Redefining cyber security as a business enabler – 3 ways SMEs can benefit

[et_pb_section bb_built=”1″ _builder_version=”3.25.4″ custom_padding=”40px|||” z_index_tablet=”500″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px”][et_pb_row custom_padding=”0px|||||” _builder_version=”3.25.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” z_index_tablet=”500″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” locked=”off” collapsed=”off”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiQmxvZyAtICIsImFmdGVyIjoiLCBMb25kb24sIFVLIiwiZGF0ZV9mb3JtYXQiOiJjdXN0b20iLCJjdXN0b21fZGF0ZV9mb3JtYXQiOiJNIFkifX0=@” use_icon=”on” font_icon=”%%130%%” icon_color=”#000000″ use_icon_font_size=”on” icon_font_size=”30px” _builder_version=”3.25.4″ _dynamic_attributes=”title” header_font=”Poppins||||||||” header_text_align=”center” header_font_size=”15px” z_index_tablet=”500″ header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” body_text_shadow_horizontal_length_tablet=”0px” body_text_shadow_vertical_length_tablet=”0px” body_text_shadow_blur_strength_tablet=”1px” body_link_text_shadow_horizontal_length_tablet=”0px” body_link_text_shadow_vertical_length_tablet=”0px” body_link_text_shadow_blur_strength_tablet=”1px” body_ul_text_shadow_horizontal_length_tablet=”0px” body_ul_text_shadow_vertical_length_tablet=”0px” body_ul_text_shadow_blur_strength_tablet=”1px” body_ol_text_shadow_horizontal_length_tablet=”0px” body_ol_text_shadow_vertical_length_tablet=”0px” body_ol_text_shadow_blur_strength_tablet=”1px” body_quote_text_shadow_horizontal_length_tablet=”0px” body_quote_text_shadow_vertical_length_tablet=”0px” body_quote_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” box_shadow_horizontal_image_tablet=”0px” box_shadow_vertical_image_tablet=”0px” box_shadow_blur_image_tablet=”40px” box_shadow_spread_image_tablet=”0px” text_shadow_horizontal_length_tablet=”0px” text_shadow_vertical_length_tablet=”0px” text_shadow_blur_strength_tablet=”1px” custom_css_blurb_title=”font-weight:400;||margin-top:-10px;” /][et_pb_text _builder_version=”3.25.4″ text_font=”Poppins||||||||” text_text_color=”#000000″ header_font=”Poppins||||||||” header_font_size=”1.8rem” header_3_font=”Poppins||||||||” header_3_font_size=”1.75rem” header_3_line_height=”1.4em” z_index_tablet=”500″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” custom_css_main_element=”font-weight:400;” _dynamic_attributes=”content” text_font_size=”1.75rem” text_text_align=”center” text_line_height=”1.4em”]

@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90aXRsZSIsInNldHRpbmdzIjp7ImJlZm9yZSI6IiIsImFmdGVyIjoiIn19@

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0px|||||” _builder_version=”3.25.4″][et_pb_column type=”4_4″ _builder_version=”3.25.4″][et_pb_text _builder_version=”3.25.4″ text_font=”Poppins||||||||” text_text_color=”#000000″ header_3_font=”Poppins|700|||||||” header_3_font_size=”23px” header_3_line_height=”1.4em” z_index_tablet=”500″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” custom_css_main_element=”font-weight:400;” text_text_shadow_horizontal_length=”text_text_shadow_style,%91object Object%93″ text_text_shadow_vertical_length=”text_text_shadow_style,%91object Object%93″ text_text_shadow_blur_strength=”text_text_shadow_style,%91object Object%93″ link_text_shadow_horizontal_length=”link_text_shadow_style,%91object Object%93″ link_text_shadow_vertical_length=”link_text_shadow_style,%91object Object%93″ link_text_shadow_blur_strength=”link_text_shadow_style,%91object Object%93″ ul_text_shadow_horizontal_length=”ul_text_shadow_style,%91object Object%93″ ul_text_shadow_vertical_length=”ul_text_shadow_style,%91object Object%93″ ul_text_shadow_blur_strength=”ul_text_shadow_style,%91object Object%93″ ol_text_shadow_horizontal_length=”ol_text_shadow_style,%91object Object%93″ ol_text_shadow_vertical_length=”ol_text_shadow_style,%91object Object%93″ ol_text_shadow_blur_strength=”ol_text_shadow_style,%91object Object%93″ quote_text_shadow_horizontal_length=”quote_text_shadow_style,%91object Object%93″ quote_text_shadow_vertical_length=”quote_text_shadow_style,%91object Object%93″ quote_text_shadow_blur_strength=”quote_text_shadow_style,%91object Object%93″ header_text_shadow_horizontal_length=”header_text_shadow_style,%91object Object%93″ header_text_shadow_vertical_length=”header_text_shadow_style,%91object Object%93″ header_text_shadow_blur_strength=”header_text_shadow_style,%91object Object%93″ header_2_text_shadow_horizontal_length=”header_2_text_shadow_style,%91object Object%93″ header_2_text_shadow_vertical_length=”header_2_text_shadow_style,%91object Object%93″ header_2_text_shadow_blur_strength=”header_2_text_shadow_style,%91object Object%93″ header_3_text_shadow_horizontal_length=”header_3_text_shadow_style,%91object Object%93″ header_3_text_shadow_vertical_length=”header_3_text_shadow_style,%91object Object%93″ header_3_text_shadow_blur_strength=”header_3_text_shadow_style,%91object Object%93″ header_4_text_shadow_horizontal_length=”header_4_text_shadow_style,%91object Object%93″ header_4_text_shadow_vertical_length=”header_4_text_shadow_style,%91object Object%93″ header_4_text_shadow_blur_strength=”header_4_text_shadow_style,%91object Object%93″ header_5_text_shadow_horizontal_length=”header_5_text_shadow_style,%91object Object%93″ header_5_text_shadow_vertical_length=”header_5_text_shadow_style,%91object Object%93″ header_5_text_shadow_blur_strength=”header_5_text_shadow_style,%91object Object%93″ header_6_text_shadow_horizontal_length=”header_6_text_shadow_style,%91object Object%93″ header_6_text_shadow_vertical_length=”header_6_text_shadow_style,%91object Object%93″ header_6_text_shadow_blur_strength=”header_6_text_shadow_style,%91object Object%93″]

Joe Collinwood, at CySure explains why it’s time to look beyond the traditional defensive role of cyber security and recognise its innovative possibilities.

 

In an era defined by cyber crime it is easy to take the view that cyber security is exclusively an IT cost and the necessary price of doing business.

The consequences of a data breach can be a disaster for small and medium-sized enterprises (SMEs) which is why cyber security should be a fundamental component of business operations. The repercussions of a breach extend far beyond the costs that are easiest to calculate, such as incident response, external technical services and communications. The indirect financial cost can be far harder to calculate and remediate such as lost business stemming from reduced customer and supplier trust, damage to brand reputation and fines from the Information Commissioner’s Office (ICO). The biggest killer for businesses is the disruption to the business and the time lost while trying to get the business operational again

With the constant threat of a potential cyber attack it is easy to see why some companies develop a defensive and reactive cyber security posture. However, if SMEs are to remain relevant and competitive in the digital economy, it is vital they ensure innovation isn’t stifled by rigid security practices. A strong cyber security strategy developed in line with business goals can support business agility, develop customer loyalty and facilitate organizational operations. Here are 3 ways SMEs can achieve business growth through effective cyber security management.

1) Support business agility
Digital transformation has changed the business landscape creating a competitive and fast paced world. In this intensely competitive environment, start-ups and online companies are damaging traditional brands with innovative digital business models, products and services. SMEs can adapt swiftly to changing environments, embracing digital technologies to improve their internal processes, product offering and enhancing the customer experience.
Providing services in the connected world is increasingly more risky but SMEs that view cyber security as an essential foundation will have the confidence to implement digital processes and technologies that fuel innovation and growth. Without it, companies may hesitate to start digital projects, therefore stifling their innovation potential and opening the door to competitors.

2) Improve data management – the positive impact of GDPR
The EU General Data Protection Regulation (GDPR) came into force on 25 May 2018 and is designed to govern how every organisation treats the personal information it has collected by putting individuals firmly in charge of the way their data is used. The processes necessary for GDPR compliance can deliver many commercial advantages, after all data is the lifeblood of any organisation.
By taking a proactive stance towards GDPR, SMEs can take control of their data and engage with customers and prospects on a more personalised level. By developing a reputation for safeguarding sensitive information and providing transparency to customers, businesses can improve brand loyalty while gaining new customers. Business growth is dependent on customer trust. Security savvy organizations that can demonstrate a trusted track record and commitment to protecting customer information can maximise on the opportunity to differentiate themselves from the pack.

3) Smoother operations
SMEs are more at risk from data breaches than large organisations because cyber criminals recognize that SMEs do not have the money or resources to launch a legitimate defence and therefore are easy prey. According to the Cyber Security Breaches Survey 2018[i], 42% of small businesses identified at least one breach or attack in the last 12 months. In a rapidly evolving landscape of cyber threats, SMEs which understand the risks and have a robust cyber security strategy are more able to recover business operations when a breach happens.

This ability to demonstrate cyber resilience is becoming a contractual requirement to many large organisations that rely on a vast network of agile SME suppliers and partners within their supply chain. SMEs that invest in cyber security can show they are less likely to be a conduit for criminals to access a larger organisation, and are better placed to demonstrate their ability to recover business operations and performance in the event of an attack, therefore protecting the supply chain. While no security strategy can stop 100% of attacks, the aim is to mitigate the risk as much as possible.

Positioned for growth with cyber security
SMEs have an inherent advantage over larger companies as their agility enables them to be flexible and adjust to changes quickly. The lack of red tape and corporate complexity means they can act and adapt fast. A strong cyber security posture encourages data management leading to better customer profiling and greater customer loyalty. Good cyber hygiene practices demonstrate to customers, partners and investors that the organization is a trustworthy provider of goods and services, and protector of customer data.

Cyber security need not be prohibitively expensive. SMEs should seek solutions matching their size and requirements. By utilizing an online information security management system (ISMS) that incorporates Cyber Essentials Plus in the UK and NIST controls in the US, SMEs can be guided by a virtual online security officer (VOSO) to understand just how safe and compliant to regulations they are as part of wider cyber security measures.

A cyber security strategy creates a culture of innovation and trust, both essential for business growth. By giving cyber security the same priority as other business goals, SMEs can position themselves for success and thrive in the digital age.

[i] https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]