itb-nz logo
Story image

Almost half of NZ businesses unprepared for data breaches

22 Nov 2018

Forty-five percent of New Zealand businesses rate themselves as not secure on both managing security from different endpoints and protecting company data when employees are working remotely, a study by HP has found.

Only 50% of businesses feel any confidence that they would cope if their business experienced a significant cybersecurity breach.

 The HP New Zealand IT Security Study, conducted in September 2018, surveyed 434 New Zealand small to large businesses across the services, production, retail and hospitality, health and education, and distribution industries.

A key objective of the research was to identify New Zealand SMBs’ approach to IT security, including policies, procedures and risk management and where their perceived weaknesses exist.

“The consequences of a data breach are severe; from financial to brand and reputation damage,” says HP New Zealand managing director Grant Hopkins.

“Organisations need to be vigilant about implementing processes that regularly monitor, detect and report data breaches. Running regular risk assessments and managing your endpoint security is critical in keeping businesses data safe.”

As more New Zealanders work remotely, use personal devices in the workplace, and work in public spaces, traditional security measures and antivirus programs are becoming less effective.

Sixty percent of businesses regularly allow remote working (and remote access to company data) but only 42% of them have a security policy in place.

Furthermore, while visual hacking represented the area of greatest perceived weakness, only one in five businesses have integrated privacy screens on desktops/laptops to protect this type of breach.

Many IT departments tend to focus their efforts around PCs, tablets and other connected devices, but they neglect one of the largest areas of vulnerability: the printer.

The study found that New Zealand businesses have printers that are relatively insecure with 30% not offering any security features and only 35% of businesses including printers in their IT security assessment.

Without embedded security measures like real-time threat detection, automated monitoring, and data encryption, printers are left open and vulnerable to attack.

Not only does this make the confidential and sensitive documents that are printed, scanned and copied by the printer easily accessible for hackers, but risks the entire network being hacked, while bypassing the firewall altogether. 

“Endpoint security – at the device level – is critical. Organisations tend to rely solely on third-party software security to protect their devices when, in reality, stronger and better business security must be integrated into the device itself,” says Hopkins.

“With hackers able to bypass traditional network perimeter security and antivirus programs, it’s time to scrutinise a hardware’s security as closely, if not more, than our external security solutions.”

Today’s SMBs must implement processes and technologies designed to both proactively detect and prevent against a cyber attack.

Link image
Decrypting cybercriminals' use of TTL/TLS encryption
How many outdated protocols are being used today? The report covers damning statistics about the state of enterprise security.More
Link image
Try 5G software to accelerate 5G device test
As a 5G device developer, you need comprehensive network emulation solutions (NES) to accelerate 5G device test and get to market faster. Keysight’s 5G network emulation software can help you streamline your device workflow across all stages — development, acceptance, manufacturing, and deployment. Try our complimentary 5G NES software today.More
Story image
Cyber threat intelligence reaching maturity in organisations worldwide
Cyber threat intelligence is reaching a state of maturity and integration in organisations across the globe, according to a survey by the SANS Institute and ThreatQuotient.More
Link image
Red Hat Ansible enables next generation network operations
To understand the power of a Red Hat and its IT automation ecosystem, get in touch with OSS Group.More
Story image
Spark's Mobility as a Service puts the right devices, in the right hands, at the right time
The solution includes mobile plan options bundled with hardware for a single monthly fee, and aims to address key organisational challenges like tighter budgets, ever-changing teams, focusing on more important business operations.More
Story image
Vodafone NZ moves forward on digital reinvention with appointment of strategy officer
Mooney will be tasked with helping to guide the business through its ongoing reinvention towards becoming a more digitally focused business.More