Information Security and Cybersecurity Management: A Case Study With Smes in Portugal
Information Security and Cybersecurity Management: A Case Study With Smes in Portugal
Information Security and Cybersecurity Management: A Case Study With Smes in Portugal
Cybersecurity
and Privacy
Article
Information Security and Cybersecurity Management: A Case
Study with SMEs in Portugal
Mário Antunes 1,2, * , Marisa Maximiano 1 , Ricardo Gomes 3 and Daniel Pinto 3
1 Computer Science and Communication Research Centre (CIIC), School of Technology and Management,
Polytechnic of Leiria, 2411-901 Leiria, Portugal; [email protected]
2 INESC TEC, CRACS, 4200-465 Porto, Portugal
3 School of Technology and Management, Polytechnic of Leiria, 2411-901 Leiria, Portugal;
[email protected] (R.G.); [email protected] (D.P.)
* Correspondence: [email protected]
Abstract: Information security plays a key role in enterprises management, as it deals with the
confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and
information. Small and Medium-sized enterprises (SME) are seen as a blind spot in information
security and cybersecurity management, which is mainly due to their size, regional and familiar scope,
and financial resources. This paper presents an information security and cybersecurity management
project, in which a methodology based on the well-known ISO-27001:2013 standard was designed
and implemented in fifty SMEs that were located in the center region of Portugal. The project was
conducted by a business association located at the center of Portugal and mainly participated by
SMEs. The Polytechnic of Leiria and an IT auditing/consulting team were the other two entities that
participated on the project. The characterisation of the participating enterprises, the ISO-27001:2013
based methodology developed and implemented in SMEs, as well as the results obtained in this
Citation: Antunes, M.; Maximiano, M.; case study, are depicted and analysed in the paper. The attained results show a clear benefit to the
Gomes, R.; Pinto, D. Information audited and intervened SMEs, being mainly attested by the increasing of their information security
Security and Cybersecurity management robustness and collaborators’ cyberawareness.
Management: A Case Study with
SMEs in Portugal. J. Cybersecur. Priv. Keywords: information security; cybersecurity; small and medium-sized enterprises; ISO-27001:2013;
2021, 1, 219–238. https://doi.org/ auditing
10.3390/jcp1020012
1. Introduction
Received: 16 February 2021
Accepted: 6 April 2021
Enterprises have increased their level of consciousness regarding cybersecurity and
Published: 8 April 2021
information security management, as it has been assumed that these are relevant issues
regarding competitiveness and survival in global markets [1,2]. The importance that
Publisher’s Note: MDPI stays neutral
has been gained by information security and cybersecurity management in enterprises
with regard to jurisdictional claims in worldwide has been enormous. On one hand, management boards are becoming aware
published maps and institutional affil- about the need to protect data and information [3] and, on the other hand, cyberattacks
iations. are booming, as documented by worldwide cybersecurity institutions [4], and the level
of consciousness about the need to implement countermeasures have comprehensively
increased [3]. The COVID-19 pandemic has also had a detrimental impact in cybersecurity
world wide, as more collaborators are working from home, which led to accelerate digital
Copyright: © 2021 by the authors.
transformation in enterprises [5,6].
Licensee MDPI, Basel, Switzerland.
Small and Medium-sized Enterprises (SMEs) play a key-role in economy, as they
This article is an open access article represent a large band of the wealth produced worldwide [7,8]. However, their intrinsic
distributed under the terms and characteristics, namely their small dimension, the fact that they are grounded on traditional
conditions of the Creative Commons and familiar structures, and their financial resources typology [9], put them in a second
Attribution (CC BY) license (https:// plan in what information security and cybersecurity awareness concerns. The difficulties in
creativecommons.org/licenses/by/ accessing funded projects for cybersecurity, the collaborators’ level of cyberawareness, and
4.0/).
the eventual lack of resident Information Technology (IT) staff are also important issues
regarding the implementation of best practices in cybersecurity [10–12].
