Cisco network security: With the increased pressure on corporate network security, Cisco SMB solutions deliver comprehensive, affordable, integrated security. Read more in Cisco’s network security tutorials, white papers, and case studies here.
from Cisco Systems Inc.
Summary
Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively. At the same time, new security threats and legislation puts increased pressure on business networks to be reliable and secure. Cisco® delivers comprehensive, affordable, integrated security solutions tailored for small and medium-sized businesses that help ensure business continuity, maintain customer privacy, and reduce operating costs. Businesses can confidently spend more time growing their business, and less time focusing on network security issues.
Business challenges
Today’s globally competitive business environment has small and medium-sized businesses focused on expanding their business and improving customer satisfaction while simultaneously controlling costs. Fortunately, the Internet and networked applications have leveled the playing field. Small and medium-sized businesses use their networks to extend their market reach and communicate with their customers and partners quickly and cost-effectively. But swift and agile e-business is a double-edged sword—access can also open up businesses to costly security breaches. It is more important than ever to have a reliable, secure, and available network.
Security issues
According to recent studies, security is the biggest challenge facing small and medium-sized businesses. Ever-changing security threats from both inside and outside the business network can wreak havoc on business operations, affecting profitability and customer satisfaction. Small and medium-sized businesses must also comply with new regulations and laws created to protect consumer privacy and secure electronic information.
Security issues #1—worms and viruses:
Computer worms and viruses remain the most common security threat, with 75 percent of small and medium businesses affected by at least one virus in the last year [Maritz Research, 2005]. Worms and viruses can have a devastating effect on business continuity and the bottom line. Smarter, more destructive strains are spreading faster than ever, infecting an entire office in seconds. Cleaning the infected computers takes much longer. The catastrophic results are lost orders, corrupted databases, and angry customers. As businesses struggle to update their computers with the latest operating system patches and antivirus software, new viruses can penetrate their defenses any day of the week. Meanwhile, employees spread viruses and spyware by unwittingly accessing malicious Websites, downloading untrustworthy material, or opening malicious e-mail attachments. These attacks are unintentionally invited into the organization, but still cause significant financial losses. Security systems must detect and repel worms, viruses, and spyware at all points in the network.
Security issue #2—worms and viruses:
Information theft is big business today. Malevolent hackers break into business networks to steal credit card or social security numbers for profit. Small and medium-sized businesses are at risk because they are seen as an easier mark than large corporations. Protecting the perimeter of the network is a good start, but it isn’t enough, since many information thefts have help from a trusted insider, such as an employee or contractor.
Information theft can be costly to small and medium-sized businesses, since they rely on satisfied customers and a good reputation to help grow their business. Businesses that don’t adequately protect their information could face negative publicity, government fines, or even lawsuits. For example, new consumer laws enacted in California require any business that suspects customer information has been viewed by unauthorized people must notify all their customers. Any security strategy must prevent theft of sensitive electronic information from both inside and outside the business.
No comments:
Post a Comment