Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

Unlike larger companies, small businesses often operate without dedicated IT professionals, and rarely regard themselves as attractive targets for cyber-attacks. But this very attitude, and the knock-on effect of being left undefended, is precisely what may make them tempting to hackers.

Duncan Sutcliffe, director of Sutcliffe Insurance Brokers in Worcester UK, didn’t know where to start when it came to protecting his firm. “Like many SMEs, we have no in-house IT expertise and were faced with a vast array of confusing and sometimes contradictory advice," he says, "We didn’t know where to start. We found cyber security so out of our comfort zone that it was tempting to just ignore the issue."

Mr Sutcliffe is not alone in trying to put off the issue. According to the Experian data breach preparedness study, 51pc of UK SMEs do not see cyber security as a priority.

But the consequences of an attack can be severe. An assault on a business's IT systems, infrastructure or devices could mean the difference between staying afloat or going under, especially if reputational damage results in losing trade, or it faces legal consequences.

With 38pc of UK SMEs having experienced an attack in the past year, ignoring the issue is no longer an option.

Guard Against Email Span

A major threat to SMEs are ransomware attacks, malicious software that locks a device, such as a computer, tablet or smartphone, and then demands a ransom to unlock it. “Guarding against spam and phishing emails is key to mitigating the risk of these attacks, and to achieve this, you need to use a blend of technical and educational solutions,” explains Vince Warrington, founder of information security company, Protective Intelligence.

Ransomware is reliant on an end user activating it, usually by opening an infected email attachment, so educating staff who can expect attachments on a daily basis, such as finance and HR teams, is vital. They should be encouraged to have a healthy skepticism by questioning who or where emails come from.

On the technological side of things, a disaster recovery plan should be in place, outlining what to do in the event of an attack. “There’s nothing quite so devastating for your business as finding out that you’ve become a victim of ransomware, only to discover that your backups are so old – or non-existent – that you can no longer operate,” he says.

Having effective backups of data on an external hard drive or cloud-based service – or both, ideally – are useful, but shouldn't be your only line of defence.

Have A Strong Response Plan!

For some, taking an active leadership role is an important way to protect yourself from an attack. Matt Middleton-Leal, the regional director of UK and Ireland at security software company, CyberArk, says that in the absence of IT specialists, it’s up to SME leaders to determine an effective cause of action in the event of an attack, and educate staff to prepare for them.

The main way business leaders can do this is through preparation. “This means having a strong cyber security response plan that clearly defines roles and responsibilities, and outlines how data can be recovered quickly in the wake of an attack,” he says.

By regularly testing these plans through live drills, and updating them as needed, this will help prevent company paralysis when an incident occurs. Further assistance for SMEs can be found in the UK Government’s 10 Steps to Cybersecurity.

Taking a proactive approach to cyber-security means that small businesses will be able to make better and faster decisions in crisis mode, build trust from customers, and be in the best position for long-term growth, explains Mr Middleton-Leal.

Educate Your Staff On Their Responsibility

Data is far too important to be interfered with, especially when it’s extremely sensitive. The health tech industry is held to a higher standard than others when it comes to protecting patient data, so they have to invest heavily in security, says Ryan McGrath, development operations and security lead at free prescription management app, Echo.

“Our main challenge in 2017 is maintaining a culture of security while meeting operational requirements. This means ensuring that security is at the heart of everything we do,” he explains.

A critical part of that is employee education. “Ensuring that security is a priority begins during staff induction," says Mr. McGrat, "People are reminded of their responsibility under the data protection act, and we share personal experiences, as patients and employees, from previous companies. We also talk about major data breaches in the press."

Reinforcing employment contracts is done by reminding staff of their responsibility to the company's patient charter. This is done by ensuring two-factor authentication as much as possible across devices and minimising access to data. “For example, our chief executive can't access Echo patient information. All requests for data must be justified and approved on a time-bound basis,” he adds.

Telegraph:          Directors Report #1 2017. Cyber Security Checklist For Management (£):

 

« Botnets Have Infiltrated The Twitterverse
DARPA Working On Secure Data Sharing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Zyber 365

Zyber 365

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.