This paper presents the results that were obtained with the implementation of an
information security and cybersecurity management project, funded by IAPMEI though an
European funding for regional development, and promoted by NERLEI (https://www.
nerlei.pt/en/home, accessed on 7 April 2021), a business association located in Leiria that
has about two thousands affiliated SMEs and micro enterprises. The project, named “Log In
Innovation” (https://www.logininnovation.pt/projeto, accessed on 7 April 2021), aims to
implement a digital transformation process in SMEs that may boost their competitiveness
in global markets. Besides information security and cybersecurity, the project has four
additional core axes: lean manufacturing, balanced scoreboard, digital marketing, and
quality management. The total amount of the project is around 1,304,000.00 € and it plans
to cover a total of 80 eligible SMEs operating in the following Portuguese regions: North,
Center, and Alentejo. Regarding information security and cybersecurity, fifty SMEs, mainly
from the center of Portugal, and operating in several activity areas, benefitting from the
interventions realised.
The project was implemented in the period between 2018–2020 and it embodied the
following entities: NERLEI, Polytechnic of Leiria (https://www.ipleiria.pt/home/, ac-
cessed on 7 April 2021), a consulting company, and the SMEs. Regarding information
security, the overall results achieved by the project are two-fold. Firstly, to give the the
companies the opportunity to increase their level of cyberawareness and competitiveness,
and to help mitigate some of their organisational, IT, and human resources flaws, by apply-
ing the funding available for cybersecurity management. Secondly, at a regional level and
involving solely local partners and SMEs, to strength the cooperation between a business
association, academia, and a consulting team working together, to foster cybersecurity in
SMEs and mitigate their information security flaws.
The paper is organised, as follows. Section 2 summarises the fundamentals of infor-
mation security and cybersecurity, the standard ISO-27001:2013 and the most relevant case
studies on information security in SMEs. Section 3 describes the project and the method-
ology developed to apply ISO-27001:2013 in SMEs. Section 4 depicts the results obtained
in the project, that are analysed and discussed in Section 5. Finally, Section 6 presents the
relevant conclusions to the project and delineates some directions for future work.
2. Literature Review
This Section concisely describes the literature review that is relevant to the overall
paper understanding. Section 2.1 focus on the fundamentals of the information security
and cybersecurity management. Section 2.2 summarises the ISO-27001:2013 framework,
namely its relevance, scope, and general organisation. Section 2.3 summarises a list of
similar case studies, being related to the implementation of information security projects
in SMEs.
concern, requiring that a set of procedures and rules inside the organisation must be applied
to define who and whom has access to the data and information. Integrity and availability
focus on the data trustworthiness and accuracy accessed by authorised people. Hence,
information security standards and frameworks are grounded on the implementation of
policies and controls, to manage security and risks at an organisational level.
The best practices inside an organisation are vital and they represent the front line
inside information security. The definition of cybersecurity policies should be the first
challenge to protect organisational data and define procedures to be followed. The aim is
to define a level of protection to assure that organisational data and networks are safe and
secure. SMEs may not be able to afford implementing complex and costly effective security
procedures, which may make them more vulnerable to cyberattacks and with less controls
inside the organisation, as pointed out by several authors [19–22]. Promoting educational
activities inside an organisation should be the first step in contributing to collaborators’
cybersecurity awareness and helping to protect organisational data and operation [23].
partners. A different case study in UK from Rae et al. [37] addresses the increasing amount
of cyberattacks and threats for SMEs and identifies the influencing factors that are needed
to improve security behaviours and engagements with information security best practices.
The authors propose a cybersecurity rating scheme for SMEs in the UK, with the potential
to scale internationally.
Overall, the increasing of cyberattacks towards SMEs brings to light specific informa-
tion security and cybersecurity standards and guidelines that are grounded on well-known
best practices that are being developed. In Belgium [38] a survey was implemented to
compare different initiatives, aiming to enable a long-term convergence with a European
scheme. Their outcomes allowed for reporting some findings regarding how to set up the
overall organisational structures, basic management processes, and some supporting tools
for SMEs. In [11,39,40], Ozkan et al. describe several information security and maturity
models that can be applied to SMEs characteristics, in which ISO-27001:2013 is one of the
available frameworks.
The key factors that influence SMEs cybersecurity practices in the technological inno-
vation era were studied on three SMEs of industrial services in Thailand [41]. A qualitative
approach was used to collect data to access insights and a decision-support framework
was deployed.
Mubarak et al. [42] described a systematic literature review on information security in
SMEs, highlighting that one of the proven ways to manage information security is through
applying available international standards, frameworks, and best practices. Due to the
difficulty of developing and applying a model to address SMEs needs, a systematic review
was presented as one of the analytic phases of a project in which different models were
analysed. It was shown that most of the models are theoretically conceived, and there is a
need to find a suitable model that could be better applicable to SMEs.
An easy-to-use cybersecurity canvas was modelled and proposed by Teufel et al. [43]
to allow SMEs pragmatic access to protect their valuable data against cyberattacks. The
framework is made of building blocks that can be put individually according to the SMEs
requirements and needs. It has been put through an application test with a European SME,
which was well received by the participants. Finally, in [44], the author suggests that there
are additional issues for SMEs being more often cyberattacked than larger enterprises. The
authors propose a theoretical framework for cybersecurity that comprises organisational,
technological, and psychological issues, with the insights being analysed based on the data
collected from interviews with IT professionals.
Information security frameworks and standards are crucial in improving cybersecurity
and minimizing the risk in enterprises. Small Business Standards (SBS) defined a guide
to implement ISO-27001:2013 in the context of SMEs information security [45,46]. In
the project described in this paper, a ISO-27001:2013 based methodology was defined
and implemented in the participating SMEs, following the trends and recommendations
that were observed on the adoption of information security frameworks. The number
of SMEs involved in the project and the positive impact on their information security
and cybersecurity awareness give a higher confidence level regarding the outcomes of
the project.
4. Results
This Section is fully dedicated to the results presentation. It starts with the char-
acterisation of the participating SMEs in Section 4.1, according to the dimensions that
were observed in the project: type of SME, main activity, number of employees, type of
intervention, activity sector, age, business revenue, and export activity. Subsequently, the
results obtained in Type 1 interventions are depicted in Section 4.2, with the overall results
being grouped in the dimensions observed in Section 4.1. Finally, in Section 4.3, the results
achieved with Type 2 interventions are illustrated in the dimensions previously described.
4.1. Characterization
The project targeted globally 50 SMEs and micro enterprises, affiliated with NERLEI
business association and mostly operating in the center of Portugal. From those 50 SMEs,
30 received a Type 1 auditing and the remaining 20 were intervened with a Type 2 audit-
ing, as depicted in Figure 1A. Regarding the characterisation by the types of enterprise,
Figure 1B illustrates the distribution by size, namely between small, medium, and micro
enterprises, while Figure 1C depicts the distribution of participating SMEs by geographic
region in Portugal.
Figure 2 depicts the characterisation of the companies by the following dimensions:
main activity sector (A), activity sub-sector (B), age of the enterprise (C), number of em-
ployees (D), business revenue (E), and export activity (F).
Figure 1. Characterization of the SMEs participating in the case study—(A) Type of auditing (Type 1 and Type 2); (B) type
of company: small, medium, and micro enterprise; and, (C) companies per district.
J. Cybersecur. Priv. 2021, 1 227
Figure 2. Characterization of the SMEs participating in the case study—(A) Main activity sector;
(B) sub-sectors of activity; (C) age of the enterprise; (D) number of employees; (E) business revenue
(scale); and, (F) exports as % of business revenue (scale).
• 70% of the intervened enterprises have more than 20 employees, with 36% having
more than 60 employees.
• The business revenue is equally distributed by the four defined scales, namely
<=2 M, >2 M and <=5.5 M, >5.5 M and <=10 M, 10 M.
• For almost 50% of the intervened enterprises, the investment in exports only represents
2.5% of the business revenue, which reveals their low level of internationalization.
The remaining enterprises are distributed by the other three predefined scales: >2.5%
and <=25%, >25% and <=60%, >60%.
By observing Figures 1 and 2, it is worth noting that this project targeted a significant
range of the businesses in the region. From enterprise age to business revenue, there is a
representative spread of enterprises, even when considering the number of dimensions
in analysis. This may infer that the findings of this research work may be applicable to a
wider scope.
Table 2. Type 1—Acceptance percentage intervals of the controls in the predefined dimensions.
By analysing Figure 4, controls that rely on processes and documentation are signif-
icantly easier to comply with, while comparing with those that are more technical and
that have an intrinsic need to install additional equipment and implement more refined
technical procedures. ISO-27001:2013 standard Sections 9.4, 14.1, and 14.2 (Table 1) have
the most compliance level, which is interpreted as the process based controls are the most
easily achieved for small companies, because no prior knowledge is required to implement
mitigating actions. On the opposite direction, Sections 10.1 and 12.1 achieved the worst
J. Cybersecur. Priv. 2021, 1 230
compliance results, however by two distinct reasons. Regarding Section 10.1, the reasons
are related to the technical complexity in implementing and validating cryptographic
controls. In Section 12.1, it is emphasised the difficulty in specifying and validating strict
operational and responsibility procedures, in the scope of SMEs.
