Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

Unlike larger companies, small businesses often operate without dedicated IT professionals, and rarely regard themselves as attractive targets for cyber-attacks. But this very attitude, and the knock-on effect of being left undefended, is precisely what may make them tempting to hackers.

Duncan Sutcliffe, director of Sutcliffe Insurance Brokers in Worcester UK, didn’t know where to start when it came to protecting his firm. “Like many SMEs, we have no in-house IT expertise and were faced with a vast array of confusing and sometimes contradictory advice," he says, "We didn’t know where to start. We found cyber security so out of our comfort zone that it was tempting to just ignore the issue."

Mr Sutcliffe is not alone in trying to put off the issue. According to the Experian data breach preparedness study, 51pc of UK SMEs do not see cyber security as a priority.

But the consequences of an attack can be severe. An assault on a business's IT systems, infrastructure or devices could mean the difference between staying afloat or going under, especially if reputational damage results in losing trade, or it faces legal consequences.

With 38pc of UK SMEs having experienced an attack in the past year, ignoring the issue is no longer an option.

Guard Against Email Span

A major threat to SMEs are ransomware attacks, malicious software that locks a device, such as a computer, tablet or smartphone, and then demands a ransom to unlock it. “Guarding against spam and phishing emails is key to mitigating the risk of these attacks, and to achieve this, you need to use a blend of technical and educational solutions,” explains Vince Warrington, founder of information security company, Protective Intelligence.

Ransomware is reliant on an end user activating it, usually by opening an infected email attachment, so educating staff who can expect attachments on a daily basis, such as finance and HR teams, is vital. They should be encouraged to have a healthy skepticism by questioning who or where emails come from.

On the technological side of things, a disaster recovery plan should be in place, outlining what to do in the event of an attack. “There’s nothing quite so devastating for your business as finding out that you’ve become a victim of ransomware, only to discover that your backups are so old – or non-existent – that you can no longer operate,” he says.

Having effective backups of data on an external hard drive or cloud-based service – or both, ideally – are useful, but shouldn't be your only line of defence.

Have A Strong Response Plan!

For some, taking an active leadership role is an important way to protect yourself from an attack. Matt Middleton-Leal, the regional director of UK and Ireland at security software company, CyberArk, says that in the absence of IT specialists, it’s up to SME leaders to determine an effective cause of action in the event of an attack, and educate staff to prepare for them.

The main way business leaders can do this is through preparation. “This means having a strong cyber security response plan that clearly defines roles and responsibilities, and outlines how data can be recovered quickly in the wake of an attack,” he says.

By regularly testing these plans through live drills, and updating them as needed, this will help prevent company paralysis when an incident occurs. Further assistance for SMEs can be found in the UK Government’s 10 Steps to Cybersecurity.

Taking a proactive approach to cyber-security means that small businesses will be able to make better and faster decisions in crisis mode, build trust from customers, and be in the best position for long-term growth, explains Mr Middleton-Leal.

Educate Your Staff On Their Responsibility

Data is far too important to be interfered with, especially when it’s extremely sensitive. The health tech industry is held to a higher standard than others when it comes to protecting patient data, so they have to invest heavily in security, says Ryan McGrath, development operations and security lead at free prescription management app, Echo.

“Our main challenge in 2017 is maintaining a culture of security while meeting operational requirements. This means ensuring that security is at the heart of everything we do,” he explains.

A critical part of that is employee education. “Ensuring that security is a priority begins during staff induction," says Mr. McGrat, "People are reminded of their responsibility under the data protection act, and we share personal experiences, as patients and employees, from previous companies. We also talk about major data breaches in the press."

Reinforcing employment contracts is done by reminding staff of their responsibility to the company's patient charter. This is done by ensuring two-factor authentication as much as possible across devices and minimising access to data. “For example, our chief executive can't access Echo patient information. All requests for data must be justified and approved on a time-bound basis,” he adds.

Telegraph:          Directors Report #1 2017. Cyber Security Checklist For Management (£):

 

« Botnets Have Infiltrated The Twitterverse
DARPA Working On Secure Data Sharing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.