriate stages as part of an ongoing cybersecurity program. Cybersecurity should be part of an ongoing program and not seen as a periodic one-off.

Cyber Intelligence: Thank You.

TAGGED: brian buiwe, c-suite, cyber budget, cyber education, cyber espionage, cyber risks, cyber training, Cybersecurity, data, data leak, data privacy, data regulation, device security, executives, sage, small business, small to medium sized enterprises, SME, supply chain, third party, vulnerability, vulnerable enterprises
Editorial Team February 3, 2025 January 10, 2025
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article china's ramped up cyberattacks on the united states China ramps up cyber-attacks on the US
Next Article fake job offer scams Fake job offer scams gather pace
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

Newsransomware

Ransomware group offers cyber gangs legal advice

A new cybercriminal group, Qilin, is rapidly establishing dominance in the murky world of ransomware by providing not just ransomware-as-a-service (RaaS) but a full soup-to-nuts cybercrime service .In addition to the malware, Qilin also provides a full suite of legal guidance for criminals together with operational and storage features. According cybersecurity company, Cybereason, Qilin is positioning itself not just as a ransomware group, but as a full cybercrime service.

June 20, 2025
NewsOne Minute RoundupOne Minute Roundup

Japan Pushes Proactive Cyber Laws – June 17th

Japan Prime Minister Shigeru Ishiba implements a new cybersecurity defense law ahead of national elections to take proactive measures against cyber threats. The legislation allows the government to monitor online communications and requires private companies to report cyberattacks. 

June 17, 2025
AINews

Criminal use of AI enters new and dangerous phase

Cybercriminals have just added what may be the most dangerous weapon yet to their arsenal of illegal software, a Dark Web version of legitimate artificial intelligence (AI) platforms. Tel Aviv-based network security company, Cato Networks, has uncovered an emerging criminal platform called Nytheon AI that it says is “a fully-fledged illicit AI platform”. While there have been other attempts to offer criminal versions of popular AI models, Nytheon AI is the first truly comprehensive multilingual offering. Threat actors can now use the platform to conduct a variety of attacks including tailored spear-phishing campaigns, deepfake documents, and polymorphic malware capable of constantly mutating its appearance.

June 17, 2025
NewsOne Minute RoundupOne Minute Roundup

Geopolitical Tensions are Changing the Cybersecurity Landscape – June 13th

Political tensions are prompting nations to re-strategize cybersecurity. Countries that once sought international cooperation and joint strategies are now prioritizing domestic cyber capacities and national interests as a result of geopolitical instabilities.

June 13, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?