Small Medium Enterprises (SMEs) in Australia believe they are less vulnerable to cyber risks than their larger competitors. According to Chubb's SME Cyber Preparedness Report “Too Small to Fail?”, 60% of the 400 respondents agreed with that statement. They also think that they can overcome cyber incidents quickly and easily, with more than half (56%) believing that they can contain a breach within 12 hours.

SMEs believe that they are less vulnerable towards cyber risks and they are able to overcome cyber breaches quickly and easily

However, nothing could be further from the truth.

  • More than half (60%) experienced a cyber incident in the past 12 months.
  • When probed, 45% of respondents are not confident that all their employees who have access to sensitive data are fully aware of their data privacy responsibilities.
  • 67% believe they are not aware of all the cyber threats they face.

 

While SMEs may be at risk of external cyber attacks, our research shows that the majority of the cyber incidents are actually caused by internal factors. The top three incidents are business interruption or data loss through human error, system malfunction or technical fault.

Top 3 cyber incidents were caused by these internal factors

Following a cyber incident:

  • SMEs react differently with 33% stating that they increased their security, 31% notified affected parties, and 28% took no action at all.
  • Their key concerns were relationship with customers (51%), profits (51%), cost of incident (51%) and public reputation (47%).

 

These statistics lead us to believe that there is a significant gap between the hard reality of cyber risk and how well small companies are prepared to deal with it. SMEs face a far bigger risk exposure as they face many of the same threats as larger companies do, yet most do not have the means to make as much investment required to implement comprehensive protection, or to recover from an attack.

Download the full infographic

Are SMEs over confident about their ability to manage cyber risk?

Download

Learn More: Cyber Insurance
Explore how Chubb can help protect your business from cyber risks.
Explore how Chubb can help protect your business from cyber risks.

This content is brought to you by Chubb Insurance Australia Limited (“Chubb”) as a convenience to readers and is not intended to constitute advice (professional or otherwise) or recommendations upon which a reader may rely. Any references to insurance cover are general in nature only and may not suit your particular circumstances. Chubb does not take into account your personal objectives, financial situation or needs and any insurance cover referred to is subject to the terms, conditions and exclusions set out in the relevant policy wording. Please obtain and read carefully the relevant insurance policy before deciding to acquire any insurance product. A policy wording can be obtained at www.chubb.com/au, through your broker or by contacting any of the Chubb offices. Chubb makes no warranty or guarantee about the accuracy, completeness, or adequacy of the content. Readers relying on any content do so at their own risk. It is the responsibility of the reader to evaluate the quality and accuracy of the content. Reference in this content (if any) to any specific commercial product, process, or service, and links from this content to other third party websites, do not constitute or imply an endorsement or recommendation by Chubb and shall not be used for advertising or service/product endorsement purposes. ©2020 Chubb Insurance Australia Limited ABN: 23 001 642 020 AFSL: 239687. Chubb®, its logos, and Chubb.Insured.SM are protected trademarks of Chubb.

Have questions?

Contact a broker today.

Insights & Resources

We keep you informed – and your business protected – with these helpful articles.

Cyber
Cyber Incidents by the Numbers
Insights into the various perils and average costs associated with cyber incidents in direct relation to the many industries affected.
Cyber
What is the Dark Web?
With cyber-attacks becoming the No.1 risk to business, brands, operations and financials, one may wonder what is the attacker doing with th