Figure 5. Type 2— Number of Controls by Acceptance Percentage Intervals on the first auditing (A); and on second auditing (B).
By analysing Figure 5, we may observe the overall evolution from the first to the
second auditing process, namely by observing the increasing on the number of controls in
the levels [51% to 75%], and [76% to 100%], and the corresponding decreasing on the level
[0% to 50%]. This behaviour is directly influenced by the interventions made after the first
auditing and the appropriate diagnosis of the aspects that should be fixed to accomplish a
higher conformity level with the ISO-27001:2013 standard.
J. Cybersecur. Priv. 2021, 1 231
Tables 3 and 4 summarise the global conformity results of the 114 controls that are
audited in Type 2 intervention. The results are grouped by the dimensions itemized in the
SMEs characterisation (Section 4.1), which were analysed and classified according to the
three predefined conformity levels. In a broad sense, from the presented results, we may
observe an increase in the percentage of controls classified in each conformity level, from
the first to the second auditing.
Table 3. Type 2—First Audit—Acceptance percentage intervals of the controls in the predefined dimensions.
Table 4. Type 2—Second Audit—Acceptance percentage intervals of the controls in the predefined dimensions.
Figures 6 and 7 depict the evolution of conformity for each of the ISO-27001:2013
standard categories and their included controls. The conformity index is classified in three
levels, namely [0–50%], [51–75%], and [76–100%]. By analysing the figures, one may note
that the green spot widens in all the categories, which is the result of the flaws that were
observed in the first auditing and the mitigation measures implemented and re-evaluated
in the second auditing. This fact is explanatory of the evolution observed, from the first to
the second auditing. The yellow spot, which corresponds to a positive level of conformity
J. Cybersecur. Priv. 2021, 1 233
(above 50%), has also increased from the first to the second auditing. At the same time, the
red spot is reduced in the second auditing, reflecting the decrease of the number of controls
with a low acceptance score.
Figure 6. Type 2—Cumulative Acceptance Percentage of ISO-27001:2013 standard sections, by intervals—First Auditing.
Figure 7. Type 2—Cumulative Acceptance Percentage of ISO-27001:2013 standard sections, by intervals—Second Auditing.
5. Results Analysis
The results analysis is split into three main dimensions: global results, Type 1 auditing
results, and Type 2 auditing results.
Regarding global results, the implementation of the project brought visible benefits to
the intervened SMEs, mainly to their perception of cybersecurity. The benefits are visible
when comparing Figures 6 and 7.
J. Cybersecur. Priv. 2021, 1 234
6. Conclusions
This paper presented the results that were obtained with the implementation of an
information security and cybersecurity management project in SMEs. A comprehensive
literature review was made and the deployed ISO-27001:2013 based methodology was
described. The characterisation of the participating SMEs according to several dimensions
was also made, as well as an analysis of the results that were obtained in this case study.
The attained results have shown substantial benefits to the audited and intervened
SMEs, being directly and indirectly related with their information security management
robustness and collaborators’ cyberawareness. The conclusions to the project implementa-
tion and results obtained are grouped into three distinct dimensions: project development
and management, impact in the participating SMEs, and global results observed.
Regarding the project development, the aims were well defined a priori and they were
grounded on embodying the SMEs with better tools to manage information security and
cybersecurity. Regarding the collaborators’ cyberawareness, a set of seminars and talks
along the project were proposed. The adopted methodology for ISO-27001:2013 framework
is in line with those that were described in the literature. The scope of application is in the
SMEs and micro enterprises, and the aim is to generally improve the information security
and cybersecurity. There are other frameworks that could be applied to information
security auditing in SMEs (e.g., NIST Cyber Security Framework), but the ISO-27001:2013
framework has been identified in the literature as a best practice in which information
security in SMEs is concerned [31,46].
Regarding the impact on the intervened SMEs, the observed improvements must be
emphasised, especially on those enterprises that adhered to Type 2 auditing. Nevertheless,
without having a second auditing, SMEs that intervened with Type 1 auditing had the
opportunity to evaluate 30 controls and, for those, to apply the corresponding mitigation
tasks. Despite that this type did not have a re-evaluation process, as the countermeasures
were applied during the intervention, a way to enhance the overall methodology is to
include this additional step.
The global results seem to be clear regarding the positive impact that the project had
in the participating SMEs. It was not expected to have a full success rate in all the controls
and SMEs intervened. The SMEs were not at the same organisational, human resources,
and IT level, and the cyberawareness level was not also the same in all of the intervened
SMEs. These two reasons implied a variation in the results that were achieved by the SMEs
in some categories of the ISO-27001:2013 standard.
The consulting team was also challenged to apply the ISO-27001:2013 standard to
SMEs, besides their experience in larger and more organised institutions. Having in mind
the definition of a unique and harmonised guideline for the whole auditing interventions,
one may infer that the work done by the consulting teams embodies the spirit of the original
ISO-27001:2013 standard. Broadly speaking, the adoption of information security auditing
processes and their continuous improvement, as well as the training and certification of
SMEs collaborators, are essential in mitigating the risks in cybersecurity and producing a
positive impact in the overall SMEs activity.
Information security and cybersecurity management are wide topics, in which distinct
paths could be followed to implement robust and integrated solutions. The adoption of ISO-
27001:2013 framework have in mind the literature review concerning the best practices and
information security frameworks that should be applied in SME. However, ISO-27001:2013
is a single tool for achieving the project goal and it can be seen as a limitation in this study.
In that sense, other best practices and frameworks should be addressed, implemented, and
compared, in order to identify the fully appropriateness of ISO-27001:2013 to all of the
intervened SME.
Author Contributions: Data curation, M.A., D.P., M.M., R.G.; Formal analysis, M.A., M.M., R.G.;
Funding acquisition, M.A.; Methodology, M.A., M.M., R.G.; Software, D.P.; Supervision, M.A.;
Visualization, R.G.; Writing—original draft: M.A., M.M., R.G., D.P. All authors have read and agreed
to the published version of the manuscript.
J. Cybersecur. Priv. 2021, 1 236
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Ikeda, K.; Marshall, A.; Zaharchuk, D. Agility, skills and cybersecurity: Critical drivers of competitiveness in times of economic
uncertainty. In Strategy & Leadership; Emerald Publishing: Bingley, UK, 2019.
2. Huang, K.; Madnick, S.; Johnson, S. Framework for Understanding Cybersecurity Impacts on International Trade. 2019. Available
online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3555341 (accessed on 7 March 2021).
3. Al-Sartawi, A.M.M. Information technology governance and cybersecurity at the board level. Int. J. Crit. Infrastruct. 2020,
16, 150–161. [CrossRef]
4. ENISA Threat Landscape. 2020. Available online: https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-
trends/ (accessed on 7 March 2021).
5. Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of covid-19:
A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [CrossRef]
6. Ahmad, T. Corona Virus (Covid-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity. 2020.
Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3568830 (accessed on 7 March 2021).
7. Nistotskaya, M.; Charron, N.; Lapuente, V. The wealth of regions: Quality of government and SMEs in 172 European regions.
Environ. Plan. Gov. Policy 2015, 33, 1125–1155. [CrossRef]
8. Small Business Standards. Available online: https://www.sbs-sme.eu/sme-involvement/standards-and-smes (accessed on 7
March 2021).
9. Kertysova, K.; Frinking, E.; van den Dool, K.; Maričić, A.; Bhattacharyya, K. Cybersecurity: Ensuring Awareness and Re-
silience of the Private Sector Across Europe in Face of Mounting Cyber Risks-Study; Technical Report; European Economic
and Social Committee, The Hague Centre for Strategic Studies: Hague, The Netherlands, 2018. Available online:
https://www.eesc.europa.eu/en/our-work/publications-other-work/publications/cybersecurity-ensuring-awareness-
and-resilience-private-sector-across-europe-face-mounting-cyber-risks-study#downloads (accessed on 7 March 2021).
10. Boletsis, C.; Halvorsrud, R.; Pickering, J.B.; Phillips, S.; Surridge, M. Cybersecurity for SMEs: Introducing the Human Element
into Socio-technical Cybersecurity Risk Assessment. In Proceedings of the 16th International Joint Conference on Computer
Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2021), Vienna, Austria, 8–10 February 2021.
11. Ozkan, B.Y.; Spruit, M. Cybersecurity Standardisation for SMEs: The Stakeholders’ Perspectives and a Research Agenda. In
Research Anthology on Artificial Intelligence Applications in Security; IGI Global: Hershey, PA, USA, 2021; pp. 1252–1278.
12. Whitehead, G. Investigation of Factors Influencing Cybersecurity Decision Making in Irish SME’s from a Senior Manager/Owner
Perspective. Ph.D. Thesis, National College of Ireland, Dublin, Ireland, 2020.
13. Saleem, J.; Adebisi, B.; Ande, R.; Hammoudeh, M. A state of the art survey-Impact of cyber attacks on SME’s. In Proceedings of
the International Conference on Future Networks and Distributed Systems, Cambridge, UK, 19–20 July 2017.
J. Cybersecur. Priv. 2021, 1 237
14. Carías, J.F.; Borges, M.R.; Labaka, L.; Arrizabalaga, S.; Hernantes, J. Systematic Approach to Cyber Resilience Operationalization
in SMEs. IEEE Access 2020, 8, 174200–174221. [CrossRef]
15. Stoneburner, G.; Goguen, A.; Feringa, A. Risk management guide for information technology systems. Nist Spec. Publ. 2002,
800, 800–830.
16. Bell, S. Cybersecurity is not just a ‘big business’ issue. Gov. Dir. 2017, 69, 536–539.
17. ISO-ISO/IEC 27000:2009—Information Technology—Security Techniques—Information Security Management Systems—
Overview and vocabulary. Available online: https://www.iso.org/standard/41933.html (accessed on 2 February 2021).
18. Stallings, W. Cryptography and Network Security, 4th ed.; Pearson Education India: Delhi, India, 2006.
19. Mohammed, A.M.; Idris, B.; Saridakis, G.; Benson, V. Information and communication technologies: A curse or blessing for
SMEs? In Emerging Cyber Threats and Cognitive Vulnerabilities; Elsevier Press: Amsterdam, The Netherlands, 2020; pp. 163–174.
20. Kabanda, S.; Tanner, M.; Kent, C. Exploring SME cybersecurity practices in developing countries. J. Organ. Comput. Electron.
Commer. 2018, 28, 269–282. [CrossRef]
21. Naradda Gamage, S.K.; Ekanayake, E.; Abeyrathne, G.; Prasanna, R.; Jayasundara, J.; Rajapakshe, P. A Review of Global
Challenges and Survival Strategies of Small and Medium Enterprises (SMEs). Economies 2020, 8, 79. [CrossRef]
22. Alahmari, A.; Duncan, B. Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of
Recent Evidence. In Proceedings of the 2020 International Conference on Cyber Situational Awareness, Data Analytics and
Assessment (CyberSA), Dublin, Ireland, 15–19 June 2020; pp. 1–5.
23. Hadlington, L. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards
cybersecurity, and risky cybersecurity behaviours. Heliyon 2017, 3, e00346. [CrossRef] [PubMed]
24. ISO-ISO/IEC 27001:2013—Information Technology—Security Techniques—Information Security Management Systems—
Requirements. Available online: https://www.iso.org/standard/54534.html (accessed on 2 February 2021).
25. Information Security Management System|ISMS.online. Available online: https://www.isms.online/information-security-
management-system-isms/ (accessed on 2 February 2021).
26. ISO-ISO/IEC 27005:2018—Information Technology—Security Techniques—Information Security Risk Management. Available
online: https://www.iso.org/standard/75281.html (accessed on 2 February 2021).
27. ISO-ISO/IEC 27037:2012—Information Technology— Security Techniques—Guidelines for Identification, Collection, Acquisition
and Preservation of Digital Evidence. Available online: https://www.iso.org/standard/44381.html (accessed on 7 March 2021).
28. Javaid, M.I.; Iqbal, M.M.W. A comprehensive people, process and technology (PPT) application model for Information Systems
(IS) risk management in small/medium enterprises (SME). In Proceedings of the International Conference on Communication
Technologies (ComTech), Rawalpindi, Pakistan, 19–21 April 2017; pp. 78–90.
29. Muthaiyah, S.; Zaw, T.O.K. ISO/IEC 27001 Implementation in SMEs: Investigation on Management of Information Assets. Indian
J. Public Health Res. Dev. 2018, 9, 2631–2637. [CrossRef]
30. Wanyonyi, V. Information Security Management Toolkit for ISO/IEC 27001 Standard, Case of Small-to-Medium Sized Enterprises
(SMEs). Ph.D. Thesis, University of Nairobi, Nairobi, Kenya, 2020.
31. Renvall, A. Improving Cybersecurity through ISO/IEC 27001 Information Security Standard in the Context of SMEs. 2018.
Available online: https://www.theseus.fi/handle/10024/157277 (accessed on 7 March 2021).
32. Ozkan, B.Y.; Spruit, M. Assessing and Improving Cybersecurity Maturity for SMEs: Standardization aspects. arXiv 2020,
arXiv:2007.01751.
33. Ponsard, C.; Grandclaudon, J.; Dallons, G. Towards a Cyber Security Label for SMEs: A European Perspective-. In Proceedings of
the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Madeira, Portugal, 2–24 January
2018; pp. 426–431.
34. Ponsard, C.; Massonet, P.; Grandclaudon, J.; Point, N. From Lightweight Cybersecurity Assessment to SME Certification Scheme
in Belgium. In Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa,
Italy, 7–11 September 2020; pp. 75–78.
35. Henson, R.; Sutcliffe, D. An insurance-based approach to improving SME Cyber Security. In Special Topics in Economics &
Management: An Introduction; ATINER: Athens, Greece, 2017.
36. Hassinen, T. Enhancing Cyber Security for SME Organizations through Self-Assessments: How Self-Assessment Raises Awareness.
2017. Available online: https://www.theseus.fi/handle/10024/125437 (accessed on 7 March 2021).
37. Rae, A.; Patel, A. Defining a new composite cybersecurity rating scheme for smes in the uk. In Proceedings of the International
Conference on Information Security Practice and Experience, Kuala Lumpur, Malaysia, 26–28 November 2019; Springer: Cham,
Switzerland, 2019; pp. 362–380.
38. Ponsard, C.; Grandclaudon, J. Survey and guidelines for the design and deployment of a cyber security label for SMEs. In
Proceedings of the International Conference on Information Systems Security and Privacy, Madeira, Portugal, 22–24 January 2018;
Springer: Cham, Switzerland, 2018; pp. 240–260.
39. Ozkan, B.Y.; Spruit, M.; Wondolleck, R.; Coll, V.B. Modelling adaptive information security for SMEs in a cluster. J. Intellect. Cap.
2019 21, 235–256.
40. Ozkan, B.Y.; van Lingen, S.; Spruit, M. The Cybersecurity Focus Area Maturity (CYSFAM) Model. J. Cybersecur. Priv. 2021,
1, 119–139. [CrossRef]
J. Cybersecur. Priv. 2021, 1 238
41. Auyporn, W.; Piromsopa, K.; Chaiyawat, T. Critical Factors in Cybersecurity for SMEs in Technological Innovation Era. In
Proceedings of the ISPIM Conference Proceedings, The International Society for Professional Innovation Management (ISPIM),
Bangkok, Thailand, 1–4 March 2020; pp. 1–10.
42. Mubarak, S.; Heyasat, H.; Wibowo, S. Information Security Models are a Solution or Puzzle for SMEs? A Systematic Literature
Review. In Proceedings of the Australasian Conference on Information Systems, Perth, Australia, 9–11 December 2019;
pp. 148–154.
43. Teufel, S.; Teufel, B.; Aldabbas, M.; Nguyen, M. Cyber Security Canvas for SMEs. In Proceedings of the International Information
Security Conference, Pretoria, South Africa, 25–26 August 2020; Springer: Cham, Switzerland, 2020; pp. 20–33.
44. Zec, M. Cyber Security Measures in SME’s: A Study of IT Professionals’ Organizational Cyber Security Awareness; Linnaeus University:
Kalmar, Zugriff unter, Sweden, 2015; Volume 849211. Available online: https://www.diva-portal.org/smash/get/diva2:
849211/ATTACHMENT01.pdf (accessed on 7 March 2021).
45. Ozkan, B.Y.; Spruit, M. Cybersecurity Standardisation for SMEs: The Stakeholders’ Perspectives and a research agenda. Int. J.
Stand. Res. 2019, 17, 41–72. Available online: https://www.igi-global.com/gateway/article/full-text-pdf/253856&riu=true
(accessed on 7 March 2021). [CrossRef]
46. Organizations in Cooperation with ISO—SBS—Small Business Standards. Available online: https://www.iso.org/organization/
5100110.html (accessed on 7 March 2021).