According to ID Agent, an estimated 61% of organizations worldwide had a damaging ransomware incident in 2020. Losses from ransomware are already up more than 300% in 2021.

Here are some troubling statistics on the topic:

– Two in five SMBs were impacted by ransomware in 2020.
– 34% of data breaches involved internal actors.
– 41% of business owners surveyed had a cybersecurity mishap related to COVID-19.
– More than 60% of employees use the same passwords across home and work applications.
– The average ransom fee for a ransomware attack is $200,000. 

YOUR BUSINESS IS AT RISK. It’s not a matter of if you will be attacked but when. You can no longer afford not to take cybersecurity seriously, the quicker you get on board the more prepared you’re going to be to prevent becoming another statistic. 

What is a vulnerability assessment?

A vulnerability assessment is a systematic review of weaknesses in your information system security. Using professional tools, a scan takes place to evaluate if you have internal or external vulnerabilities. Weaknesses are identified and recommendations are made to remediate or mitigate any vulnerabilities.

What does the scan do?

A vulnerability scan can discover everything from devices, software connected to the network, operating systems, and open ports. This information is then used to correlate to the latest known vulnerabilities. Lack of security controls as well as detecting misconfigurations will also be identified. The purpose is to identify any and all security holes on the network, computer and even applications. It will also predict the effectiveness of countermeasures that can be taken.

What types of scans should I verify take place?

There are five main scans that you should be interested in to ensure your business takes the appropriate measures to resolve vulnerabilities.

1. Network
2. Host-based
3. Wireless
4. Application
5. Database

How frequently should a vulnerability scan take place?

No less than once per year. Cybercriminals are constantly evolving and testing new entry points. They are even starting to work together in teams to breach your network and hold sensitive information hostage, in exchange for payment. Ideally, you’d scan for vulnerabilities once a quarter to stay in front of any issues and make sure all IT components are up to date, not leaving your business at a higher risk.

How much does a vulnerability assessment cost?

There are a number of factors that can impact the cost which can be based on internal networks, web applications, servers, IP’s, etc. Industry average is somewhere in the $2,000 – $5,000 range. The key is to ensure the company that provides the assessment is also going to give you the details on how to resolve it, regardless of if you choose to work with their firm or not. Make sure this detail is covered in advance with the provider you choose to work with for the scan. 

We hope this information has provided the education you need to protect your business vs. cybercriminals. PCG systems is a managed IT service provider in Denver, with a wealth of knowledge on protecting your business. We are also providing no cost vulnerability assessments for a limited time.  Please click the button below to get your scan today.