Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Why SMBs need access to strong cybersecurity

September 03, 2020

Why SMBs need access to strong cybersecurity
powered by Sounder

The data protected by SMBs is no less valuable or vulnerable than that of large companies.
When they don’t have the finances or personnel to invest in cybersecurity, SMBs are subject to the shotgun approach of cybercriminals with automation on their side.
In this episode, Joel Boyd, Director of Marketing, and Ben Wilson, VP of Product Management at Fortinet, talks about the unique security risks SMBs are facing.

They also discuss:

“SMBs can get quick time to value, secure their data, secure their network and carry on.” — Ben Wilson

Sure, you can put together a solid defense if you have the resources and experts, but that’s exactly what SMBs are lacking.

Snapshot of SMBs today
Small businesses have fewer than 100 employees and midsize have less than 1,000. (We can all think of companies with huge revenue with under 1K employees.)

SMBs tend to be pretty mature and quite tech savvy. They consume a lot of tech, but they don’t always have the cybersecurity focus that will protect them from attackers.
It’s basically an ROI game.
A targeted attack on a larger enterprise is more costly with a bigger payoff—but it’s more difficult to execute. A shotgun approach toward SMBs will basically guarantee success.
What makes cybersecurity consumable to SMBs is 1) whether it’s automated and 2) whether it’s security as a service.

If you’re short on expertise, you want something streamlined that will get up and running as fast as possible that you can also manage, upgrade, license and customize easily.

The 4-step SMB cybersecurity plan

#1 Get your office network up and running.
Establish a network for all your devices to enable direct access quickly but securely.
Focus on your firewall.
#2 Leverage the cloud.
Cloud security doesn’t always mean AWS.
When you first start out, protect your staff data and invest in robust email security.
#3 Protect your users, especially remote ones.
Make sure they’re covered regardless of whether they’re on or off the network.
(Learn about endpoint protection, VPN and split tunneling.)
#4 Plan for growth
Choose a platform where you can control costs and manage multiple systems easily while you expand.

Where is technology going in the next year?
Joel: Technology will continue to embrace remote workforces with an emphasis on a connected employee experience.

Ben: We’ll be seeing more automatic optimization across all layers of the network and cloud (not just security).
To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. You can also listen on our website.