Blogs

We encourage local business people to share their blogs on BusinessLincolnshire.com and we will happily acknowledge you as the author and provide a link back to your website. Please email your business related blogs to businesslincsenquiry@lincolnshire.gov.uk for us to publish.

Business against cyber crime: Why businesses can no longer afford to be complacent about cyber crime.

Posted in Security by Stuart McFarlane – Digital Development Programme ( from Business Lincolnshire ) on 2017-10-26 00:00

An attack on a valued public service institution like the NHS came as a shock to all of us and to them, but it illustrates just how disruptive a cyber-attack can be, underlining the necessity for having effective defenses and incident management plans in place.

All businesses (micro, small as well as large) and sole traders who use the internet – cyber-attacks has become the new norm; it has become an unwelcome but constant part of our digital working lives. 

All organisations need to be sufficiently prepared for all eventualities and they cannot afford to ignore this reality.

Defences are down and complacency is high - too many businesses do not believe an attack could happen to them and business owners and their staff can be the weakest link.

What does an attack look like – spoof emails with clip open links or attachments

Common methods of attack include the following:

  • Insider attacks: employees downloading sensitive or confidential data and selling it on.
  • Phishing: multiple individuals are targeted by a single blanket email that is sent in the hope that some will reply with sensitive information, transfer funds or click on rogue links or attachments.
  • Whaling: a small group of individuals with significant data access are targeted. A hacker poses as a senior company official and requests personal information, bank detail changes or a large funds transfer
  • Ransomware: a hacker gains access to a system and takes it over. It holds the organisation to ransom by blocking system access until a substantial payment is made.
  • System vulnerability exploitation: weaknesses in system controls, for example not patching systems with the latest security updates and uncontrolled use of open source software, can lead to consequential loss.

 

For more information contact: Stuart.mcfarlane@bizlincolnshire.com