Cyber security, as some may already know, is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from nasty attacks. As a business, it’s something we need to be aware of as the cost of cyber crime is at all all-time high and the consequences can be very damaging.
Cyber-attacks can cause significant disruption and harm to even the most resilient organisations. Not only are loss of assets an implication, businesses can face fines and damage to their reputation.
Breakwater IT have been our professional IT service provider for some time, and we would highly recommend them. They have built a positive reputation for themselves due to the high level of quality service they offer their clients. When I was seeking some advice around cyber security it felt only fitting to approach them for guidance. I spoke with John Gostling, their Managing Director, who has been working within the IT profession for over 20 years. He shared some of his thoughts and tips on cyber security and how businesses can better protect themselves.
Cyber-attacks can affect businesses of all sizes and the implications can be catastrophic. Your personal assets are at risk, so it is important to make sure they are secure. Technology has become an increasingly integral aspect of the workplace. From email correspondence to financial transactions, we are relying on technology more and more to be connected at all times so that we can carry out our work effectively. When these lines of communication become compromised it can be disastrous for our businesses.
There are many reasons, but one is simply because small businesses don’t always have the cyber defences in place to protect themselves due to the perceived expense. It’s important to point out it doesn’t have to be expensive to protect your systems, but it does take common sense and a proactive approach.
Usually it is organised crime groups who setup automated attacks to steal money. This includes things like ransomware, invoice fraud and impersonation attacks. Impersonation attacks seem to be most common; this is where a criminal will impersonate the finance or managing director and attempt to get the finance team to send their company money.
Threats can come in all manner of shapes and sizes. Most of the breaches we have seen so far in 2019 are specifically crafted emails which try and get the user to click on a link. Once they have clicked on the email, they will normally be prompted to enter their password. If the password is submitted the criminals, then have access to that account. This can go unused or unnoticed for many months whilst the attackers view the information in the mailbox and work out ways to extort money from that business.
Another example would be to use malware on a USB stick. Once the stick has been run it can give an attacker full access to that machine including taking over the screen and viewing the webcam.
The best thing to do is to plan for a breach. Look at your systems and what’s important to your business. Identify recovery plans to ensure that key systems can be brought online as quickly as you need them. Your recovery plan should include steps for notifying the ICO in the event of a personal data breach.
My top tips would be to:
We hope you found this blog useful, if you need any more information at all email John on john.gostling@breakwaterit.co.uk and he would be happy to help.
"Indigo Swan were professional but with a personable approach. Their market knowledge allowed me to enter new contracts with confidence, this was something I was unable to do with my previous broker."
Joanna Thornton, Estate Manager
"The experience behind the Indigo Swan team, their passion and integrity were all important to us. They clearly understood the market and could provide the best advice. "
Phil Riseborough, Head of Facilities
"We’ve worked with other energy consultants, but with Indigo Swan we get real integrity and service that is way beyond our expectations. We have already saved over £120k."
Jason Wakefield, Procurement Manager
Cookie | Duration | Description |
---|---|---|
TawkConnectionTime | session | Tawk.to, a live chat functionality, sets this cookie. For improved service, this cookie helps remember users so that previous chats can be linked together. |
Cookie | Duration | Description |
---|---|---|
SRM_B | 1 year 24 days | Used by Microsoft Advertising as a unique ID for visitors. |
Cookie | Duration | Description |
---|---|---|
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
MR | 7 days | This cookie, set by Bing, is used to collect user information for analytics purposes. |
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_gat_gtag_UA_12371872_1 | 1 minute | Set by Google to distinguish users. |
_ga_* | 1 year 1 month 4 days | Google Analytics sets this cookie to store and count page views. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
Cookie | Duration | Description |
---|---|---|
ANONCHK | 10 minutes | The ANONCHK cookie, set by Bing, is used to store a user's session ID and also verify the clicks from ads on the Bing search engine. The cookie helps in reporting and personalization as well. |
MUID | 1 year 24 days | Bing sets this cookie to recognize unique web browsers visiting Microsoft sites. This cookie is used for advertising, site analytics, and other operations. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
CLID | 1 year | No description |
SM | session | No description available. |
twk_idm_key | session | No description |
_clck | 1 year | No description |
_clsk | 1 day | No description |