• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
  • Contact

Daily Business Magazine

A magazine complement to the Daily Business website

  • Life, Arts & Leisure
    • Creative
    • Festival
      • Festival Reviews
    • Film
    • Food & Drink
    • Stage Shows
    • Life
    • Leisure
      • Rio Recommends – dog walks and cafes
    • Homes
    • Style
    • Travel
  • Opinion
    • Bill Magee
    • Craig Alexander Rattray
    • Karen Harvie
    • Keith Anderson
    • Russell Dalgleish
    • Terry Murden
  • Interviews
  • Notebook
  • Working Life
    • Careers & Management
    • Finance and legal
    • Technology
      • Tech Talk
    • Well Being
  • Daily Business News
    • All Content

Reduce the risk of a cyber attack by taking these first steps

October 17, 2019 by a Daily Business Contributor Leave a Comment

Adopting new technologies increases the risk of cyber-attack. NATASHA BOUGOURD says business data can be protected with these three key steps

New technologies have the power to enhance business performance and see it become digitally transformed. Streamlining operations can allow a business to boost productivity and improve the bottom line.

However, adopting new technologies and devices runs the risk of increasing the cyber-attack surface of a business. With that said, acting with a certain amount of caution will pay off.

Consider the possibility that the worst-case scenario happened, and an attack was successful… the downtime could spell financial disaster. With cyber-attacks against UK organisations increasing in 2019, a business can’t afford to take risks.

The guide below offers three pointers on how to take advantage of new technologies while keeping business data as secure as possible.

Anti-ransomware solutions are a necessary investment

With the introduction of GDPR legislation, hackers know that encrypted or stolen data could land a business in hot water with the Information Commissioner’s Office (ICO), which could lead to fines in the tens of millions. They’ll use this to their advantage to extort ransom payments out of you. It’s never advisable to pay the cybercriminals, as it’s rare you’ll get your data back. Additionally, hackers will identify your business as a guaranteed pay-out and will continue to target you.

With ransomware attacks increasing exponentially in recent years, security organisations have created solutions which specifically protect your systems and data from ransomware. Intelligent solutions like Intercept X will prevent ransomware at the point of infiltration. Or, if your business has already fallen victim to this file-encrypting malware, it’ll reverse the damage. You’ll also get access to features like root cause analysis, which identifies how the ransomware got into your business so you can bolster your systems going forward.

A business continuity plan will offer your business disaster recovery solutions

If, like many businesses, you host all of your critical resources on one server, an attack or failure on this system could bring your business down. For years, organisations have been backing up their files and data either on physical devices or into the cloud. But now it’s not enough to simply back up data.

Forward-thinking business continuity and disaster recovery solutions will not only back up your data, but back up your entire IT estate, whether that’s physical, virtual or in the cloud. Say, for example, a key server in your business goes down – that could be due to a malicious attack, an electrical failure or a flood. You can use your business continuity solution to spin up your server virtually and be back up-and-running in no time. An external managed IT services partner can help you implement the most suitable solution.

Protect your business data by educating your staff members

Even with the advent of innovative technologies, your biggest attack surface is still your employees. Email is by far the most popular vector to launch a cyber-attack, with an estimated 91% of cyber-attacks starting with an email designed to harvest login credentials (PhishMe research).

The phishing emails of the 2010s are significantly more targeted and harder to spot than old-school email scams. Hackers are impersonating the business software you use (including purporting to be Microsoft to get your email credentials), your suppliers and even your colleagues, and they’re more convincing than ever.

Ensuring your staff are not only educated, but continually upskilled in spotting suspicious content, is essential to keeping your business safe. Additionally, you can use tools which simulate phishing attacks to benchmark the existing knowledge amongst your employees and track progress against your training.

Natasha Bougourd is a lead applications writer at TSG, a London based IT managed services business, offering expertise across a range of areas including Office 365, Dynamics 365, document management and business intelligence

This article appears under the terms of the DB Direct service

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Opinion, Technology, Working Life

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar



Editor’s Pick

Bill Magee

Bidding in a world of virtual liquid assets

Bill Magee

… [More...] about Bidding in a world of virtual liquid assets

Sir Paul McCartney

Master of pop shows them how it’s done

Terry Murden

… [More...] about Master of pop shows them how it’s done

Wagamama's kitchen

Hospitality still needs a helping hand

Katie Corrigan

… [More...] about Hospitality still needs a helping hand

Neil Clark

Fixing problems with the human touch

Terry Murden

… [More...] about Fixing problems with the human touch

Advertising



Footer

  • All Content
  • Site Map
  • Privacy Policy
  • Facebook
  • Twitter
  • Instagram
  • Email
  • LinkedIn
  • WordPress

Copyright © 2022 · Design by jPAD Consulting · Magazine Pro · Genesis Framework

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
 

Loading Comments...