Risk Reduction (Limitation)

20th December 2019 | Cybrary Risk Reduction (Limitation)


reducing risk

Risk Reduction (limitation) is the most common risk management strategy used by businesses. This strategy limits a company’s exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance or a combination of both. An example of risk reduction would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

What Does This Mean For My SMB?

SMBs are most certainly are at risk to everyday hackers. Hackers breach Small to Medium Sized businesses 15x more often than larger firms. Hackers know this and target you because of it. SMB’s generally lack resources to properly secure systems, fail to train employees on cybersecurity hygiene, and sometimes lack proper security tools.

For these reasons, CyberHoot recommends all SMB’s take these actions:

Train employees on how to spot and delete phishing emails. Here’s a free video to help with this: How to Protect Yourself from Phishing Attacks.

  • Train employees on how to use strong passphrases instead of passwords.
  • Test employees with Phishing tests. CyberHoot includes this in our services.
  • Implement basic cybersecurity technical best practices including:
  • Update/patch all devices and software whenever possible to ensure vulnerabilities are fixed.
  • Establish risk management at your SMB by having a risk assessment performed at least once on your business.

Taking these proactive measures can reduce your risk of a costly breach, downtime, brand damage, and a cyber insurance claim (or all four).

Related Terms: Risk AcceptanceRisk AvoidanceRisk TransferRisk Mitigation

To learn more about Risk Reduction, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more