Email phishing is still a dominant mode of attack used to install persistent malware and can happen in just minutes: one minute and forty seconds to be exact. And the primary motive? Greed. Access to cash.
To make matters worse, data breach victims are striking back at the affected businesses, delivering a second blow of harm and penalties.
While Congress debates legislation like H.R. 5064, the Improving Small Business Cyber Security Act of 2016, business owners still have an obligation to shore up their defenses. Banks, local CPA firms, and small physician practices, for example, are the types of firms that are reporting personal data breaches in the recently released Washington State Attorney General's Data Breach Report (November 1, 2016).
TraceSecurity, a leader in cloud-based cyber security solutions for more than 2,000 firms, is offering its Cybersecurity Assessment Tool free of charge to help businesses create and maintain their cyber security defense plans. Within weeks of launching the solution, almost 1,000 firms across more than 10 industries have downloaded and accessed the solution. Across these firms, the tool has identified hundreds of items that these firms need to remediate in order to reduce their exposure.
The TraceSecurity Cybersecurity Assessment Tool is designed to help organizations of any size by providing a step-by-step process for evaluating their cyber security exposure and maturity.
Once the initial assessment is completed, small-mid size businesses may continue to access the tool, enabling them to maintain and edit their assessment year-over-year. Additionally, the tool automatically generates detailed reports that illustrate an organization's overall inherent risk level and cyber security maturity levels.
Assessment services include, but are not limited to, assistance with data collection and results analysis.
To learn more:
- Access the TraceSecurity Cybersecurity Assessment Tool customized for various industry regulations like the Retail, Healthcare, and Financial Industries
- Watch a short video about the TraceSecurity Cybersecurity Assessment Tool
- Read our blog to learn about the differences between an IT Risk Assessment and the NIST Framework based Cybersecurity Assessment
- Visit TraceSecurity online to learn about our cyber security assessment services
TraceSecurity is a leader in cyber security software and services that help organizations of all sizes reduce the risk of cyber breaches and demonstrate compliance. TraceSecurity offers a comprehensive portfolio of solutions that allow organizations to manage their information security program and supplement it with third-party validation and testing. TraceSecurity's suite of information security services includes but is not limited to IT risk assessments and audits, social engineering, penetration testing, and security training. TraceSecurity's award-winning TraceCSO is a revolutionary cloud-based solution that dramatically streamlines the management of IT governance, risk, and compliance (GRC) programs. It accomplishes this by tightly integrating and automating all eight critical IT GRC components: Risk Management, Compliance Management, Audit Management, Vendor Management, Incident Response Management, Vulnerability Management, Policy Management, and Training Management.
With market experience that spans over 2,000 customers, TraceSecurity offers the insight, products, professional services, and partners to support the security and risk management efforts of organizations across all industries. TraceSecurity certified partners leverage TraceCSO as a discovery tool to identify additional security solutions and services to offer their customers. Founded in 2004, the company has executive offices in Silicon Valley and offices in Baton Rouge, La. For more information, call (225) 612-2121 or visit www.tracesecurity.com.
1 Page 5, Table 2, 447. Incidents in organizations with 1,000 or less. Total security incidents with confirmed data loss based on organizations with known employee size = 759.
Contact: Kelly Kutche
To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/cyber-attackers-move-on-to-vulnerable-small-businesses-300377030.html