2. Digital security in SMEs

We are at dawn of a new industrial era. Emerging digital technologies, such as artificial intelligence (AI), 5G or The Internet of Things (IoT), are opening tremendous market opportunities and creating entirely new industries, but, in turn, raise new - or amplify existing - digital security risk. As small and medium-sized enterprises connect to the digital world and move towards new digital practices, they will need to effectively manage digital security risk so as to be able to reap the benefits of the digital transition.

Yet, some SMEs do not have the awareness, resources or expertise to effectively assess their digital risk exposure and to implement appropriate prevention and remediation measures. Relatively poor or inadequate digital security risk management practices could have far-reaching consequences since smaller firms may not have the capacity to weather – even temporary - losses of reputation, consumer trust or revenues following serious incidents. The risk is particularly pronounced in sectors where SMEs tend to rely on sensitive or valuable data, or process significant volumes of data, such as professional services, healthcare and retail trade.

This document discusses the challenges raised by digital (in)security, the changing nature of incidents, the prevalence and costs of attacks and human errors, and their incidence on SMEs. It highlights the growing exposure of SMEs as digitalisation increases the economic value of data, and their reliance on software code, data and connectivity. It identifies some of the ways that the COVID-19 pandemic gave opportunities for malicious actors to intensify attacks. It also looks into SME practices in terms of securing systems and data and gaps vis-à-vis large firms. Finally, it presents the rationale for digital security and data protection policies towards SMEs and provides examples of such government policies across the OECD area.

Digital security incidents harm businesses, governments and individuals by undermining the availability, integrity and/or confidentiality (the so-called “AIC triad”) of their data, information systems and networks. A data breach is a specific sub-class of incident affecting the confidentiality of data that results in the disclosure of data to an unauthorised party. As a consequence of digital security incidents, victims can face tangible and intangible damages, ranging from monetary losses, reduced competitiveness, reputational damages, interruption of operations, privacy breaches, etc. (OECD, 2020[1]).

Digital security risk results from incidents caused by threats exploiting vulnerabilities. Threat sources include governments, groups and individuals with malicious or ill-intentioned and/or criminal purposes. Their motivations vary, but typically include geopolitical goals for governments, profit making for criminals, ideology for hacktivists, violence for terrorists, personal aims for thrill seekers, and discontent for insider threats.

Incidents can also result from unintentional events such as human error, system bugs or external non-malicious causes (e.g. power outage, lightning strikes, solar flares). These events might however be initiated by an external malicious actor through social engineering methods, like phishing (Box 2.1). However, due to the way in which digital systems and software are designed, users of these technologies might make mistakes and cause financial costs or losses. The systems themselves might fail due to a bug or other fault. Finally, non-malicious external forces might cause system failure e.g. power outage, lightning strikes, solar flares.

Measuring the prevalence and costs of digital incidents remains a challenge due to a lack of international standards and comparable data (Box 2.2). The data available need to be carefully interpreted because enterprises either do not understand their real risk exposure; or do not detect incidents; or do not measure their impact in a standard way; and might not report them at all. Nevertheless, when carefully interpreted, some trends do emerge from the evidence.

Verizon, a large US telecommunications enterprise, recently released its Data Breach Incident Report for 2020 (Verizon, 2020[11]). Data come from a broad spectrum of government and non-government representatives across 81 countries. Keeping in mind the methodological issues related to measuring digital incidents (Box 2.2), the authors found that 70% of breaches were perpetrated by external actors. Of those, 55% were organised criminal groups. However, errors are also commonplace, responsible for 22% of breaches, which make them more common than malware, i.e. malicious code (Verizon, 2020[11]). For instance, vulnerabilities arise when a system administrator neglect to put in security controls to limit access to the company’s data posted on a cloud platform (misconfiguration), or the threat increases when sensitive data goes to the wrong recipient(s) as the autocomplete “To:” or “Cc:” field directs an email to the wrong party (misdelivery). In other instances, it could be a mass-mailing misstep where the addresses are no longer paired with the correct contents. These errors, including incorrect administration, accidentally exposing hosts, or misconfiguration of protocols and controls, may be linked to a rapid shift to the cloud and a general lack of understanding of securing cloud environments and services.

Some kinds of cyber-attacks become increasingly targeted and sophisticated over time, making it more difficult for businesses, organisations and governments to detect and defeat them. Malicious attacks, techniques and approaches evolve continuously in order to escape law enforcement, circumvent progress in digital security prevention and protection and better adapt to their targets’ vulnerabilities.

However, attackers first try the old and cheap methods of attack, and only increase in sophistication when gains worth it. Many enterprises, especially the smaller ones, fall to simple basic attacks because they lack the baseline protection and a minimum digital “hygiene”. More sophisticated approaches tend to target those firms that have already reached this baseline level. Phishing, denial of service and ransomware attacks continue to be prevalent in the digital landscape (OECD, 2020[1]).

High-profile attacks, such as the ransomwares WannaCry and NotPetya, highlighted significant digital security gaps in thousands of businesses and public sector organisations, in particular regarding the end-of-life of products that contain software code. According to estimates, there are between 20 and 100 flaws in every 2 000 lines of code (Dean, 2018[13]), down to one flaw in every 2 000 lines if “security by design” guidelines are followed (DHS and DoC, 2018[14]). To put things in perspective, an average iPhone app has around 50 000 lines of code, while Android has around 12 million and Windows 10 counts more than 50 million. On average, 46 new vulnerabilities are discovered and publicly disclosed every day, including for widely used products such as Android, iOS or Windows (NIST, 2020[15]).

Products are increasingly digital-intensive and entire sectors are digitally dependent (OECD, 2021, forthcoming[16]). On the consumer side, traditional goods are becoming “smart”, i.e. contain code and can interconnect (e.g. connected cars and home appliances). The number of connected devices is expected to reach 20 billion globally in 2020 (Schneier, 2018[17]). On the business side, companies increasingly use software to perform core functions such as production and distribution (see Chapter 1 on SME digital uptake and Chapter 5 on AI), and they increasingly rely on the development of cloud computing and subscription-based models for software for their daily operations.

Nowadays, organisations regardless of size, are troubled with attacks on web applications, user devices, servers and people (social engineering attacks). Estimates vary drastically across sources but figures remain substantial. In Europe, the share of firms having experienced ICT security incidents in 2019, such as unavailability of ICT services, destruction or corruption of data, or disclosure of confidential data, is on average of 13%, but ranges from 6% (United Kingdom) to 35% (Sweden) (Eurostat, 2020[18]). OECD data complement the picture for non-EU countries and give between 10% and 20% of all firms (employing 10 or more employees) having experienced security breaches in 2019, with a few extremes such as Japan (56%), on the one hand, and Korea (5%), on the other hand (Figure 2.1). A 30% – corresponding to 36% of total employees – of Italian businesses reported at least some damage from a cyber-attack between September 2015 and September 2016 (Biancotti, 2017[19]). Once data were corrected to account for unwillingness to report or inability to detect attacks, figures climbed to 45% and 56% respectively. In 2005, among 7 818 US businesses surveyed, 67% detected at least one cybercrime (US Bureau of Justice Statistics, 2005[20]).

Data that an enterprise possesses, and its financial and cash capacity (i.e. the amount of money it possesses or processes), are the key motives behind the majority of digital security attacks. While there is a small subset of attacks that are perpetrated for the purpose of espionage or hacktivism, the majority of threat actors aims to find a way to break in and steal something of value, which can then be sold (data, trade secrecy, intellectual property, etc.) or laundered (money).

The typical criminal is primarily interested in obtaining credentials and personal data (Verizon, 2020[11]). After those two categories, medical, internal or payment data are roughly the same in terms of interest. Phishing via mass emails is still the easiest, cheapest and most effective means for that, including for stealing credentials that could then be traded on the dark web, without their owner being even aware of the intrusion. The risks –and gains- related to stolen credentials can be high when individuals reuse their credentials for multiple accounts (both professional and personal), and organisations did not implement multifactor authentication methods.

All industries are affected by digital security risks, but to different degrees and in different ways (Table 2.2 and Table 2.3). While numbers vary across sources, several key trends seem to emerge:

  • The most digital-intensive sectors tend to be the most impacted, in particular, professional, scientific and technical services (i.e. legal, accounting, management, R&D, etc.), which involve high value-added activities and process large volume of data.

  • Public administration that possesses detailed information about citizens and businesses it serves is a target and ransomware is a now major problem for this sector. According to (Kaspersky, 2019[8]), at least 174 municipal organisations worldwide were targeted by ransomware in 2019, a 60% increase from 2018. However, human errors, due to misdelivery and misconfiguration, remain responsible for a large share of data breaches in the sector (Verizon, 2020[11]). The same seems to stand in the healthcare services.

  • Beyond credentials and personal data, the type of data compromised varies across industry, depending on opportunities. In accommodation and food services (68% of cases) and retail services (47%), payment data are the main data compromised, while in healthcare services and financial services, medical records (67%) and bank data (32%) are respectively at stake.

  • Attacks can be targeted to the firm’s business models. In accommodation and food services, where a wide range of enterprises offer their services directly to customers and internet presence is important for operations, distributed denial of service (DDoS) attacks are major disruptors. The same is true in the entertainment industry where consumers expect videos to load fast and website content to get updated at high speed. In retail services, e-commerce applications are the leading cause of breaches in this industry.

  • Motives are financial in most cases of attacks. However, theft of intellectual property plays a significant role in the breaches incurred in the manufacturing sector.

Globalisation can also be a channel of both additional digital security risk exposure but also ability to learn from experience and thus better manage this risk. This is because, “firms with an international dimension are more likely to have experience in conducting business online, resulting in higher threat awareness, and they are more exposed to cross- border attacks (Biancotti, 2017[19]).”

