SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Check Point® Software Technologies Ltd. Survey Finds Small-Medium Business Growth Plans Held Back By Inadequate Cybersecurity

12 Oct 2022

Check Point® Software Technologies Ltd. Survey Finds Small-Medium Business Growth Plans Held Back By Inadequate Cybersecurity
Contact company
Contact Check Point Software Technologies Inc
icon Add as a preferred source Download PDF version
Related Links
  • How To Update Telecom Security For The 5G Era

Check Point® Software Technologies Ltd., a provider of cybersecurity solutions globally, has released the results from a new survey of the SMB cybersecurity market, conducted by research firm - Analysys Mason. 

It sought to uncover how SMBs are emerging from the pandemic, and how their business and technology needs are changing. The survey revealed that, while SMBs understand the need to invest in technology to support growth in the world of hybrid working, unfortunately, many fail to prioritize security. 

Hybrid work model

The survey reflects that a majority of organizations including SMBs have embraced the cloud, mobile, and SaaS technologies in recent years. Compared with pre-pandemic levels, there has been an increase in IT spending to drive business growth.

SMBs have accepted that the hybrid work model is here to stay, and have increased their investment in communication technologies and services to support remote workers.

Cyberattack risks 

With the increase in supply chain attacks, cybercriminals are increasingly using more vulnerable SMBs

With remote workers using home and office access points, the attack surface has expanded thereby increasing the risk of cyberattacks.

With the increase in supply chain attacks across the industry, cybercriminals are increasingly using more vulnerable SMBs as an entry point into larger enterprises. This approach wreaks havoc on both SMBs and all the enterprises they interact with. 

Impact of cyberattack 

Given the global cybersecurity skills shortage, SMBs are struggling to properly secure their critical assets, making them a growing target for cybercriminals. Larger enterprises usually have bigger IT budgets and security resources, so they can recover more easily from a cyberattack.

For SMBs, a cyberattack can be fatal to their business. The survey found that two of the biggest impacts that cyberattacks have on SMBs include lost revenue (28%), and the loss of customer trust (16%). 

Survey findings 

The survey of 1,150 small and medium-sized businesses across the US, Germany, UK, and Singapore, also revealed: 

  • SMBs struggle with a lack of expertise and require additional support:

Most SMBs either have no security products in place or these products are managed by non-specialist staff

Less than a quarter (22%) of respondents felt they were extremely well protected against cyberattacks, and only a minority have internal security specialists or are working with a third party. This means that a large number of SMBs either have no security products in place or these products are managed by non-specialist staff.

While there is a significant rise in the number of SMBs working with Managed Service Providers (MSPs) to help address IT issues, around a third of respondents noted they would like additional help from their MSPs in upgrading security. 

  • Cybersecurity as an investment: 

The SMBs surveyed recognized the disastrous effects of a cyberattack on their company but seemed to agree that they had inadequate security budgets. Security vendor solutions priced beyond their budgets were identified as a key challenge to having effective cybersecurity capabilities.

Something has to change, to enable SMBs to take a longer-term view of the value of cybersecurity so that they can invest today to protect their growth tomorrow.

  • SMBs are adapting to the ‘new normal’ but mobile security is lacking: 

SMBs are expecting 40% of their employees to continue working remotely for at least some of the time. The highest priority in all countries was to ensure that IT can be managed and supported remotely, validated by additional laptop purchases and increased VPN capacity.

However, the survey also shows that the take-up rate of even basic security products is low. The most adopted service, endpoint protection, is only used by 67% of respondents and less than half have any form of mobile security. 

All-in-one solution

SMBs require security solutions that deliver proven threat prevention, are extremely simple to deploy and manage"

Eyal Manor, Vice President of Product Management at Check Point Software said, “It is reassuring that SMBs have increased their investment in cybersecurity to support business growth and the new hybrid work model, but having the correct mix of security products is only part of an effective strategy."

He adds, "Because there is a shortage of cyber security workers for SMBs, they require security solutions that deliver proven threat prevention, are extremely simple to deploy and manage, and offer the flexibility of an ‘all-in-one’ solution that combines security and internet connectivity.”

Prevention-first approach

Eyal Manor continues, “SMBs should also be looking for a consolidated and unified security suite that achieves a high level of protection across their network, endpoints, mobile, and email. SMB security providers should use a prevention-first approach and one that cuts down TCO, by reducing the need to manage additional staff or security expertise."

He adds, "SMBs should also consider leveraging the third party managed service providers to gain access to experienced cybersecurity professionals at an affordable cost. Third-party advisors can provide expert advice on the best security solution for each SMB along with training and ongoing support.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Digital video surveillance
  • Application security
  • Industrial security
  • Remote security
  • Commercial security
  • Perimeter security
  • Security management
  • Security policy
  • Security devices
  • Security monitoring system
  • Network monitoring
  • Asset tracking
  • Remote video monitoring
  • Building security
  • Facility security
  • Industrial security systems
  • Network cameras
  • Security service
  • Industrial surveillance
  • Mobile surveillance
  • IP security solutions
  • Integration software
  • Perimeter protection
  • Cyber security
  • Mobile communications
  • Internet of Things (IoT)
  • Corporate Security
  • Data Security
  • Network Video Recorders
  • Digital Video Recorders
  • Security Assessments
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • COVID-19
  • Mergers & Acquisitions
  • Machine Learning
  • Related links
  • IP Surveillance Software Video Surveillance software
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • Related categories
  • Video Surveillance software
Related white papers
The 4 Pillars Of AI In Managing High-Stakes Critical Events

The 4 Pillars Of AI In Managing High-Stakes Critical Events

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Suprema BioStation 3 Sets Sales Record In Security Market

Suprema BioStation 3 Sets Sales Record In Security Market

A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design

A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design

Leuze AI Boosts Optical Distance Sensor Accuracy

Leuze AI Boosts Optical Distance Sensor Accuracy

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec