Preparing Your Employees & Business Systems For A Cyber Attack

Right now, a cyber attacks happens every 39 seconds and massive amounts of private business and customer data is stolen, however, securing your business against cyberattacks is less daunting than it may seem. With brief regular training and a few process implementations, you can keep your company from being a hacking statistic. 
 
Cybersecurity threats are  omnipresent in today’s hyper-connected, digital world and they will only continue to increase in sophistication, frequency, diversity, scale and scope this year and in the near future. Internet-based technologies aimed at creating efficiencies and increasing connectivity between people and places also help proliferate cyber threats and risks.
 
This new reality requires businesses and people alike to understand the evolving cyber threat environment in order to keep pace. With 2020 just beginning, an understanding of what future cyber threats could entail will help us better protect our systems, information, assets, and even reputation. While predicting the future is an imperfect task, an assessment of current threats, risks, and trends can help determine what we are likely to see moving forward. 
 
The recent high profile cyber-attacks on organisations like Travelex have raised awareness of how big cyber-crime is right now and it’s essential that you regularly assess and monitor your business risk against a cyber-attack. Yet despite significant cyber security exposures, around 85% of small business owners still believe their business is safe from hackers, viruses, malware or a data breach according to Symantec. Furthermore, only 25% of small business owners have had an outside party test their IT/computer systems to ensure they are secure from attacks and nearly 40% do not have their data backed up in more than one location.
 
As these attacks become more frequent, it is now more important than ever to protect yourself and your business. Unfortunately, there is no "quick fix" when looking to protect your business from a potential cyber-attack but there are some things you can do to help you prepare:
 
First: ensure your organisation has annual cyber audits that take place at different times of the year. 
Please contact Cyber Security Intelligence for sensible recommendations. 
 
Second: review your patching policy, ensure all updates are being applied as soon as they become available; do you ensure patches are applied as quickly as is practicable?
 
Third: train your employees to be aware of and identify potential phishing emails; do employees know what to look out for or who to report concerns too? Contact Cyber Security Intelligence for independent and economic Cyber Training recommendations dependent on your size and experience.
 
Fourth: test and review your back-up and recovery systems and processes; how quickly can you bring your organisation back online?
 
Fifth: review and test your incident response plan; does it work effectively, do the key stakeholders know what to do in the event of an incident?
 
The most common cyberattack on business and individuals alike are phishing scams. These are emails that are sent to people with the intention of creating a sense of fear or worry so they recipient will reply or click on an included link or attachment, which opens a door into your computer system and can lead to viruses. To create urgency, the email will often appear to be from a boss or a bank and demand a response. 
 
It is important that all employees are aware of the what phishing emails look like: 
  • An email address that looks familiar but is off by a letter or uses symbols instead of letters.
  • A request to click a link or open an attachment that you were not expecting.
  • Misspelled words (this is how they get past the spam filter).
  • Messages starting with something like “valued member” instead of saying your name.
It is also essential to keep in mind that while most cyber threats are external, dangers can also come from within your organisation. When you bring on new employees, complete a thorough background check for previous crimes, with an emphasis on theft, then hire accordingly. Employees should always lock their computers when they walk away and use complex passwords that include uppercase letters, numbers, and special characters.
 
If you’re concerned about the potential impact of a cyberattack on your business and would like to know what you can do to prepare, an onsite Cyber Security Audit is a useful process to analyse current security systems and controls. 
 
Please contact Cyber Security Intelligence for more information.
 
The Hill:          Kieghley News:       Host Review:
 
You Might Also Read:
 
The Scope Of A Cyber Security Audit:
 
 
 
« Wawa Breach - Data On 30m Card Users For Sale
Iowa Election App Vulnerable To Hackers »

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to design a least privilege architecture in AWS

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 - Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Ascentor

Ascentor

Ascentor helps organisations stay safe through information risk management. Our customers rely on our pragmatic and business focused approach to cyber security and information assurance challenges.

Proservices Corp (PSC)

Proservices Corp (PSC)

PSC is a leader in software security testing, software performance testing, and software quality asssurance.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

Wi-Jungle

Wi-Jungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.