Preparing Your Employees & Business Systems For A Cyber Attack

Right now, a cyber attacks happens every 39 seconds and massive amounts of private business and customer data is stolen, however, securing your business against cyberattacks is less daunting than it may seem. With brief regular training and a few process implementations, you can keep your company from being a hacking statistic. 
 
Cybersecurity threats are  omnipresent in today’s hyper-connected, digital world and they will only continue to increase in sophistication, frequency, diversity, scale and scope this year and in the near future. Internet-based technologies aimed at creating efficiencies and increasing connectivity between people and places also help proliferate cyber threats and risks.
 
This new reality requires businesses and people alike to understand the evolving cyber threat environment in order to keep pace. With 2020 just beginning, an understanding of what future cyber threats could entail will help us better protect our systems, information, assets, and even reputation. While predicting the future is an imperfect task, an assessment of current threats, risks, and trends can help determine what we are likely to see moving forward. 
 
The recent high profile cyber-attacks on organisations like Travelex have raised awareness of how big cyber-crime is right now and it’s essential that you regularly assess and monitor your business risk against a cyber-attack. Yet despite significant cyber security exposures, around 85% of small business owners still believe their business is safe from hackers, viruses, malware or a data breach according to Symantec. Furthermore, only 25% of small business owners have had an outside party test their IT/computer systems to ensure they are secure from attacks and nearly 40% do not have their data backed up in more than one location.
 
As these attacks become more frequent, it is now more important than ever to protect yourself and your business. Unfortunately, there is no "quick fix" when looking to protect your business from a potential cyber-attack but there are some things you can do to help you prepare:
 
First: ensure your organisation has annual cyber audits that take place at different times of the year. 
Please contact Cyber Security Intelligence for sensible recommendations. 
 
Second: review your patching policy, ensure all updates are being applied as soon as they become available; do you ensure patches are applied as quickly as is practicable?
 
Third: train your employees to be aware of and identify potential phishing emails; do employees know what to look out for or who to report concerns too? Contact Cyber Security Intelligence for independent and economic Cyber Training recommendations dependent on your size and experience.
 
Fourth: test and review your back-up and recovery systems and processes; how quickly can you bring your organisation back online?
 
Fifth: review and test your incident response plan; does it work effectively, do the key stakeholders know what to do in the event of an incident?
 
The most common cyberattack on business and individuals alike are phishing scams. These are emails that are sent to people with the intention of creating a sense of fear or worry so they recipient will reply or click on an included link or attachment, which opens a door into your computer system and can lead to viruses. To create urgency, the email will often appear to be from a boss or a bank and demand a response. 
 
It is important that all employees are aware of the what phishing emails look like: 
  • An email address that looks familiar but is off by a letter or uses symbols instead of letters.
  • A request to click a link or open an attachment that you were not expecting.
  • Misspelled words (this is how they get past the spam filter).
  • Messages starting with something like “valued member” instead of saying your name.
It is also essential to keep in mind that while most cyber threats are external, dangers can also come from within your organisation. When you bring on new employees, complete a thorough background check for previous crimes, with an emphasis on theft, then hire accordingly. Employees should always lock their computers when they walk away and use complex passwords that include uppercase letters, numbers, and special characters.
 
If you’re concerned about the potential impact of a cyberattack on your business and would like to know what you can do to prepare, an onsite Cyber Security Audit is a useful process to analyse current security systems and controls. 
 
Please contact Cyber Security Intelligence for more information.
 
The Hill:          Kieghley News:       Host Review:
 
You Might Also Read:
 
The Scope Of A Cyber Security Audit:
 
 
 
« Wawa Breach - Data On 30m Card Users For Sale
Iowa Election App Vulnerable To Hackers »

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

OCERT

OCERT

National Computer Emergency Response Team of Oman.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Novetta

Novetta

Novetta pioneers disruptive technologies in data analytics, full-spectrum cyber, media analytics, and multi-INT fusion.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

ISH Technologies

ISH Technologies

ISH provides Cybersecurity Services, IT Infrastructure Services, Cloud Computing Services, and a Tier III Data Center.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

I/O Digital Foundation

I/O Digital Foundation

I/O Coin is an open source blockchain scientific project being developed by a team of Freelance / volunteer blockchain and security experts. IOC has focus on security, global adoption and scalability.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.