We use cookies on this website, you can read about them here »

Accept cookies

News

Cyber Security

In todays connected world, almost everyone is at risk of a cyber-attack. Businesses in particular. Cyber security unfortunately is no longer optional. 96% of all large businesses were targeted by cyber-attacks in 2016. The most common aims of any cyber-attack are; to disturb the flow of data, steal data or discredit the targeted organisation. If information from clients falls into the wrong hands due to a cyber-attack then it can not only affect client relationships but also cause detrimental damage to the company’s reputation.

Here are our 6 steps to Cyber Security:

  • Network Security

Make sure your network is secure by creating a perimeter defence with next generation firewalls including intrusion prevention, application control and URL filtering. Block malicious content and filter out any unauthorised access. Also consider introducing two factor authentication to significantly reduce potential hacker intrusion.

  • Remote Working

With many people choosing to work from home and access information only usually accessed in the office hosts many threats. There are many options for a company to secure remote access with robust authentication, such as VPN or token access. End point protection and encryption can be used to secure data in transit in the event of theft or loss. A mobile working policy and staff training should be implemented.

  • Mobile Device Management

Many employees are given a work phone or laptop to work whilst on the go. These can be protected by an enforced company security policy. Device encryption can ensure that only employees with an encryption key like a password can decrypt it. Additional security can be employed by setting up scans and an approval process for personal devices and removable media such as USB’s.

  • User Education

29% of lost data incidents are due to user error. So it is vital to educate users with security awareness training programmes, and by implementing security policies covering acceptable use, access controls and incident management.

  • Proactive Network Management

Monitor network devices and analyse unusual activity for risk. Make sure that all your anti-virus and malware defences are up to date. Also ensure that servers, desktops and network patches are managed.

  • Backup

Backup seems like the simplest solution to preventing data loss due to a cyber-attack however it is often overlooked. Making sure all archives are secured and that backups are encrypted at rest and in transit. Lastly make sure you test your restores to ensure the correct data is retrievable.

October 2017

Cyber Security  
Share this Site