Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

Unlike larger companies, small businesses often operate without dedicated IT professionals, and rarely regard themselves as attractive targets for cyber-attacks. But this very attitude, and the knock-on effect of being left undefended, is precisely what may make them tempting to hackers.

Duncan Sutcliffe, director of Sutcliffe Insurance Brokers in Worcester UK, didn’t know where to start when it came to protecting his firm. “Like many SMEs, we have no in-house IT expertise and were faced with a vast array of confusing and sometimes contradictory advice," he says, "We didn’t know where to start. We found cyber security so out of our comfort zone that it was tempting to just ignore the issue."

Mr Sutcliffe is not alone in trying to put off the issue. According to the Experian data breach preparedness study, 51pc of UK SMEs do not see cyber security as a priority.

But the consequences of an attack can be severe. An assault on a business's IT systems, infrastructure or devices could mean the difference between staying afloat or going under, especially if reputational damage results in losing trade, or it faces legal consequences.

With 38pc of UK SMEs having experienced an attack in the past year, ignoring the issue is no longer an option.

Guard Against Email Span

A major threat to SMEs are ransomware attacks, malicious software that locks a device, such as a computer, tablet or smartphone, and then demands a ransom to unlock it. “Guarding against spam and phishing emails is key to mitigating the risk of these attacks, and to achieve this, you need to use a blend of technical and educational solutions,” explains Vince Warrington, founder of information security company, Protective Intelligence.

Ransomware is reliant on an end user activating it, usually by opening an infected email attachment, so educating staff who can expect attachments on a daily basis, such as finance and HR teams, is vital. They should be encouraged to have a healthy skepticism by questioning who or where emails come from.

On the technological side of things, a disaster recovery plan should be in place, outlining what to do in the event of an attack. “There’s nothing quite so devastating for your business as finding out that you’ve become a victim of ransomware, only to discover that your backups are so old – or non-existent – that you can no longer operate,” he says.

Having effective backups of data on an external hard drive or cloud-based service – or both, ideally – are useful, but shouldn't be your only line of defence.

Have A Strong Response Plan!

For some, taking an active leadership role is an important way to protect yourself from an attack. Matt Middleton-Leal, the regional director of UK and Ireland at security software company, CyberArk, says that in the absence of IT specialists, it’s up to SME leaders to determine an effective cause of action in the event of an attack, and educate staff to prepare for them.

The main way business leaders can do this is through preparation. “This means having a strong cyber security response plan that clearly defines roles and responsibilities, and outlines how data can be recovered quickly in the wake of an attack,” he says.

By regularly testing these plans through live drills, and updating them as needed, this will help prevent company paralysis when an incident occurs. Further assistance for SMEs can be found in the UK Government’s 10 Steps to Cybersecurity.

Taking a proactive approach to cyber-security means that small businesses will be able to make better and faster decisions in crisis mode, build trust from customers, and be in the best position for long-term growth, explains Mr Middleton-Leal.

Educate Your Staff On Their Responsibility

Data is far too important to be interfered with, especially when it’s extremely sensitive. The health tech industry is held to a higher standard than others when it comes to protecting patient data, so they have to invest heavily in security, says Ryan McGrath, development operations and security lead at free prescription management app, Echo.

“Our main challenge in 2017 is maintaining a culture of security while meeting operational requirements. This means ensuring that security is at the heart of everything we do,” he explains.

A critical part of that is employee education. “Ensuring that security is a priority begins during staff induction," says Mr. McGrat, "People are reminded of their responsibility under the data protection act, and we share personal experiences, as patients and employees, from previous companies. We also talk about major data breaches in the press."

Reinforcing employment contracts is done by reminding staff of their responsibility to the company's patient charter. This is done by ensuring two-factor authentication as much as possible across devices and minimising access to data. “For example, our chief executive can't access Echo patient information. All requests for data must be justified and approved on a time-bound basis,” he adds.

Telegraph:          Directors Report #1 2017. Cyber Security Checklist For Management (£):

 

« Botnets Have Infiltrated The Twitterverse
DARPA Working On Secure Data Sharing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.