Bredy Network Management Corporation Blogs

3 minutes reading time (574 words)

What We Can Learn From IT Statistics

What We Can Learn From IT Statistics

Technology plays a pivotal role in the way modern businesses function, and as a result it carries some element of risk. An example of this is how companies store electronic records. While the implementation of measures that are designed to provide greater ease of use and organization for a business’ employees make business move faster, it also makes it that much easier for a hacker to locate and steal data. Small and medium-sized businesses, in particular, are vulnerable, as they may not have dedicated IT security.

To give you an idea of how you should approach IT security for your small business, take a look at the following statistics gathered by Netwrix.


  • Only 36 percent of organizations report being fully aware of employee activity on their network. Are you aware of all activity that happens on your network? It doesn’t matter if it’s your employees accessing social media, or a former employee accessing their account for who knows what purpose. Only about one-third of companies understand what happens on their network, and ignoring these facts can be a considerable threat to your organization’s computing platforms. The more you know about how your network is being used (and by whom), the more you can protect it.
  • The percentage of businesses that have at least some control over employee activity on their network grew from 62 percent in 2016 to 85 percent in 2017. IT risk reports also contain some positive information. In this case, it’s that more employers are noticing the need for IT security. Most security issues happen, in at least some capacity, due to human error by employee behavior on your network. Whether or not they are deliberately trying to sabotage your computing systems is an entirely different story. Regardless, remaining cognizant of the threat to your network is key, so keep track of who accesses what information, and for what reasons.
  • 65 percent of respondents admitted to having security incidents in 2016; the most common reasons cited were malware and human errors. You might be surprised by how often SMBs are targeted by hackers and cyber criminals. The point stands that small businesses that fail to implement safeguards against common security threats can fall victim to data breaches and other attacks.
  • 48 percent of organizations that have to comply with any cyber security standard still struggle to ensure continuous compliance and provide complete evidence of it to auditors. Depending on the industry, some SMBs will have to adhere to specific standards put into place to ensure accountability, among other things. More than this, though, is that auditors require proof that these organizations are adhering to their regulations. This can include anything from policy implementation to compliance audits. It’s recommended that you reach out to BNMC for assistance with ensuring compliance with these often-complicated requirements.
  • 79 percent of respondents say that detecting and mitigating human errors, both malicious or accidental is critical for reducing IT risks. Humans are known to make mistakes. If an employee clicks on the wrong link or downloads the wrong attachment, they could expose your network to all manners of threats. Therefore, risk mitigation has become a major point for many organizations. Through proper training and security solutions, SMBs can ensure that their network security remains strong.

These are only five of the many aspects addressed in the Netwrix Risk Report. How does your business fare? To improve the way you protect your organization’s technology from all manners of threats, reach out to BNMC at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Business Computing Hackers Software Internet Microsoft Google Business Computer Hosted Solutions Mobile Devices Ransomware Network Security Android Managed IT Services IT Services Tech Term Smartphone Data Management Windows Small Business Backup IT Support Hardware Cloud Computing Internet of Things Cybersecurity Data Browser Innovation App Business Continuity User Tips Windows 10 Encryption Server Facebook Remote Monitoring Artificial Intelligence Gmail Data Recovery Saving Money Business Management Outsourced IT Word Tip of the week Productivity Smartphones Productivity Data Backup Chrome Vulnerability Managed Service Provider Communication Phishing Office 365 Efficiency Money Infrastructure IT Support Managed IT Services Windows 10 Disaster Recovery Google Drive Robot Content Filtering Passwords Big Data Bandwidth Upgrade Antivirus Employer-Employee Relationship Analytics Settings communications Government Data storage IT Management YouTube Applications Network Social Media Microsoft Office Risk Management Website Office Tips The Internet of Things Monitors Vendor Management Administration Managing Stress Mouse Save Money Two-factor Authentication Miscellaneous Avoiding Downtime VoIP Automation Wireless Scam End of Support Apple Storage Virtual Reality Mobile Device HIPAA Paperless Office Workplace Tips VPN Mobile Security SaaS Data Security Business Technology Holiday Server Management Data loss Virtual Private Network BYOD Unified Threat Management Spam Computing Alert Telephone Systems Outlook WiFi Company Culture LiFi Hosted Solution Firewall Maintenance Cookies MSP Best Practice Firefox Superfish Augmented Reality K-12 Schools Tech Support Current Events Bluetooth Comparison Social Networking Chromebook Document Management Spyware Address Permissions Computing Infrastructure Professional Services Uninterrupted Power Supply Apps Patch Management Managed IT Service Social Engineering Star Wars File Sharing Cryptocurrency User Error Chatbots eWaste Computer Care IBM Specifications Cybercrime Nanotechnology Development Google Docs Customer Relationship Management Downtime Wearable Technology Network upgrade Websites Solid State Drive IT solutions Going Green Motherboard Cables Identity Theft Marketing Alerts USB Education Hacks Heating/Cooling Multi-Factor Security Google Wallet Break Fix Gadgets Fraud Safety Cost Management Bitcoin Time Management Printer Identity Continuity Training Corporate Profile Search Black Friday Screen Reader Remote Computing Charging Automobile Business Growth Networking Smart Office Hard Disk Drive Printing Network Congestion Wires Legal Emergency Licensing Dongle Dell Password Servers Google Calendar WannaCry Unified Communications Drones Dark Web Users Halloween Assessment Cabling Windows 8 Network Management Access Control Solar Cyber Monday Writing Smart Tech Google Maps Hacker Wi-Fi Work Computers Router Voice over Internet Protocol Deep Learning Cooperation Service Level Agreement Legislation Microsoft Excel Scary Stories Hotspot Internet Exlporer Touchscreen SharePoint Dark Data Compliance Business Intelligence Managed IT Smart Technology Running Cable Retail Connectivity Alt Codes Quick Tips Techology IT Technicians Optimization Display Modem FinTech Digital Payment Bring Your Own Device Operating System How To Lenovo Buisness Staff Leominster Politics desktop Statistics Tablet Digital Budget Mail Merge Blockchain Sports Language Value Disaster Social Downloads Virtual Desktop Customer Service Regulations Information Technology Shortcut Distributed Denial of Service Laptop Office IoT Samsung Collaboration Typing Humor VoIP Unified Threat Management Mirgation Recycling Black Market CCTV Law Enforcement Webcam Notifications Electronic Medical Records Twitter Error Physical Security Emoji Upgrades Gadget Point of Sale Ben McDonald shares Crowdsourcing Travel Personal Information Botnet G Suite BDR Cortana Supercomputer CrashOverride 3D Printing Motion Sickness Staffing Processors Administrator Machine Learning Taxes Virtualization IT Budget Unsupported Software Web Server what was your? Mobile Device Management GPS Update Computer Repair Relocation IT Consultant Mobile Data Cameras Mobile Computing Recovery Tracking How To Work/Life Balance Meetings Health Private Cloud Cleaning

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3