top of page


State of Cyber Security in Small & Medium Sized Businesses
State of Cyber Security in Small & Medium Sized Businesses
State of Security
Key Findings
Companies are aware of the threat but believe they are too small to be a target.

Attacks are Proliferating
58% of all Cyber breaches and incidents targeted Small Business

More Data is at Risk
54% of attacks involved data breaches, with an average of 9,350 records stolen

Attacks Are More Sophisticated
81% of malware attacks avoided anti-virus solutions

Email and Personnel are the Biggest Threat
92% of all malware is a result of interacting with a phishing/malicious email
The Rise of Ransomware
Ransomware is defined as a sophisticated piece of malware that blocks the victim’s access to company files.
Ransomware is defined as a sophisticated piece of malware that blocks the victim’s access to company files.

Increase in Frequency
39% of all malware incidents were ransomware infections

Laptops/Desktops are the Culprit
78% of ransomware attacks were initiated through a compromised desktop or laptop
Laptops/Desktops are the Culprit
78% of ransomware attacks were initiated through a compromised desktop or laptop


Goodbye Bitcoin
60% of companies paid the ransom to regain access to data
Goodbye Bitcoin
60% of companies paid the ransom to regain access to data
Pay to Play
The average ransom to unlock or decrypt data was $2,157
Pay to Play
The average ransom to unlock or decrypt data was $2,157

Cloud Infrastructure & Bring Your Own Device Culture Increase Attack Surface

Cloud Dominance
85% of enterprises utilize a hybrid cloud environment.

The Porous Cloud
27% of third party applications pose a "high" security risk, 58% pose medium security risk.

The "Secure" Cloud
8.1% of cloud apps meet "strict" data security and privacy requirements for enterprise grade security controls.
The Human Element Continues to be the Organizational Weak Link
Here Phishy Phishy
93% of all breaches involved phishing emails during various a

Here Phishy Phishy
93% of all breaches involved phishing emails during various a

Spam is Taking Over
65% of total email traffic is spam.

Propagation of Adware
75% of organizations are found to be infected with some form of adware.

Training Drastically Improves Employee Click Rates, Still Leaves Room For Improvement
78% of trained employees never clicked on a malicious link, however only 17% of attempts were reported
*Data from the 2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) - Ponemon Institute & the 2018 Verizon Data Breach Investigation Report
Visibility

Security In Depth Starts
With Visibility
With the proliferation of easy to use exploitation tools and leaks of new vulnerabilities, data breaches and cyber attacks are no longer a concern reserved for large enterprises. Vulnerability Assessment & Management provides asset knowledge & protection.

There is a direct correlation between knowledge of security vulnerabilities and strengthening your business with effective procedures for overall risk and compliance with government regulation.

Vulnerability management is an essential component of any information security program and the process of vulnerability assessment is vital to effective security management. Vulnerability assessment provides visibility into the vulnerability of assets deployed in the network.

Vulnerability Assessments are completed using a combination of manual and automated tools and techniques, which will allow Sentient Cyber Security to analyze the target infrastructure or web applications in order to determine the existence of any vulnerabilities. Networks, including virtual environments, are reviewed with over 50,000 known vulnerability checks and assessments.

Sentient Cyber Security will deliver reports detailing the vulnerabilities identified during the assessment, their potential business impact and most importantly, recommends processes for remediation
IPS

Move with the shifting threat landscape
Detect and respond to real threats by actively testing the network while complying with government regulation with comprehensive Penetration Testing

Don't leave security up to chance. Malicious actors exploit networks for personal and financial gain. Sentient will utilize the same tactics to find holes in network security before a malicious hacker has the chance.

Expose threats by actively testing and monitoring the network, hosts, and cloud infrastructure

Identify vulnerable employee practices by utilizing social engineering tactics such as flash drive drops and phone calls.

Using military trained tactics, Sentient Cyber Security has a 99% success rate
Spear Phishing

Train employees. Recuce risk
Actively train employees to mitigate the biggest risk facing businesses.
The Human Element.

Spear Phishing targets specific people, researching jobs, organizations, and connections to send specific emails closely replicating the targets actual email usage. This is the source of over 90% of malware infections

Active spear phishing replication trains employees to spot malicious emails, lessening the risk and employee accidentally install malicious software

All links clicked in training emails direct user to a Sentient Cyber Security landing page educating the user on how the malicious link could have been identified before the click

Implement a "Quarantine" button across all user email platforms to quickly remove identified threats, allowing Sentient to perform analysis on malicious emails
Give Back

What's Your Cause?

Give back to your community
Sentient Cyber Security believes in giving back. Dogs, recycling, zebras, music, energy, children, clean water, cancer, you name it. Pick a cause and a portion of your proceeds will go straight to what you care about.
Secure Your Network and Piece of Mind

Lists your organization as a donor, placing your logo on all donor material for chosen organization

Tax Write off
Abou Us

Sentient Cyber Security is a Colorado based Service Disabled Veteran Owned Information Security Firm specializing in managed security, vulnerability assessments, penetration testing, policy development, and regulatory compliance.
The Sentient Team
Roy Vreeland brings the technical expertise to Sentient, with the desire to bring enterprise-level cyber security to the masses. Roy has spent nearly a decade bolstering cyber security programs as a boundary technician and penetration test for the USAF and a Red Team Penetration Tester with the NSA. He has developed threat emulation training for the DoD and audited security for numerous Fortune 500 companies. His technical background and leadership experience makes him an excellent fit for bringing positive changes to the Information Security Industry.
Roy Vreeland - Chief Technology Officer


Evan Vall - President - Security Solutions
Evan Vall guides Sentient's sales and account management practices. Prior to founding Sentient, Evan achieved a bachelor's degree in finance & entrepreneurship with summa cum laude honors at Fort Lewis College & is a Certified Ethical Hacker. He then relocated to Denver to work as an ABB sales representative, supplying critical infrastructure to many industries, including renewable energy and water management. In his spare time, Evan volunteers with WorldDenver, a Denver non-profit that works hand in hand with the Unites States of America State Department.
bottom of page