On average, an SME tends to have a lower intensity of digitalisation (see Chapter 1 on digital access and uptake by SMEs) and a smaller portfolio of digital assets to manage and protect (OECD, 2019[23]). This does not mean that they are not exposed to digital security risk though. SMEs, as users and sometimes producers of digital technologies, are exposed to the risk that vulnerabilities in these technologies may be exploited by malicious parties. Historically SMEs have been less likely to detect and report digital security breaches than large enterprises. This is due to many reasons including: less employees to commit errors; a potentially lower reward for thieves/criminals given their smaller size and lesser degree of digitalisation (OECD, 2019[23]); lower internal capacity, skills and awareness to detect and address incidents; and less access to finance to invest in protection and/or detection capabilities.

National surveys conducted at different times are consistent over time as well (Table 2.4):

  • The 2019 UK Cyber Breaches Survey found that the proportion of enterprises that detected an incident over the prior 12 months increased with size. The median number of incidents detected also increased, albeit marginally, with enterprise size. The mean number was higher for micro and small enterprises, compared with medium enterprises, due to a very small number of respondents experiencing larger numbers of incidents compared to their peers.

  • In a 2016 survey conducted by the Bank of Italy, 40.8% of enterprises with 20-49 employees, 45.4% of enterprises with 50-199 employees, 49.2% of enterprises with 200-499 employees and 51.3% of enterprises with 500+ employees suffered at least one incident.

  • Based on older data, across all subsets of incidents covered in the 2005 US National Cyber Security Survey, SMEs were less likely to detect an incident than larger enterprises.

Data analysed by Cyentia Institute, using a large historical incident response repository, show that smaller enterprises, as per their revenues, are less likely to experience at least one breach in the year and this likelihood increases as revenue increases (Figure 2.2). Once over USD 1 billion in annual revenues, the likelihood of dealing with at least one breach in the year increases dramatically, and again beyond USD 10 billion and USD 100 billion revenues.

However, there are subsets of SMEs that are relatively more digitally-intensive and are more likely to suffer an incident. Factors that increase the probability of failure include the nature of their business processes and models, the sector of activity (e.g. Information and communication technologies –ICT- industry and services) or a mismanagement of digital security. For instance, following up on the previous example in Figure 2.2, firms at the small end of the revenue spectrum but operating in certain digital-intensive or sensitive industries (e.g. healthcare, ICT) may have a higher probability of suffering a breach than firms in other non-digitally- or data-intensive industries (e.g. agriculture, mining).

When a digital incident occurs, accidentally or intentionally, the enterprise cannot operate as usual and may incur additional costs and losses, depending on the nature of the incident (e.g. forensic costs, business interruption costs, legal costs, regulatory fines, etc.). It is important to differentiate between costs, losses and opportunity costs, as they are often mixed up in the literature in the economics of digital security (Dean, 2017[25]) (Box 2.3).

Estimates for digital security incident losses are rare and often underestimated. One way in which to account for losses is by looking at insurance claims. Insurance policies aim to cover the losses from certain kinds of digital security incidents. When enterprises claim on these policies, and the claims data are made public, it is possible to see actual amounts lost. However, these amounts may understate the total economic damage. The costs and losses incurred due to digital security incidents also increase with enterprise size.

The 2019 NetDiligence Cyber Claims Study shows significant differences in losses between US SMEs and large firms over 2014-18 (Table 2.6). First, in terms of amounts. In financial services, where large enterprises incurred maximum average losses, the gap between small and large firms is of 1 for 100 USD. In professional services, where large enterprises incurred minimum average losses, the gap is 1 for 23 USD. Second, in terms of sectors affected. Average losses over the period were larger in retail for US SMEs, and larger in financial services for large enterprises. Third, in terms of dispersion. There are outlier cases among large enterprises. Some large enterprises received very high amounts of compensation for their losses, which increases the distance between the average and the median. This is particularly the case in professional services. To a lesser extent, similar extreme cases occur among SMEs in healthcare services.

Business surveys are another source of information about losses from digital security incidents. Findings from an Italian survey that was conducted in 2017 are converging with previous results (Biancotti, 2017[26]) (Table 2.7). Incidents are less costly in an absolute sense for SMEs as compared to large enterprises. The proportion of enterprises that have experienced no costs or losses following an ICT incident tend to decrease with enterprise size, and, as the amount of losses increases, more large enterprises are affected. This is somewhat to be expected – the larger the enterprise, the larger the revenue, and the larger costs and losses potentially incurred, particularly in case of business interruption. It is important to acknowledge though that surveys are not typically designed to sample “tail events” i.e. low probability but high impact incidents. Therefore, in this particular case, there could be a minor but non-zero proportion of enterprises that experienced losses in excess of EUR 200 000 but, given they were not included in the sample, they do not appear in the results of the survey.

Finally, large historical databases on digital security incidents and losses can provide further insights into the probability of incurring an incident and the volumes of losses that could be incurred. One such database is compiled by Advisen and is based on publicly-available sources such as breach disclosures, company filings, litigation details, Freedom of Information Act requests, etc. A study conducted using this database in 2019 found an upward trend in typical losses as enterprise revenue increase (Figure 2.3) (Cyentia Institute, 2019[24]).

However, there are differences between the absolute and relative losses that firms effectively incur. In fact, there are a number of ways in which to measure economic losses from digital security incidents, and a number of sub-cost components, which depend on the type of incident experienced.

For instance, the 2019 study on breach losses by class of firm revenues mentioned in Figure 2.3 shows that an enterprise generating USD 100 billion a year could expect a typical breach cost that is equivalent to 0.0005% of its annual revenues (Cyentia Institute, 2019[24]). A mom-and-pop shop, on the other hand, will likely lose 25% of its annual earnings. In extremes cases, the USD 100 billion enterprise will lose a fourth of its annual revenues, while the mom-and-pop shop will lose more than it can earn in the year. Without significant cash reserves - and the COVID-19 crisis has highlighted SME lack of liquidities, many of them not having enough cash to maintain activities over 2 or 3 months, the small business is likely to close. It should be noted that, due to the skewed distribution of digital security losses, a small proportion of firms can incur larger losses than the “likely” or “typical” ones. There is therefore only a small probability that small enterprises incur losses, in an extreme event, that exceed their annual revenue. The same does not apply to enterprises at the upper end of the revenue scale, simply because their revenues are so large that an incident could not possibly result in such heavy losses (in relative terms).

Results from the UK Cyber Breaches Survey 2017 show similar patterns (Table 2.8). When the numbers of incidents and total costs incurred are adjusted to the size of the enterprise, being as measured as per the number of employees or a proportion of revenues, it appears that most enterprises do not incur any incident, the median values being extremely low, if not null. This confirms the skewed distribution of incidents and costs. It also becomes apparent that micro firms with 1 to 9 employees incur disproportionately high cost per employee (GBP 81) for a small number of incidents (2), whereas large firms, if they experience more incidents (154), face less relative losses (GBP 154). To a lesser extent, medium-sized firms are also disproportionately impacted.

These results are to be put into perspective with the very large size of the SME population that account for over 99% of businesses in OECD countries (OECD, 2019[23]). While large losses tend to be borne by large enterprises, the sum of all smaller losses incurred by SMEs ends up into substantial amounts, not to mention the temporary or definite losses of capacity and scale-up opportunities, or the risk of eviction of viable enterprises from the market, that are difficult to include into loss assessment.

In addition, over time, weak digital security practices may become a barrier for SMEs to establish and maintain partnerships and business relationships with larger enterprises (OECD, 2019[23]). This is because larger enterprises need to manage their own digital security risk exposure throughout their supply chain. SMEs can be weak nodes in such supply chains and become a target for digital security attacks that would attempt to penetrate the medium-to-large sized –and more profitable-counterparties (OECD, 2019[27]). In response, larger enterprises may sever or avoid relationships with vulnerable SMEs. Conversely, SMEs that can demonstrate that they implement best practice to manage digital security risk can raise their business profile by increasing security within their supply chains, and are thus more likely to be able to take advantage of the opportunities made possible in this new industrial era (OECD, 2019[23]).

Emerging digital technologies have the potential to spur innovation, enhance productivity and improve well-being. Many SMEs stand to benefit from new digital-enhanced practices and products, which create room for them to overcome the size-related barriers they typically face in innovating, going global and growing (OECD, 2019[23]).

However, the digital transformation also increases business digital dependency and exposure to digital security risk. The advancement of computing technology and storage capacities have encouraged the widespread use of personal computing devices and the production of data. The Internet, smart apps and big data increase the volume of data available. The 5G broadband increases the speed and volume of data transfer. Artificial intelligence increases business capacity to make use and sense of it (OECD, 2017[29]). In addition, there is a non-negligible risk that AI creates new digital security challenges (Box 2.4). In fact, digital security incidents can affect all information systems, including those that rely on AI.

The Internet of Things (IoT), i.e. hyper-connectivity of sensors, devices, and systems that support machine-to-machine communication, will dramatically increase the volume of data available (and exploitable through AI and machine learning). Yet, with the IoT, the likelihood of security incidents is likely to grow, the IoT components becoming both targets of attacks and channels for disrupting physical systems (OECD, 2019[23]). As IoT can bridge the online and offline worlds, digital damages are likely to extend to the physical environment. Cyberattacks could increasingly alter the functioning of control and monitoring systems (e.g. self-driving cars, medical devices, etc.) or defense and security systems and disrupt the supply of essential services (e.g. electricity, heating, water, finance, transport), with lethal consequences.

Cloud computing allows access to extra processing power or storage capacity online, as well as databases and software, and supports the diffusion of other digital technologies, as well as innovative business practices (OECD, 2019[23]). Due to its flexibility and scalability, cloud computing reduces the costs of technology upgrading by exempting firms of upfront investments in hardware and regular expenses on maintenance, IT team and certification, turning ICT management model into a model based on software acquisition (codes) and digital (hyper)connectivity.

Data on business use of ICT across OECD and EU countries highlights the close relationship between digital vulnerability, and hyper-connectivity and codification (Figure 2.4). As firms tend to increasingly purchase cloud computing services or their employees to use computer with Internet access, they are more likely to experience ICT related security incidents. In fact, the increasing connectivity of data-intensive activities adds layers of complexity, volatility and dependence on existing infrastructures and processes (OECD, 2017[30]).

Data have never been so prevalent and digitalisation has turned them into a strategic asset (OECD, 2019[23]).

Data are increasingly generated along business operations, e.g. production and delivery (process data), and compiled at various stages of business transactions (user, consumer and supplier data) (OECD, 2019[23]). Process data can improve stock management, logistics and maintenance, and business reactivity to just-in-time production requirements. They also increase the scope of efficiency gains including in terms of energy and resource consumption. User, consumer and supplier data are crucial for developing market knowledge, improving customisation and shaping new products and business models. The volume of data produced globally is forecast to grow from 33 zettabytes in 2018 to 175 zettabytes in 2025, resulting in a compounded annual growth rate of 61 percent (European Commission, 2020[31]).

In this context, how SMEs protect their data is becoming more pertinent. SMEs tend to privilege trade secrecy as their default mode of data protection (OECD, 2019[23]). Trade secrecy is confidential business information that can cover new manufacturing processes, improved recipes, business plans or commercial information on whom to buy from and whom to sell to (e.g. customer list). Unlike patents, trade secrets are protected by law on confidential information, e.g. confidentiality agreement, or non-disclosure or covenant-not-compete clauses. Trade secret popularity holds on its relative ease of use (due to low technicity and the absence of formal registration requirements), lower costs incurred for administration and the absence of definite term of protection (Brant and Lohse, 2014[32]).

Digitalisation has made the protection of trade secrets increasingly difficult. The revolution in data codification, storage and exchange (i.e. cloud computing, emails, USB drives) are prime drivers of a rise in trade secret infringements. Increasing value given to intellectual property (and de facto its misappropriation), staff mobility and changing work culture and relationships (e.g. temporary contracts, outplacement, teleworking) or the fragmentation of global value chains (with more foreign parties involved within more diverse legal frameworks and uneven enforcement conditions) also contribute to increase exposure and risk of disclosure (Almeling, 2012[33]).

The COVID-19 pandemic of 2020 has imposed a radical rethinking of business models. Small businesses in retail trade, manufacturing and a broad range of services, where physical presence and social contact once were common practice, have been confronted with the need to deliver and do business in a “contactless” way, or otherwise shut down non-mission critical, on-premise operations either periodically or permanently (OECD, 2020[34]) (OECD, 2021 forthcoming[35]). Business opportunities also emerge in this difficult context.

Some digital technologies and tools were sufficiently advanced and affordable to offer viable work-arounds and solutions in this context. Existing businesses have re-engineered their organisational structure and processes, adapting practices, proposing new products and/ or services (e.g. e-shops, home deliveries, Click and Collect, etc.), and accelerating digital adoption, while customers and employees stay home. SMEs have been at the forefront of these adjustments as the most affected by the crisis. The digital transition took place, sometimes with no former digital experience or very low digital maturity or preparedness (OECD, 2020[36]) (see Chapter 1 on digital access and uptake of SMEs).

Some business surveys and analysis that were conducted during this period in order to track the impact of the pandemic on business activities provide data on the uptake of teleworking and digital practices during and following lockdowns (Table 2.9) (OECD, 2020[37]).

Teleworking has clearly widespread because of the pandemic, albeit differently between and within countries, depending on former practices and structural capacity (OECD, 2020[40]). For instance, prior to the pandemic, a 2016 Swedish study found that “telework has become routine for over 20% of all employed” (Vilhelmson and Thulin, 2016[41]). A 2017 study of 30 European countries (Ojala and Pyöriä, 2017[42]) found that 23% of Danes, 21% of Dutch and 18% of Swedes worked from home “at least several times a month”. The lowest work-from-home rates in that sample were 6% in both Bulgaria and Cyprus (DeSilver, 2020[43]). The lowest-ranked OECD countries in the sample were Slovak Republic (8%) and Lithuania (8%). In the US, estimates were about 7% of private-industry workers and 4% of state and local workers who had the option to telework. A recent OECD study explores the diversity of tasks performed in different types of occupations, and the geographical distribution of those occupations. Results show that cities have a larger share of people that can work remotely - from 50% of the employed population in Luxembourg to 21% in Turkey – and capitals have, in most cases, the highest share of employment in occupations that can potentially be performed remotely (OECD, 2020[40]).

Zoom, an online remote conferencing platform, saw its daily active users jump from 10 million to about 200 million in three months following increased remote working (Chailytko, 2020[44]) (Figure 2.5). This was the highest jump in commonly used video conferencing platforms in absolute numbers. However, other similar services also saw fast and drastic increases in their user bases. Each service has differing security features, including end-to-end encryption, which means that the security of users differed depending on which service they used and how they used it.

Digital security attacks have continued during lockdowns, targeting the most sensitive sectors (Figure 2.6). Akamai data shows real time activity on the Internet, through the lens of its distributed network of computing platforms and servers located worldwide. Akamai is estimated to serve between 15% and 30% of all web traffic, and data are reported by Akamai consumers. The five industries that have been the most subject to attacks end March 2020 were retail services, media and entertainment, hotel and travel, high technology and gaming. These also are the sectors that have been the most impacted by the shutdown of operations and those that have experienced sudden increases in digital activities. As a comparison, malicious activities have sharply decreased in volume in July 2020, as containment measures were gradually released. Targets also changed, for instance moving away from tourism services towards manufacturing industry.

Similarly, converging evidence point to a resurgence of digital security attacks in the past months and in a number of ways:

  • Coronavirus-related scams and phishing campaigns have been on the rise (OECD, 2020[4]). There are also cases of ransomware and distributed denial of service attacks targeting hospitals, including in France, Spain and the Czech Republic.

  • An increase in phishing emails, or at least a change in the content of these emails, has been observed in the early months of the crisis (Shi, 2020[47]). Purporting to come from official sources like the World Health Organisation these emails were intended to harvest credentials from victims, and subsequently break into networks, or simply to defraud the victim.

  • In Italy, one COVID-19 themed phishing campaign hit over 10% of all organisations in the country with an email luring recipients into opening a malicious attachment (OECD, 2020[4]).

  • The US Federal Bureau of Investigation saw a spike in cybercrimes as reported to its Internet Crime Complaint Center since the beginning of the COVID-19 pandemic. It was claimed that between 3 000 and 4 000 cybersecurity complaints were consistently received each day as compared to about 1 000 daily complaints prior to the COVID-19 pandemic (Miller, 2020[48]). Reports of increased business email compromise, scams and other fraudulent activity were also reported (FBI, 2020[49]).

Check Point, a cyber-security firm, reported in May 2020 that threat actors had registered thousands of fake and malicious Zoom domains in less than a month. In the context of the COVID-19, there has been a strong correlation between the increased digitalisation of business practices and the intensification of digital security attacks (Box 2.5. D4SME Webinar on Digital Security in SMEsBox 2.5). Finally, he noted that the digital environment has become more complex (e.g. business operations shifting online, individuals using their mobile phones and tablets more). All these trends have created new vulnerabilities that hackers can exploit.

In fact, the COVID-19 crisis drew attention to the weak digital security of SMEs and small organisations such as local governments (OECD, 2020[50]). Like large businesses, they were forced to switch to teleworking, sometimes overnight. This shift has increased the potential for attacks and introduced new vulnerabilities. For instance, many SMEs did not have Virtual Private Networks (VPNs) in place, did not use multi-factor authentication for remote access, or had to allow employees to use their own devices, which were not as secure as the ones provided by the organisation.

There is a strong relationship between adoption of digital security measures and enterprise size. As enterprises become larger, a higher proportion implement a greater number of and more advanced digital security measures.

National statistics provide similar results and a sense of the persistence of this relationship from year to year:

  • A separate survey undertaken in the United Kingdom indicates that the proportion of enterprises with a formal policy covering cyber security risks increased as enterprise size increased (Figure 2.7). This trend is echoed in the prior two years’ (2018 and 2017) results for this survey, which used comparable and representative samples.

  • A 2018 study on IT Security and Data Management in Danish SMEs, conducted for the Danish Business Agency, found a clear relationship between enterprise size (by headcount) and the digital security measures in place (Figure 2.8). As headcount increases, the proportion of enterprises that have implemented either basic or essential security measures increases (Monitor Deloitte for Erhvervsstyrelsen, 2018[51]).

  • Outside Europe, the 2009 ABACUS survey in Australia show that the proportion of businesses with some form of computer security policy increased as enterprise size increased (Figure 2.9).

  • When put against the UK Cyber Breaches Survey 2019, one can see that this tendency has persisted over time (Figure 2.10). SMEs are less likely to have implemented five or all ten of the recommended digital security measures as part of the Government’s “10 Steps Guidance”, which was first issued in 2015.1

While it may be tempting to infer that the more limited deployment of digital security measures among smaller firms is in-of-itself problematic, as the prior section identified, there might be alternative explanations. This might be due to smaller enterprises simply not using digital technologies or being subject to different scale/sophistication of threats, and thus not requiring as many or the same kinds of measures/practices as larger enterprises.

ICT digital security practices differ across firm size classes (Figure 2.11). European business surveys on ICT use show that all firms seem to engage actively in prevention, through data backup to separate location and regular updates of software and operating systems. The gap in implementation between micro and large firms is limited as compared to other digital security practices. In terms of access protection, micro firms tend to use relatively often strong password authentication, like larger firms.

However, smaller firms tend to drop out when it turns to more sophisticated (e.g. VPN or biometrics) or more integrated (e.g. ICT digital corporate policy) approach of cybersecurity, or continuous monitoring.

Smaller firms have less of a tendency to have dedicated employees for carrying out ICT security-related activities (Figure 2.12). For instance, across the EU28 area, security activities in over 80% large firms are carried out by their own employees compared to less than 40% of small firms. At the same time, smaller firms tend to outsource their digital security responsibilities explicitly, by contracting external consultants/specialists, just about as much as their larger peers (Box 2.6). Again, across the EU28 area in 2019, 65% of SMEs compared to 68% of large enterprises, ICT security-related activities were carried out by external suppliers.

Another way that enterprises implicitly or explicitly delegate responsibility for digital security to external third parties is through the products or services that they choose to use. Examples might include using commercial software like Microsoft Office, Gmail, Salesforce or Adobe, amongst countless others. Software and hardware are designed in very specific ways, which include the basic functionality of the product or service and/or security features. When enterprises choose to use these products or services they are implicitly delegating part of the responsibility to the designer, manufacturer and/or end-retailer. This delegation can be effective in instances where the external party has the ability to make more sophisticated design choices and use greater resources in the design and maintenance of security features. An example of such a service would be Cloud services, which leverage network effects amongst service users to deliver a better-resourced set of security features than the individual users would be able to maintain on their own. By contrast, this delegation may be sub-optimal in instances where the end user is unable to ascertain the quality or robustness of the security features in the absence of the specialised knowledge/information to make such a decision.

The same data provide some insights on the frequency at which firms review their ICT policy, or have designed the current one (Figure 2.13). Although all size firms, when they have recently revised their ICT policy, have done so in the last 12 months, the proportion of small firms remains twice lower than medium-sized firms, and three times lower than large firms.

In absolute terms, SMEs tend to invest less in digital security than large counterparts do (Table 2.10). This is due in part to their lesser tendency to use digital technologies. Spending does tend to be skewed though, with a small number of digitally intensive enterprises in certain sectors (e.g. finance, information, healthcare) spending orders of magnitude more per year on digital security – due to necessity – than enterprises in less intensive industries (e.g. hospitality, real estate, construction). One element to note is that, according to the 2019 UK Cyber Breaches Survey, a higher proportion of smaller enterprises claim to spend nothing on digital security as compared to larger enterprises.

There is a growing industry for insurance policies that aim to cover the costs and losses associated with digital security incidents. According to Moody’s, based on US regulatory financial data, direct cyber premiums written grew to USD 2 billion in 2018, or a cumulative annual growth rate of 26% since 2015 (Moody’s, 2019[52]). It was hoped that the European Union’s (EU) General Data Protection Regulation (GDPR) would help spur faster growth in Europe following its implementation in 2018 (OECD, 2018[53]).

However, SMEs tend to purchase stand-alone digital security insurance policies less than larger enterprises. This is a common feature in all countries covered by the European business survey on ICT use, with the notable exception of Denmark (Figure 2.14). In the EU28, on average, about 40% of large enterprises purchase ICT insurance as compared to about 20% of SMEs.

Setting aside that many non-stand-alone insurance policies could be triggered in the event of some digital security incidents (e.g. property and casualty lines triggered due to ransomware), there are thought to be a few reasons why SMEs tend to buy such insurance compared to larger enterprises. “The needs and expectations of many businesses can diverge from the scope of coverage commonly provided by insurance companies(OECD, 2018[54]). “Buying the right policies can be challenging, particularly for companies whose understanding of their own vulnerabilities may be sketchy” (OECD, 2018[55]). When surveyed in 2019 on the reasons why they do not have “cyber insurance”, respondents in the United Kingdom replied:

  • They are already being covered by an external cyber security provider (23% of businesses and 26% of charities).

  • They lack awareness of cyber insurance (23% of businesses and 15% of charities).

  • They consider themselves to have too low a risk (29% of charities and 22% of businesses).2

There is substantial variation in the implementation of digital security practices and measures by country. In almost all countries surveyed as part of the 2015 Community survey on ICT usage in enterprises, when asked if the enterprise had a formally defined ICT policy3 in place the difference between SMEs and large enterprises was approximately 30%. These results were reinforced in the most recent 2019 survey, though the terminology used was slightly different4 (Figure 2.15).

In light of the reasons why SMEs manage their digital security risk the way that they do, and the economic consequences of poor digital security risk management amongst these enterprises, governments in many OECD countries have developed and implemented various policies. Owing to the fact that SMEs make up close to 99% of enterprises in almost all OECD countries (OECD, 2019[23]), any government initiative to improve digital security in enterprises ends up applying to and/or affecting SMEs. A limited number of OECD countries have implemented SME-specific policies aimed at improving digital security in various ways. This section goes in depth to explain the rationales behind these policies and then provides past and current policy examples, based on national documentation and country responses to the OECD Survey on Digital Security Policies 2019.

Governments have first a key role to play in maintaining the legal and judicial frameworks within which public administration and markets operate, refraining misappropriation of data, infringement of property and privacy rights, fraud and extortion. This is of importance as SMEs are disproportionately affected by inefficiencies in institutions and regulatory frameworks (OECD, 2019[23]).

In addition, digital security risk is partly the consequence of a range of failures in digital technologies markets (Dean, 2018[56]). In that sense, governments can provide the conditions for the market to reach a socially optimal level of digital security, taking into account that cybersecurity presents the features of a public good. Market failures include:

  • Information asymmetry among consumers: It can be difficult for consumers to evaluate the security features of highly technical products. It can also be difficult for them to evaluate the relative quality of software code, because of a lack of technical competences, and because many producers use protection to prevent software inspection. When considering which products to purchase, if given a choice, consumers are not always able to assess which is truly the more secure option.

  • Distortion of market signals for producers: Compounding matters, the inability of consumers to assess the relative security of a product means that producers who have invested in more secure products cannot easily differentiate themselves in the market. This prevents them from passing the additional cost of security development onto end users, e.g. in the form of price premium, also resulting in a “market for lemons”, i.e. where “good” products are crowded out by the “bad” ones (Akerlof, 1970[57]). As a result, private investment in digital security may be below the socially desirable level if firms cannot fully appropriate the returns from their investments.

  • Negative externalities: The cost of digital security incidents are not always borne by the producer of the technology in question. Moreover, some producers do not implement sufficient security measures to reduce the probability of some classes of incidents, given that the costs of the incidents are borne by others. Again, negative externalities may lead to an under-investment in digital security.

  • Moral hazard: Moral hazard raises uncertainty as it involves that one party bears the costs and losses due to the risky actions of others.

To date, government efforts have aimed to incentivise the production of more secure digital products (“security by design” or “privacy by design”), and to introduce penalties for actors whose products lead to digital security incidents, or whose failure to properly manage digital security risk results in costs or losses for others parties. Many of these initiatives have been implemented as part, or following, the adoption of national cybersecurity strategies across OECD countries and they have increased in number and span over time (OECD, 2017[30]). The following section provides a panorama of the major types of initiatives typically undertaken to assist SMEs with digital security across OECD countries.

National digital security strategies serve as major container for related policies, and, according to the OECD Recommendation (OECD, 2015[58]), should consider SMEs specifically in design and implementation, especially because of possible governance failures between digital security agencies and SME policy instances (Table 2.12).

Government initiatives to improve the overall level of digital security in markets can fall into the following categories. On the one side are policies that aim to encourage businesses to supply existing/novel digital security solutions (supply side) or, on the other side, those that aim to encourage businesses to improve the adoption of better digital security risk management practices (demand side) (Table 2.12).

In recent years, numerous national governments have undertaken efforts to develop and implement legislation intended to improve digital security. These legislative efforts sometimes overlap with the aforementioned data protection and privacy efforts but can be thought of as separate given their differing goals and compositions. National digital security legislations often aim to improve digital security in public-sector organisations, and create new public-sector organisations responsible for digital security, though in some cases their provisions also apply to, or affect, private sector enterprises.

The most recent, noteworthy federal legislation effort relative to digital security in the United States is the NIST Small Business Cybersecurity Act.5 Signed into law in August 2018, it requires the National Institute of Standards and Technology (NIST) to, “disseminate clear and concise resources to help small business concerns identify, assess, manage, and reduce their cybersecurity risks”. These informational resources must be generally applicable to a wide range of small businesses; vary with the nature and size of small businesses; promote cybersecurity awareness and workplace cybersecurity culture; and include practical application strategies.

However, one notable example with implications for SMEs is California’s Bill SB-327 “Information privacy: connected devices”6 that “requires a manufacturer that sells or offers to sell a connected device in California to equip the connected device with a reasonable security feature or features appropriate to the nature and function of the device that is designed to protect the device from unauthorized remote access or use”. This bill is notable because it mandates specific security measures that should be implemented in an Internet of Things device, which is a stark departure from the tendency of legislators in most jurisdictions to avoid prescriptive legislation that mandates certain security features.

Perhaps in recent years, a consequential national legislation in the area of digital security has been implemented in China. The law came into force in June 2017 and imposes new digital security and data governance requirements on companies doing business in and with entities domiciled in China, which means a substantial number of SMEs (International Association of Privacy Professionals, 2017[59]). The most consequential part of this law for SMEs relates to data localisation requirements. If a company operates in China, and it collects personal information on Chinese citizens, that company is required to store that data on servers located physically in China. If companies deem it “necessary” to transfer such information overseas “due to business requirements”, the transfer may only be carried out following a security review (Livingston, 2017[60]). The effect is to make it more difficult and costly for non-Chinese companies to operate in China, which places greater constraints on enterprises’ ability to generate and provide value in what is a digital world with potentially global reach but increasingly regional limits.

This is part of a larger trend around data localisation, which is introducing similar additional costs to doing business in a number of other countries. Other examples include Australia (Chander and Lê, 2015[61]), Germany (Determann and Weigl, 2016[62]), Turkey (Yavuzdogan Okumus, 2020[63]), the Russian Federation (Bowman, 2015[64]) and South Korea (Chander and Le, 2014[65]) among other countries. Data localisation requirements’ potential impact on SMEs should be understood in light of the proliferation of new services such as big data, cloud computing, and IoT. Many providers of these services have significant international footprints; as such, data localisation requirements may raise barriers to entry and discourage new market entrants. Local SMEs could thus face substantial increases in their computing costs, potentially as high as 30-60% (Leviathan Security Group, 2015[66]).

A number of countries have started to develop national certification schemes for digital security. These initiatives involve the development of a series of “best practices” that enterprises can implement in their own operations or in the design of their products and services. Upon completing the requisite steps, enterprises receive a certification that can signal to consumers or business partners the level of digital security of the enterprise or its products/services. These schemes aim to raise the firm’s profile and reduce information asymmetry on the market. These schemes may also incentivise producers to design their products/services in a way that is “secure by design” (OWASP, 2020[67]). In this way, labelling schemes can help suppliers turn security into a competitive advantage and support market differentiation (OECD, 2019[27]).

The EU Cybersecurity Act creates, “an EU-wide cybersecurity certification framework for ICT products, services and processes” (European Commission, n.d.[68]). Still in development, the framework is intended to provide a comprehensive set of rules, technical requirements, standards and procedures for the evaluation of the security properties of a specific ICT-based product or service. This is potentially of benefit to SMEs in that it would provide a generally agreed upon standard and greater clarity for digital security in products/services.

A consistent or common certification scheme across countries also comes with additional benefits: consumers could refer to a trusted and recognisable standard, while producers could benefit from reduced transaction and opportunity costs associated with operating across borders, which would also increase the profitability of their products.

The United Kingdom, as part of its National Cyber Security Programme, has developed and implemented the Cyber Essentials and Cyber Essentials Plus programmes (National Cyber Security Centre, n.d.[69]). These programmes include an assurance framework and a simple set of security controls that enterprises can implement to protect their data and systems from threats coming from the internet. Cyber Essentials is a self-assessment tool, which is independently verified. Cyber Essentials Plus, by contrast, involves independent testing. Divided up into five technical controls, an enterprise is encouraged to implement boundary firewalls and internet gateways, secure configuration, access controls, malware protection and patch management. The UK government worked with the Information Assurance for Small and Medium Enterprises (IASME) consortium to develop Cyber Essentials and it is backed by the Federation of Small Businesses (United Kingdom Government, 2019[70]). Any enterprise can apply for and receive these certifications, but they may be particularly helpful to SMEs in that they provide succinct and clear guidance on useful digital security measures. Moreover, they are required for government contracts where the supplier is providing ICT services or handling personal information (Cyber Management Alliance, 2016[71]). Having a clear set of minimum criteria may be helpful for SMEs in their efforts to win public contracts.

A similar initiative is Canada’s CyberSecure Canada Certification Program, which was announced in August 2019. “SMEs that demonstrate compliance with specified baseline cybersecurity controls7, based on an audit by an accredited certification body, will be granted a two-year certification and be entitled to use the CyberSecure Canada logo” (Freedman, 2019[72]).

SMEs can be the source of new and improved digital security products, services or methods. A subset of fast-growing SMEs are a particularly important source of such innovations in OECD countries (OECD, 2010[73]). There are a number of ways that governments can foster digital security innovation by enterprises, including SMEs, such as tax incentives, acting as an early customer for innovative products, using regulation to stimulate demand for such products, or through the creation of a digital security innovation ecosystem (OECD, 2020[74]).

Canada’s Innovation and Skills plan seeks to encourage the growth of many innovative industries including the “digital” industry, which includes digital security. While SMEs are not specifically mentioned as a target for these initiatives, the plan will have implications for SMEs through the creation of superclusters, attraction of new high-quality business investments (via the Strategic Innovation Fund), and the support given to innovative businesses with venture capital (Government of Canada, 2017[75]).

Mexico, through its long-standing PROSOFT Program, promotes the creation of industrial Innovation Centers (IIC) that are focused on providing trained and specialised human capital, as well as the adoption of new technologies linked to “Industry 4.0”, such as digital security (Government of Mexico, 2016[76]).

Spain’s National Cyber Security Strategy aims to generate knowledge and develop research and development activities in digital security. Line of Action 5 is specifically focused on, “strengthen[ing] the Spanish cybersecurity industry and its capacity to nurture and retain talent, to bolster digital autonomy” (Government of Spain, 2018[77]). Amongst the different measures proposed are: boosting R&D support programmes in digital security in SMEs, businesses, universities and research centres; facilitating access to national and international incentive programmes; and innovative public purchasing programmes.

The United Kingdom uses public procurement to encourage SMEs and supply chain actors to enhance their digital security. Companies that wish to become government suppliers need to implement the Cyber Essentials or Cyber Essentials Plus certification schemes. This approach promotes digital security without creating rigid compliance regulation that is likely to become outdated quickly or create burdensome requirements for business (OECD, 2020[74]).

The European Cyber Security Organisation (ECSO), is a public-private partnership that co-ordinates the innovation roadmaps and investments in the EU. It brings together many stakeholders including SMEs and industry more broadly, academia, regional representatives and Member States. ECSO helps prioritise investments across many technical areas of which digital security. (OECD, 2020[74])

Numerous countries have undertaken a variety of efforts to increase awareness of digital security amongst the wider public, sometimes especially targeted to the business sector and SMEs. Those efforts aim to provide quality advice/guidance, and relatively inexpensive solutions, that, if adopted, would reduce SME digital security exposure and potential losses substantially. Indeed, the risk of exposure follows a Pareto distribution, whereby a large proportion of possible losses can be avoided with small investments in and implementation of certain protection measures.

As a part of its 2020 Cyber Security Strategy, Australia has implemented a number of SME-specific initiatives including some related to education and awareness campaigns. The Australian Cyber Security Centre (ACSC) chose to offer both guidance on what SMEs should be doing, but how they should implement a digital security strategy. Policy examples include tailored toolkits (e.g. to assess maturity levels).

The Belgian Federal Public Service for the Economy, SMEs, Middle Classes and Energy has an online set of resources to inform and assist SMEs in digital security matters. The information kit includes documents on undertaking risk assessments, key principles for ensuring digital security, what to do in the event of an incident and a glossary of key technical terms (Belgian Federal Public Service for the Economy, SMEs, Middle Classes and Energy, 2018[78]).

Brazil, amongst many activities proposed as part of its Cyber Security Strategy, aims to ‘create cyber security awareness actions for SMEs’. This intends to raise the level of maturity in digital security across society, and increase Brazil’s resilience to digital security threats (Government of Brazil, 2020[79]).

Canada’s Centre for Cyber Security provides people with a “Get Cyber Safe” toolkit during the Cybersecurity Month in October. The structured curriculum covers topics like “How cyber threats work”, “How cyber threats affect you”, and “How to protect your small business” (Government of Canada, 2020[80]).

Chile’s National Cybersecurity Policy includes the design of a large-scale cybersecurity campaign to promote the implementation of awareness and dissemination programmes in partnership with the private sector (Government of Chile, 2020[81]). The policy document also makes reference to October as the Cybersecurity Month and a Safe Internet Day in February each year. More broadly, the Ministry of Education administers the “Internet Segura” (Safe Internet) initiative, to help people use the internet in a way that is “responsible, informed, safe, ethical, free and participatory (Internet Segura y Ciudadanía Digital, 2020[82]).

Denmark’s Cyber and Information Security Strategy focuses on strengthening the IT security knowhow of SME primary advisors, so they can operate as “bridge-builders”. The aim is to make these advisors (e.g accountants, lawyers, etc.) raise IT security issues in their dialogue with SME leadership (Government of Denmark, 2018[83]).

France has a label SecNumedu for professional training courses targeting SMEs,8 a guide for developing cyber hygiene within SMEs9 and a platform that reports on malicious activities and provides assistance to professionals.10 Japan established the Cybersecurity Strategic Headquarters in 2014, with a number of responsibilities of which implementing a “Cybersecurity Human Resource Development Plan” (National center of Incident readiness and Strategy for Cybersecurity, 2020[84]). Its outreach functions include a collaboration with Association of South East Asian Nations (ASEAN) members on “awareness raising, capacity building and so on.11

Korea’s Internet Security Agency (KISA) provides various educational and professional training programmes in order to raise awareness with the general public, promoting cybersecurity courses in higher education and promoting certification of professionals in both public and private sectors12.

Mexico has a National Cybersecurity Strategy and conducts awareness campaigns. The Federal Police runs a National Prevention Campaign called Cybersecurity Mexico, which seeks to “raise awareness in Mexican society about the responsible use of new technologies and the Internet to reduce the damage caused by cybercrime” (Council of Europe, 2020[85]). Additionally, since 2015, National Cybersecurity Weeks are organised in collaboration with the Organization of American States.

In 2018, Sweden assigned an authority to develop and implement a programme that aims to increase digitalisation skills among the management and boards of small companies. It is a three-year venture, whereby small businesses raise capacity to assess and manage digitalisation risks from an economic perspective (Swedish Agency for Economic Growth and Regional Development, 2020[86]).

The UK Centre for the Protection of National Infrastructure has developed a series of security awareness campaigns, designed to provide organisations with a complete range of materials they need. Some of the topics covered in these materials include “Don’t take the bait”, which addresses the risk of spear-phishing, “Identifying the right security behaviours” and “Think before you link” (Center for the Protection of National Infrastructure, 2020[87]).

The US Department of Homeland Security (DHS) administers a National Initiative for Cybersecurity Education. This comprises four key activities: 1) National Cybersecurity Awareness Campaign, 2) formal cybersecurity education, 3) federal Cybersecurity Workforce Structure13 and 4) Cybersecurity Workforce Training and Professional Development (McConnell, 2017[88]). The “Stop. Think. Connect” programme is a national public awareness campaign aimed at increasing the understanding of cyber threats and encouraging the public to be safer and more secure online (Cybersecurity and Infrastructure Agency, 2020[89]). A toolkit has been assembled for various groups, including the industry (Cybersecurity and Infrastructure Agency, 2020[90]) and small businesses (Cybersecurity and Infrastructure Agency, 2020[91]). October is National Cybersecurity Awareness Month (NCSAM) and DHS releases at this occasion a new toolkit each year to make it easy for people and organisations, regardless of size or industry, to engage and promote NCSAM (Cybersecurity and Infrastructure Agency, 2020[92]).

The European Cybersecurity Month (ECSM) is an awareness campaign in October of each year that:

“promotes cybersecurity among EU citizens and advocates seeking to change the perception of cyber-threats by promoting education, sharing of good practices and competitions in data and information security” (ENISA, 2020[93])

In practice, this involves numerous activities including training, conferences, online quizzes and by providing general presentations to end users (ENISA, 2019[94]).

The European Commission and EASME, the Executive Agency for SMEs, recently ran an initiative to support specialised skills development related to Big Data, IoT and Cybersecurity for SMEs in Europe. The initiative involved convening many stakeholders to discuss the issues, and resulted in a final report containing an analysis of the potential benefits and barriers for technology adoption by SMEs. The work presents a vision, roadmap and toolbox to increase the capacity of industry, social partners, education and training organisations and policy makers at all levels to promote and support the acquisition of these skills by SMEs in Europe (European Commission, 2020[95]).

Although SMEs have a smaller “attack surface”, they are increasingly exposed to digital security threats and digital security breaches. The digital transformation raises their level of exposure as it implies greater connectivity and reliance on software, and make them more vulnerable if proper digital security risk management practices are not in place. In addition, the COVID-19 crisis has made more businesses reliant on digital technology than before, giving an opportunity for malicious actors to intensify attacks, e.g. phishing then fraud, taking advantage of sudden and massive surge in teleworking arrangements and online transactions. A combination of low digital security risk management experience/maturity coupled with increased reliance also makes the potential impact of disruptions more serious (i.e. business interruption).

Phishing, denial of service and ransomware attacks continue to be the most prevalent methods, and can be often countered by implementing baseline security measures. But attacks have also become more sophisticated over time, techniques evolving continuously and requiring more advanced risk management capacities that smaller firms are less likely to have first.

Digital security incidents can result in sizeable costs and losses, and tend to increase with firm size. A small proportion of enterprises incur the lion’s share of incidents and losses. However, when affected by rare but very costly incidents, SMEs can incur costs that can add up to several months of revenues. In addition, weak digital security practices may become a barrier for them to build business networks.

SMEs tend to have less comprehensive and sophisticated digital security risk management practices. They often do not have a person dedicated to digital security internally. They tend to seek less information from external sources on digital security and do not tend to have formal procedures in place to detect intrusions. They also tend to update their procedures less often and invest less in digital security, although this varies across sectors and countries.

Governments increasingly aim to encourage the adoption of better digital security practices in SMEs through certification schemes, security standards, or by raising awareness and building business competences on digital security. Policy initiatives are often not specific to SMEs, or not specifically designed towards this segment of the business population, although recent policy trends show a shift towards more targeted approaches (e.g. UK cyber essentials, France’s training label and reporting platform, etc.).

Looking forward, SMEs need to be more aware of and effectively manage digital risk so as to make the most of the opportunities afforded by the digital transformation. This message has been consistently reinforced by the OECD, and the 2015 OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity states that “digital risk should be approached as an economic risk; it should therefore be an integral part of an organisation’s overall risk management and decision making processes.” (OECD, 2019[27]; OECD, 2015[58]).

Unfortunately, there is no one-size-fits-all digital security governance, as methods and techniques vary, depending on the risks incurred, the types of attacks suffered, the types of assets to protect, and in turn, the business models prevailing in the sector. This makes managing digital security risk effectively challenging. Various policies have attempted to assist SMEs to improve their digital security risk management practices. The rapid intensification of digital uses in the context of COVID-19 has made the need to manage this risk more urgent. If old trends hold, there is possibly a widening gap emerging between the need and ability of SMEs to manage this risk.

The evidence base for digital security policies, and risk management, improve with each passing year. A much more substantive research base is now available (and has been cited throughout this paper). There is still much more work to be done though, so as to ensure that the best evidence and research is available to guide decision making both within enterprises and government.

Further research would be useful to:

  • Better understand the correlation between firm-level vulnerability and investment in digital security, and the various types and amounts of costs incurred due to different types of digital security incidents. These incidents and their costs may differ across OECD countries depending on many factors such as the composition of the enterprise population and their industrial structure.

  • The impact that age has on an enterprise’s likelihood to have mature digital security risk management practices. Some evidence has pointed to younger enterprises being more likely to use and be reliant upon digital technologies. This would imply that their digital security risk management practices would need to be, and perhaps are more, sophisticated than older larger enterprises. However, there is little in the way of evidence-based consensus in this area.

  • The link between the incidence of digital security attacks or failure and the policies implemented in a country has not been clearly established. Anecdotally, ransomware incidents are not as severe or frequent in Germany as in other OECD countries. This is because the government mandates enterprises to have backups, which makes recovery from a ransomware attack much faster. An evaluation of the impact of some policies, backed by methods involving natural experiments, might shine more light on policies that work with the best return on investment by type of enterprises and sector.

  • In addition, as digital services are increasingly connected and extending beyond the reach of a single jurisdiction and control institution, the risks of systemic failures are likely to grow and new governance challenges for businesses and governments to emerge. These single points of failure aggregate systemic risk, which if disrupted could lead to cascading losses throughout economies. Better understanding of where these single points of failure lie, and which enterprises are connected to and reliant upon them, would help future efforts to manage this risk.

All this calls for enhanced co-operation and knowledge exchange: within industries where actors share similar business models; between SMEs and large firms that share similar threats with different and potentially complementary response capacity; across jurisdictions that face no-border attacks; or between policy domains, for instance research and innovation policy and SME policy.

References

[100] Aconet (2020), The ACOnet CERT, https://www.aco.net/cert.html?L=1.

[46] Akamai (2020), Visualizing Global Internet Performance, https://www.akamai.com/uk/en/resources/visualizing-akamai/ (accessed on 18 July 2020).

[57] Akerlof, G. (1970), “The Market for “Lemons”: Quality Uncertainty and the Market Mechanism”, The Quarterly Journal of Economics, Vol. 84/3, p. 488, http://dx.doi.org/10.2307/1879431.

[33] Almeling, D. (2012), “Seven Reasons Why Trade Secrets Are Increasingly Important”, Berkeley Technology Law Journal, Vol. 27, p. 1091, http://dx.doi.org/10.15779/Z38SM4F.

[5] ANSSI and BSI (2018), “ANSSI/BSI Common situational picture”, https://www.ssi.gouv.fr/uploads/2018/07/bilateral-french-german-it-security-situation-report.pdf (accessed on 30 March 2020).

[97] Australian Signals Directorate (2020), About the ACSC, https://www.cyber.gov.au/about.

[78] Belgian Federal Public Service for the Economy, SMEs, Middle Classes and Energy (2018), Cybersecurity – is your enterprise ready?, https://economie.fgov.be/fr/publications/cybersecurite-votre-entreprise (accessed on 11 December 2020).

[19] Biancotti, C. (2017), “Cyber Attacks: Preliminary Evidence from the Bank of Italy’s Business Surveys”, Bank of Italy, Occasional Paper No. 373, http://dx.doi.org/10.2139/ssrn.2954991.

[26] Biancotti, C. (2017), “The price of cyber (in)security: Evidence from the Italian private sector”, Bank of Italy, Occasional Papers No 407, https://www.bancaditalia.it/pubblicazioni/qef/2017-0407/QEF_407.pdf?language_id=1.

[64] Bowman, C. (2015), “A Primer on Russia’s New Data Localization Law”, Privacy Law Blog, https://privacylaw.proskauer.com/2015/08/articles/international/a-primer-on-russias-new-data-localization-law/ (accessed on 4 March 2020).

[32] Brant, J. and S. Lohse (2014), “Trade Secrets: Tools for Innovation and Collaboration in Innovation”, Intellectual Property Series, International Chamber of Commerce, https://cdn.iccwbo.org/content/uploads/sites/3/2017/02/ICC-Research-Trade-Secrets-english.pdf (accessed on 18 July 2018).

[22] Calvino, F. et al. (2018), “A taxonomy of digital intensive sectors”, OECD Science, Technology and Industry Working Papers, No. 2018/14, OECD Publishing, Paris, https://dx.doi.org/10.1787/f404736a-en.

[105] Carnegie Mellon University (2020), “The CERT Division”, Software Engineering Institute, http://sei.cmu.edu/about/divisions/cert/index.cfm.

[87] Center for the Protection of National Infrastructure (2020), Security awareness campaigns, https://www.cpni.gov.uk/security-awareness-campaigns (accessed on 11 December 2020).

[99] CERT.at (2020), Australian energy CERT, https://cert.at/de/ueber-uns/austrian-energy-cert/ (accessed on 11 December 2020).

[98] CERT.at (2020), Zuständigkeit, https://www.cert.at/about/scope/scope.html (accessed on 11 December 2020).

[44] Chailytko, A. (2020), Zoom-zoom: we are watching you, https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/.

[65] Chander, A. and U. Le (2014), “Breaking the Web: Data Localization vs. the Global Internet”, Emory Law Journal, UC Davis Legal Studies Research Paper No. 378, https://ssrn.com/abstract=2407858 (accessed on 15 January 2021).

[61] Chander, A. and U. Lê (2015), “Data nationalism”, Emory Law Journal, Vol. 64/3, https://scholarlycommons.law.emory.edu/elj/vol64/iss3/2 (accessed on 4 March 2020).

[85] Council of Europe (2020), Mexico: National cybersecurity strategy and awareness campaign, https://www.coe.int/en/web/cybercrime/-/mexico-national-cybersecurity-strategy-and-awareness-campaign (accessed on 11 December 2020).

[102] CSIRT (2020), CSIRT Italia, http://www.csirt-ita.it (accessed on 11 December 2020).

[71] Cyber Management Alliance (2016), “Cyber Essentials: The security standard for small to medium companies”, https://www.cm-alliance.com/consultancy/compliance-gap-analysis/cyber-essentials/ (accessed on 7 March 2020).

[92] Cybersecurity and Infrastructure Agency (2020), Cybersecurity Awareness Month, https://www.cisa.gov/national-cyber-security-awareness-month.

[89] Cybersecurity and Infrastructure Agency (2020), Stop. Think. Connect., https://www.cisa.gov/stopthinkconnect (accessed on 11 December 2020).

[90] Cybersecurity and Infrastructure Agency (2020), Stop. Think. Connect. Industry resources, https://www.cisa.gov/publication/stopthinkconnect-industry-resources.

[91] Cybersecurity and Infrastructure Agency (2020), Stop. Think. Connect. Small business resources, https://www.cisa.gov/publication/stopthinkconnect-small-business-resources.

[24] Cyentia Institute (2019), Information Risk Insights Study 2020, https://www.cyentia.com/iris/.

[56] Dean, B. (2018), “An exploration of strict products liability and the internet of things”, Center for Democracy and Technology, https://dx.doi.org/10.2139/ssrn.3193049.

[13] Dean, B. (2018), Strict Products Liability and the Internet of Things, Center for Democracy and Technology, https://cdt.org/wp-content/uploads/2018/04/2018-04-16-IoT-Strict-Products-Liability-FNL.pdf.

[25] Dean, B. (2017), Trans-Atlantic Cyber Insecurity and Cyber Crime: Economic impact and future prospects, European Parliament, https://www.europarl.europa.eu/RegData/etudes/STUD/2017/603948/EPRS_STU(2017)603948_EN.pdf.

[43] DeSilver, D. (2020), “Before the coronavirus, telework was an optional benefit – mostly for the affluent few”, Pew Research Center, https://www.pewresearch.org/fact-tank/2020/03/20/before-the-coronavirus-telework-was-an-optional-benefit-mostly-for-the-affluent-few/ (accessed on 16 September 2020).

[62] Determann, L. and M. Weigl (2016), “Data residency requirements creeping into German law”, Bloomberg Law, https://web.archive.org/web/20171207221329/https://www.bna.com/data-residency-requirements-n57982069680/ (accessed on 4 March 2020).

[14] DHS and DoC (2018), Report on “Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets”, https://www.commerce.gov/page/report-president-enhancing-resilience-against-botnets.

[101] DKCERT (2020), DKCERT homepage, https://www.cert.dk (accessed on 11 December 2020).

[93] ENISA (2020), European Cybersecurity Month, https://www.enisa.europa.eu/topics/cybersecurity-education/european-cyber-security-month (accessed on 11 December 2020).

[94] ENISA (2019), ECSM Deployment Report 2019, https://www.enisa.europa.eu/publications/ecsm-deployment-report-2019.

[31] European Commission (2020), A European Strategy for Data, Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - COM(2020) 66 final, https://ec.europa.eu/info/sites/info/files/communication-european-strategy-data-19feb2020_en.pdf.

[95] European Commission (2020), Supporting Specialised Skill Development: Big Data, Internet of Things and Cyber Security for SMEs – Final report, https://op.europa.eu/en/publication-detail/-/publication/bb5c6c09-6285-11ea-b735-01aa75ed71a1/language-en.

[68] European Commission (n.d.), “The EU cybersecurity certification framework”, Shaping Europe’s digital future, https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-certification-framework (accessed on 4 March 2020).

[18] Eurostat (2020), ICT Usage in Enterprises Database, https://ec.europa.eu/eurostat/data/database (accessed on 18 July 2020).

[49] FBI (2020), “FBI urge vigilance during Covid-19 pandemic”, https://www.fbi.gov/coronavirus (accessed on 17 December 2020).

[72] Freedman, B. (2019), Ready, set, certify – Canada’s new CyberSecurity Canada certification program, https://cybersecuritylaw.ca/home/2019/8/16/ready-set-certify-canadas-new-cybersecure-canada-certification-program (accessed on 4 March 2020).

[96] GovCERT Austria (2020), GovCERT in Österreich, http://govcert.gv.at/ (accessed on 11 December 2020).

[79] Government of Brazil (2020), National Strategy of Cyber Security, https://www.in.gov.br/en/web/dou/-/decreto-n-10.222-de-5-de-fevereiro-de-2020-241828419 (accessed on 11 December 2020).

[80] Government of Canada (2020), Cyber Security Awareness Month Toolkit, https://www.getcybersafe.gc.ca/cnt/rsrcs/csam-tlkt-en.aspx (accessed on 11 December 2020).

[75] Government of Canada (2017), “Chapter 1: Skills, Innovation and Middle Class Jobs”, Budget 2017, https://www.budget.gc.ca/2017/docs/plan/chap-01-en.html#archived (accessed on 11 December 2020).

[81] Government of Chile (2020), National Cybersecurity Policy, https://www.ciberseguridad.gob.cl/media/2017/05/NCSP-ENG.pdf.

[83] Government of Denmark (2018), Danish Cyber and Information Security Strategy 2018-2021, https://digst.dk/media/16943/danish_cyber_and_information_security_strategy_pdfa.pdf.

[76] Government of Mexico (2016), “Programme for the development of the software industry (PROSOFT) and innovation 2019”, https://www.gob.mx/se/acciones-y-programas/programa-para-el-desarrollo-de-la-industria-de-software-prosoft-y-la-innovacion-2016.

[77] Government of Spain (2018), “National security strategy”, https://www.dsn.gob.es/documento/informe-anual-seguridad-nacional-2018 (accessed on 11 December 2020).

[6] Greenberg, A. (2018), The Untold Story of NotPetya, the Most Devastating Cyberattack in History, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ (accessed on 30 March 2020).

[38] IBM/Ponemon (2020), Cost of a Data Breach Report, https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/ (accessed on 29 August 2020).

[59] International Association of Privacy Professionals (2017), “China’s new cybersecurity law”, https://iapp.org/resources/article/chinas-new-cybersecurity-law-2/ (accessed on 4 March 2020).

[82] Internet Segura y Ciudadanía Digital (2020), Quiénes somos, http://www.internetsegura.cl/quienes-somos/ (accessed on 11 December 2020).

[8] Kaspersky (2019), Story of the year 2019: Cities under ransomware siege, Securelist, https://securelist.com/story-of-the-year-2019-cities-under-ransomware-siege/95456/ (accessed on 31 March 2020).

[45] Koeze, E. and N. Popper (2020), “The Virus Changed the Way We Internet”, The New York Times, https://www.nytimes.com/interactive/2020/04/07/technology/coronavirus-internet-use.html (accessed on 17 July 2020).

[103] KRCERT (2020), KRCERT homepage, http://eng.krcert.or.kr.

[66] Leviathan Security Group (2015), Quantifying the Cost of Forced Localization, https://static1.squarespace.com/static/556340ece4b0869396f21099/t/559dad76e4b0899d97726a8b/1436396918881/Quantifying+the+Cost+of+Forced+Localization.pdf.

[60] Livingston, S. (2017), “China set to expand data localization and security review requirements”, International Association of Privacy Professionals, https://iapp.org/news/a/china-set-to-expand-data-localization-and-security-review-requirements/ (accessed on 4 March 2020).

[88] McConnell, B. (2017), National Cybersecurity Awareness Campaign, https://www.nist.gov/system/files/documents/2017/01/25/bmcconnell_national-cybersec-awareness.pdf.

[48] Miller, M. (2020), “FBI sees spike in cyber crime reports during coronavirus pandemic”, The Hill, https://thehill.com/policy/cybersecurity/493198-fbi-sees-spike-in-cyber-crime-reports-during-coronavirus-pandemic (accessed on 17 December 2020).

[51] Monitor Deloitte for Erhvervsstyrelsen (2018), IT security and data management in Danish SMEs, https://erhvervsstyrelsen.dk/sites/default/files/2019-11/Analyse%20af%20digital%20sikkerhed%20blandt%20SMV%27er%202019.pdf (accessed on 9 September 2020).

[52] Moody’s (2019), “Battling hidden cyber exposures, insurers position for growing opportunity”, https://www.grupoaseguranza.com/adjuntos/fichero_32099_20190729.pdf (accessed on 9 September 2020).

[84] National center of Incident readiness and Strategy for Cybersecurity (2020), About NISC, https://www.nisc.go.jp/eng/.

[106] National Cyber Security Centre (2018), “Executive Summary: the 10 Steps to Cyber Security”, https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security/introduction-to-cyber-security/executive-summary.

[69] National Cyber Security Centre (n.d.), “Information for Individuals and Families“, https://www.cyberaware.gov.uk/cyberessentials/ (accessed on 4 March 2020).

[15] NIST (2020), National Vulnerability Database, https://nvd.nist.gov/vuln/search/statistics?form_type=Basic&results_type=statistics&search_type=last3years.

[40] OECD (2020), “Capacity for remote working can affect lockdown costs differently across places”, OECD Policy Responses to Coronavirus (COVID-19), http://www.oecd.org/coronavirus/policy-responses/capacity-for-remote-working-can-affect-lockdown-costs-differently-across-places-0e85740e/ (accessed on 18 July 2020).

[37] OECD (2020), “Coronavirus (COVID-19): SME policy responses”, OECD Policy Responses to Coronavirus (COVID-19), http://www.oecd.org/coronavirus/policy-responses/coronavirus-covid-19-sme-policy-responses-04440101/ (accessed on 18 July 2020).

