surftech_cyber_security-webinar-slideshare
Date: 19/07/2017 | By: Matthew Parsons

As we’ve seen in the news lately, cyber security is not to be taken lightly. There are a number of potential threats that you need to protect your business from, both internally and externally.

 

SelectMember_MatthewParsons-195x208

BizSmart Select Member Matthew Parsons of Surf Tech IT has sixteen years of experience in IT and is committed to keeping his clients secure. In his latest webinar, he shares the cyber threats you need to watch out for.

 

 Click here to listen to his webinar or read on

 

 

Cyberthreats

 

There are a number of cyberthreats that you need to be aware of, including:

  • Phishing
  • Malware
  • Denial Of Service
  • Man In the Middle
  • Credentials Reuse
  • Insider Attack

 

Phishing attacks

 

Phishing attacks usually take place via email. You’ll receive an email that looks like it’s from a legitimate source such as Apple or your bank provider. A link in the email takes you through to a website page that looks identical to the genuine website. The goal of the email is to extract your bank credentials or Apple login so that the phisher can access your account.

 

Malware

 

This is a form of harmful software such as a virus or ransomware. For example, the WannaCry ransomware attack in May of this year was a worldwide cyberattack that targeted computers running older operating systems such as Microsoft Windows XP. This attack encrypted data and then demanded ransom payments in the cryptocurrency Bitcoin, to unlock the data.

 

The weakness in Windows had been identified before this attack, but organisations who hadn’t invested in keeping their software up to date were hit badly by the attack.

 

These kinds of attacks don’t just affect one machine – they can encrypt data on your server too – so can have a large impact on your business. Users often have to restore an older backup, meaning that work time and data are lost.

 

Denial of service

 

This is where hackers attempt to disrupt a service by flooding it with data. It’s commonly used against websites, with them being flooded with data until they fall over.

 

Man in the middle attack

 

The goal of a man in the middle attack is to intercept your internet traffic with the aim of obtaining login details or payment information. This can happen if your website isn’t secure or data isn’t encrypted.

 

Credential re-use

 

People often reuse their passwords – using the same password for everything. To stay secure, it’s much better to have a unique, complex password for each website you use.

 

Insider threat

 

A disgruntled employee who still has access to your system can be a threat, disrupting your business by accessing, stealing or deleting data. Having a system for quickly revoking access is vitally important.

 

Protecting against cyberthreats

 

Forms of protection include:

 

  • Antivirus – Additional Endpoint Protection
  • Antispam – Archive all email
  • Unified Threat Management (UTM) – SonicWall
  • Backups – Offsite & Tested

To find out more about how you can protect your business from cyberthreats, listen to the webinar here.

 

BizSmart aims to help SME and micro-business owners scale their businesses and create value through sound practical business support. We aim to give you insight and clarity and fire up your determination to succeed. You can access blogs like this and more besides through our free SmartRoom service here.