Smart Buyer
  • Shop On NeweggBusiness
  • Categories
    • Buying Guides
    • Components
    • DIY and How-to
    • Industry Trends
    • NetSec
    • Networking
    • Storage
    • Systems – PC & Laptop
    • Windows
  • About
  • Why NeweggBusiness?
  • Contact Us
Top Posts
PC Cooling: How to Set up Computer Case...
5 Ways to Stream from PC to TV...
How to Choose the Correct RAM Upgrade
How to Troubleshoot a PC Power Supply
Four Apps that Make Your Tablet a Second...
2019 Solid State Drive (SSD) Buying Guide
6 Reasons Your PC is Slow and How...
How-to Guide: Small Office Network Setup
Born in the USA: Computer Hardware Made in...
Computer Monitor Buying Guide 2019

Smart Buyer

  • Shop On NeweggBusiness
  • Categories
    • Buying Guides
    • Components
    • DIY and How-to
    • Industry Trends
    • NetSec
    • Networking
    • Storage
    • Systems – PC & Laptop
    • Windows
  • About
  • Why NeweggBusiness?
  • Contact Us
NetSecVisualized

[Infographic] Comparing Information Security in Large and Small Companies

by Adam Lovinus May 16, 2016
by Adam Lovinus May 16, 2016 0 comment 9243 views

How does company size dictate information security posture? A NeweggBusiness customer survey reveals differences in how companies large and small approach cybersecurity. Some findings fell in line with expectations; others defied the conventional understanding of how security professionals operate in businesses of scale.

Small businesses may no longer assume a “security by obscurity” stance. The past several years have witnessed a sharp uptick in cyberattacks against SMBs. The simple reasoning is that criminals discovered many small companies are easy targets, often lacking resources and know-how for protecting valuable business data.

This has led security-minded small companies to adopt information security postures similar to those found in the enterprise space. At a recent keynote, Department of Commerce’s National Institute of Standards and Technology director Willie E. May explained, “We see companies like Intel, Chevron, Walgreens, Pepco, Apple, QVC, and the Bank of America talking about how they are using the Framework [for Improving Critical Infrastructure Cybersecurity] or planning to incorporate it. But we also see 50-person firms, like Silver Star Communications in rural Wyoming, describing how the Framework has helped them to be more thoughtful and wiser managers of their cyber risks.”

More than anything else, user behavior indicates the effectiveness of information security policies for a business of any size. NeweggBusiness findings show SMBs are taking stronger security postures than their larger counterparts in regard to certain behaviors such as sharing logon information.

It is undeniable that small companies have a resource disadvantage for creating and enforcing a strong information security posture.  However, a smaller-sized company tends be more agile with its IT infrastructure. This manifests in smaller companies having a better likelihood of deploying software patches in a timely manner; by the same token, large companies check network logs more often and are more likely to run risk assessments.

Information Security Large Small Company

Share this infographic on your website

<a href="https://www.neweggbusiness.com/smartbuyer/visualized/infographic-comparing-information-security-large-small-businesses"><img src='//www.neweggbusiness.com/smartbuyer/wp-content/uploads/information-security-infographic-complete.png' alt='infromation security large small company' width='700' border='0' /></a>

[Infographic] Comparing Information Security in Large and Small Companies — design by Dana Choi

Adam Lovinus

Adam Lovinus

A tech writer and Raspberry Pi enthusiast from Orange County, California.

More Posts - Website - Twitter - LinkedIn - Google Plus

Summary
Antivirus & Internet SecurityFirewalls / Security Appliances
0 comment
0
FacebookTwitterGoogle +PinterestEmail
Adam Lovinus
Adam Lovinus

A tech writer and Raspberry Pi enthusiast from Orange County, California.

previous post
How to Set Up Free Anti-Phishing User Training
next post
Are You Lying About Your Computer and Network Security Practices?

Related Posts

A Chromebook in the Office? 7 Myths Debunked...

December 10, 2020

Anatomy of a Small Office Network [Infographic]

December 10, 2020

Remote Workforce Security: Tips and Best Practices

December 9, 2020

Laptop Management Checklist for Remote Workers [Infographic]

December 4, 2020

Aruba Instant On Wants to Simplify Your Small...

August 2, 2019

Know Your NAND Flash Technology

February 20, 2019

What is ‘Fileless’ Malware Found Inside Server Hardware?

October 4, 2018

Airport Wi-Fi Security: 10 Most Dangerous US Airports

August 16, 2018

How to Layer Antivirus Software Without Slowing Your...

May 21, 2018

Securing the Office Printer in Six Steps

May 14, 2018

What's your take? Cancel reply

Subscribe

Savings Spotlight
  • 1

    PC Cooling: How to Set up Computer Case Fans

    September 25, 2015
  • 2

    5 Ways to Stream from PC to TV or Digital Display

    May 23, 2016
  • 3

    How to Choose the Correct RAM Upgrade

    April 28, 2015
  • 4

    How to Troubleshoot a PC Power Supply

    July 11, 2018
  • 5

    Four Apps that Make Your Tablet a Second Monitor

    January 9, 2018
  • 6

    2019 Solid State Drive (SSD) Buying Guide

    December 6, 2018
  • 7

    6 Reasons Your PC is Slow and How to Fix It

    February 28, 2019
  • 8

    How-to Guide: Small Office Network Setup

    December 20, 2018
  • 9

    Born in the USA: Computer Hardware Made in America

    September 27, 2018
  • 10

    Computer Monitor Buying Guide 2019

    January 4, 2019

Newegg + Business

How is this different from Newegg.com?

Why NeweggBusiness?
  • Facebook
  • Twitter
  • Linkedin
  • Email