TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Cyber

Consider cyber protection

by Mark Rowe

Businesses deploy locks, bolts, keys and alarm systems to guard against intruders, so why leave the door ajar for attackers in the digital world and run the risk of being crippled both commercially and financially. Here Allott and Associates explains why companies should consider whether their cyber protection is sufficiently robust.

Robust cyber security is as crucial as physical defences for safeguarding business operations. The odds of a firm suffering a data breach are one in four. These relatively short odds for potential large-scale disruption means businesses should have a strong plan in place to keep the digital enemy at bay as well as a contingency strategy for dealing with data that is compromised.

Successfully breaching a companyโ€™s defences could lead to the embarrassing theft of company secrets or, if personal data is involved, a massive fine if the authorities consider that the safeguards in place were inadequate and the response did not follow regulatory guidelines.

Recently a Jisc test of UK university defences against cyber-attacks found that one of the most effective approaches was so-called โ€œspear fishingโ€. This is where an email might appear to be from someone you know or a trusted source but is really a way of concealing an attack, such as downloading “malware”.

Employees should be cognisant of phishing email scams that may put the firm at risk of monetary loss, be taught to update their antivirus software, not use commonly-predicted passwords and not log into email accounts while on public WIFI.

Consider testing your workforce with a controlled phishing campaign, look at face-to-face or eLearning user awareness training, know what to do if you think you have been attacked, monitor your own IT against the cyber threat. One in three of all employees can be identified as an โ€˜insiderโ€™ threat, the key is to differentiate between โ€˜accidentalโ€™ and โ€˜deliberateโ€™.

End-to-end security and engaging an IT specialist should be in the mind when devising a strategy to minimise the possibility of interference, tampering or hijacking of data. Other steps firms can take to strengthen cyber security is by training their employees on basic data security protocols.

According to the Breach Level Index (BLI), globally over nine billion data records have been lost or stolen in the past five years. Business do not want to sleep-walk into a multi-million-pound nightmare if they fail to comply with European Union regulations governing the use of personal data.

The EUโ€™s General Data Processing Regulation (GDPR) is considered an additional weapon in the fight against cyber-crime. It will remain UK law whatever the outcome of Brexit. For the first time companies have new security obligations when processing and storing the data they hold, whether for employment purposes, suppliers, customers or potential customers.

Allotts is a GDPR specialist and we recommend that organisations should appoint a Data Protection Officer (DPO) who is savvy with the EU regulation as part of a plan for protection against a cyber-attack, accidental loss of data, damage or destruction. In the UK firms will have just 72 hours to notify the ICO of a data breach and what is being done to rectify the situation or face potentially crippling penalties, which could even result in the operations of a company being suspended.

Allotts can help businesses meet their ongoing legal requirement for GDPR. We can guide your organisation through data protection obligations, provide GAP analysis as well as ongoing data protection monitoring to ensure you stay legal and compliant.

Cyber attackers are becoming more sophisticated in their efforts to breach security measures and gain access to a firmโ€™s data bank. Backing up data, preferably remotely as well as on-site, should be part of a defence strategy and can help your company recover from hardware failure or data corruption or loss.

Vigilance is the key to combating attacks on security systems โ€“ the cyber threat is going to be a never-ending battle โ€“ the more we are working remotely, the greater the opportunity for the bad guys to find a way to hack and access data with the potential for draconian economic losses.

Related News

  • Cyber

    Cyber as a trust issue

    by Mark Rowe

    Cybersecurity isnโ€™t a tech issue – itโ€™s a trust issue, say Jake Upfield, pictured, Head of Solutions Advisory at Cybit and Tim…

  • Cyber

    Euro funding welcomed

    by Mark Rowe

    The European Commission has approved a 145.5โ€ฏmillion euros funding package under the Digital Europe Programme to go on European Union cybersecurity. A…

  • Cyber

    Cloud security survey

    by Mark Rowe

    Security concerns around data storage in the cloud has prompted some 44pc of CISOs to change cloud service provider, according to a…