[4] OECD (2020), “Dealing with digital security risk during the Coronavirus (COVID-19) crisis”, OECD Policy Responses to Coronavirus (COVID-19), http://www.oecd.org/coronavirus/policy-responses/dealing-with-digital-security-risk-during-the-coronavirus-covid-19-crisis-c9d3fe8e/ (accessed on 18 July 2020).

[34] OECD (2020), Enabling SMEs to benefit from digitalisation: In progress report, Internal document, CFE/SME(2020)3.

[74] OECD (2020), “Encouraging digital security innovation”, OECD Working Party on Security in the Digital Economy, DSTI/CDEP/SDE(2020)7/REV1.

[1] OECD (2020), OECD Digital Economy Outlook 2020, OECD Publishing, Paris, https://doi.org/10.1787/bb167041-en.

[36] OECD (2020), OECD Digital for SMEs Global Initiative, https://www.oecd.org/going-digital/sme/ (accessed on 18 July 2020).

[21] OECD (2020), OECD ICT Access and Usage by Businesses Database, https://stats.oecd.org/Index.aspx?DataSetCode=ICT_BUS (accessed on 19 September 2020).

[50] OECD (2020), “Seven lessons learned about digital security during the COVID-19 crisis”, OECD Policy Responses to Coronavirus (COVID-19), https://www.oecd.org/coronavirus/policy-responses/seven-lessons-learned-about-digital-security-during-the-covid-19-crisis-e55a6b9a/ (accessed on 10 December 2020).

[28] OECD (2019), Artificial Intelligence in Society, OECD Publishing, Paris, https://doi.org/10.1787/eedfee77-en.

[12] OECD (2019), “Measuring digital security risk management practices in businesses”, OECD Digital Economy Papers, No. 283, OECD Publishing, Paris, https://dx.doi.org/10.1787/7b93c1f1-en.

[23] OECD (2019), OECD SME and Entrepreneurship Outlook 2019, OECD Publishing, Paris, https://dx.doi.org/10.1787/34907e9c-en.

[27] OECD (2019), “Roles and responsibilities of actors for digital security”, OECD Digital Economy Papers, No. 286, OECD Publishing, Paris, https://dx.doi.org/10.1787/3206c421-en.

[53] OECD (2018), “Supporting an Effective Cyber Insurance Market: OECD report for the G7 Presidency”, http://www.oecd.org/daf/fin/insurance/Supporting-an-effective-cyber-insurance-market.pdf (accessed on 9 September 2020).

[55] OECD (2018), The Cyber Insurance Market: Responding to risk with few boundaries, http://www.oecd.org/finance/insurance/The-cyber-insurance-market-responding-to-a-risk-with-few-boundaries.pdf.

[54] OECD (2018), Unleashing the Potential of the Cyber Insurance Market: Conference outcomes, http://www.oecd.org/daf/fin/insurance/Unleashing-Potential-Cyber-Insurance-Market-Summary.pdf.

[30] OECD (2017), OECD Digital Economy Outlook 2017, OECD Publishing, Paris, https://dx.doi.org/10.1787/9789264276284-en.

[29] OECD (2017), The Next Production Revolution: Implications for Governments and Business, OECD Publishing, Paris, https://dx.doi.org/10.1787/9789264271036-en.

[58] OECD (2015), Digital Security Risk Management for Economic and Social Prosperity: OECD Recommendation and Companion Document, OECD Publishing, Paris, https://dx.doi.org/10.1787/9789264245471-en.

[73] OECD (2010), SMEs, Entrepreneurship and Innovation, OECD Studies on SMEs and Entrepreneurship, OECD Publishing, Paris, https://dx.doi.org/10.1787/9789264080355-en.

[35] OECD (2021 forthcoming), OECD SME and Entrepreneurship Outlook 2021, OECD Publishing, Paris.

[16] OECD (2021, forthcoming), Understanding the Digital Security of Products: An in-depth analysis, OECD Publishing, Paris.

[42] Ojala, S. and P. Pyöriä (2017), “Mobile knowledge workers and traditional mobile workers”, Acta Sociologica, Vol. 61/4, pp. 402-418, http://dx.doi.org/10.1177/0001699317722593.

[67] OWASP (2020), “Security by design principles”, Open Web Application Security Project, https://www.owasp.org/index.php/Security_by_Design_Principles (accessed on 11 December 2020).

[39] Pew Research Center (2020), “Telework may save US jobs in COVID-19 downturn – especially among college graduates”, http://www.pewresearch.org/fact-tank/2020/05/06/telework-may-save-u-s-jobs-in-covid-19-downturn-especially-among-college-graduates/ (accessed on 15 June 2020).

[7] RT World News (2017), Ransomware virus plagues 100k computers across 99 countries, RT, https://www.rt.com/news/388153-thousands-ransomeware-attacks-worldwide/ (accessed on 30 March 2020).

[17] Schneier, B. (2018), Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Norton & Company.

[47] Shi, F. (2020), “Threat spotlight: Coronavirus related phishing”, Barracuda Networks, https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing/ (accessed on 20 June 2020).

[86] Swedish Agency for Economic Growth and Regional Development (2020), The Digilift is renewing industry, https://tillvaxtverket.se/english/digitalization.html (accessed on 11 December 2020).

[2] Symantec (2019), “ISTR Internet Security Threat Report”, https://docs.broadcom.com/doc/istr-24-2019-en (accessed on 30 March 2020).

[70] United Kingdom Government (2019), “Cyber Essentials Scheme: overview”, https://www.gov.uk/government/publications/cyber-essentials-scheme-overview (accessed on 7 March 2020).

[20] US Bureau of Justice Statistics (2005), National Computer Security Survey, https://www.bjs.gov/index.cfm?ty=tp&tid=41.

[104] US DHS (2020), “About CISA”, US Department of homeland Security CISA Cyber + Infrastructure, https://www.us-cert.gov/about-us.

[11] Verizon (2020), “2020 Data Breach Investigation Report”, https://agio.com/newsroom/key-takeaways-from-verizons-2020-data-breach-investigation-report/ (accessed on 30 March 2020).

[3] Verizon (2019), “2019 Data Breaches Investigations Report”, http://veriscommunity.net/veris_webapp_min.html (accessed on 30 March 2020).

[41] Vilhelmson, B. and E. Thulin (2016), “Who and where are the flexible workers? Exploring the current diffusion of telework in Sweden”, New Technology, Work and Employment, Vol. 31/1, pp. 77-96, http://dx.doi.org/10.1111/ntwe.12060.

[10] Webroot (2019), 2019 Webroot Threat Report, Webroot, https://www-cdn.webroot.com/9315/5113/6179/2019_Webroot_Threat_Report_US_Online.pdf (accessed on 30 March 2020).

[63] Yavuzdogan Okumus, B. (2020), “Latest development on data localization requirements in Turkey”, International Association of Privacy Professionals, https://iapp.org/news/a/latest-development-on-data-localization-requirements-in-turkey/ (accessed on 11 December 2020).

[9] You, I. and K. Yim (2010), “Malware Obfuscation Techniques: A Brief Survey”, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, http://dx.doi.org/10.1109/BWCCA.2010.85.

Notes

← 1. Network security, user education and awareness, malware prevention, removable media controls, secure configuration, managing user privileges, incident management, monitoring, home and mobile working.

See: National Cyber Security Centre (2018[106]), “Executive Summary: the 10 Steps to Cyber Security”, available from: https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security/introduction-to-cyber-security/executive-summary

← 2. Department for Digital, Culture, Media and Sport (2019), Cyber Security Breaches Survey 2019: Statistical Release

← 3. This is a set of security procedures, protocols and policies that are in a written form.

← 4. Instead of being asked if they had a “formally defined ICT security policy”, respondents were asked if they had “document(s) on measures, practices or procedures on ICT security”.

← 5. Public Law 115-236, NIST Small Business Cybersecurity Act (August 18, 2018), available from: https://www.govinfo.gov/content/pkg/PLAW-115publ236/pdf/PLAW-115publ236.pdf.

← 6. California Senate Bill 327, available from: https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201720180SB327 (accessed 4 March 2020).

← 7. (1) develop an incident response plan; (2) automatically patch operating systems and applications; (3) enable security software; (4) securely configure devices; (5) use strong user authentication; (6) provide employee awareness training; (7) backup and encrypt data; (8) secure mobility; (9) establish basic perimeter defences; (10) secure cloud and outsourced IT services; (11) secure websites; (12) implement access control and authorisation; and (13) secure portable media.

Canadian Center for Cyber Security, “Baseline cyber security controls for small and medium organizations”, available from: https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations (accessed 4 March 2020).

← 8.  www.ssi.gouv.fr/particulier/formations/secnumedu-fc-labellisation-de-formations-continues-en-cybersecurite/www.ssi.gouv.fr/particulier/formations/secnumedu-fc-labellisation-de-formations-continues-en-cybersecurite/formations-continues-labellisees-secnumedu/cybersecurite-des-tpe-et-des-pme-chef-dentreprise-face-aux-risques-cyber-etes-vous-pret/.

← 9.  www.ssi.gouv.fr/actualite/petites-et-moyennes-entreprises-decouvrez-le-guide-des-bonnes-pratiques-de-linformatique-adapte-a-vos-besoins/.

← 10. www.cybermalveillance.gouv.fr/.

← 11. For an example of such activities, see: https://www.nisc.go.jp/eng/pdf/Intl_Campaign_poster.pdf.

← 12. https://www.kisa.or.kr/eng/main.jsp.

← 13. Identify and code positions with information technology, cybersecurity, and other cyber-related functions using the National Initiative for Cybersecurity Education (NICE) Framework.

Metadata, Legal and Rights

This document, as well as any data and map included herein, are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Extracts from publications may be subject to additional disclaimers, which are set out in the complete version of the publication, available at the link provided.

© OECD 2021

The use of this work, whether digital or print, is governed by the Terms and Conditions to be found at http://www.oecd.org/termsandconditions.