Small businesses make up a large portion of the private sector workforce and remain the largest target for cyberattacks. Their lack of robust security makes small businesses a prime target for those looking to expend less effort stealing sensitive data. The issue therein lies with how small businesses can combat cyberattacks with a mostly part-time workforce, lack of advanced security tools, and no substantial budget allocated to security. The purpose of this research was to explore the difficulties small to medium-sized businesses (SMBs) face in implementing comprehensive cybersecurity strategies and how SMBs can overcome these difficulties and develop cybersecurity strategies that are both effective and meet budgetary constraints.
This research examined studies and literature that highlighted the areas of greatest risk to small businesses. The research also reviewed literature that defined guidelines and best practices for organizations seeking to implement a robust cybersecurity strategy. Lastly, this research also analyzed established frameworks and literature on how to shift a business from a reactive cybersecurity model to one that is proactive.
This research found that small businesses must first identify the root causes of their vulnerabilities before proceeding to draft any security strategies. Small businesses must then focus their efforts on developing policy and implementing a strategy that mitigates risk specific to their businesses. Further research needs to be conducted on the results of small businesses investing in cloud technology and the best methods to educate the small business workforce.
|School Location:||United States -- New York|
|Source:||MAI 82/3(E), Masters Abstracts International|
|Subjects:||Information Technology, Business administration|
|Keywords:||Cloud technology, Cybersecurity, Wendt, Donnie, Proactive security, Small business|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be