fbpx

Security 101 – protecting you and your business against cyber crime

Share this post

Share on facebook
Share on linkedin
Share on twitter
Share on email

How much money do you reckon the world’s economy loses to cyber crime every year?

Hundreds of Thousands? Millions? BILLIONS!?

The answer: around $1 Trillion.

That’s an insane amount of money to lose through easily preventable scams like phishing emails & dodgy web adverts. What’s more worrying is that this number has increased by more than 50% since 2018.

Take your mind back to 2019 (ah yes, a blissful non-quarantined world) and ask yourself how many businesses were affected in some way by cyber crime – you might not think many businesses were affected at all as you’d have heard about it in the news, but in actual fact it affected over two-thirds of all businesses.

If your business hasn’t already been caught within or affected by cyber crime, it’s easy to think that you’re in the clear, but you’re not. To put it very simply, no business is 100% safe. Even your most vigilant team members can get caught out and tricked by cyber scams.

The thing is, cyber scams are getting clever; scarily clever in-fact… and they’re no longer contained to sketchy emails.

While traditionally you’d think of a cyber scam coming in the format of an email with a foreign prince offering you their vast fortune in return for a small transfer fee of £250,000, or something else blaringly obvious, but many modern cyber scams are vastly more intelligent than this. In fact a lot of businesses are caught by impersonation scams, where a cyber attacker from outside your organisation can impersonate someone’s email in your business and request information, personal details, or payment from customers and employees alike.

On top of this, social media scams are on the rise and in many cases these are much less obvious than email scams; the reason being is that anyone can build a pretend business on Facebook, Instagram, or LinkedIn and then pay for adverts to get people to visit their website. Their site may be deceiving and collect details of the people that visit it, or trick people into putting personal details in for reasons other than what’s been promoted on the site.

So with this in-mind, how do you keep yourself and your business safe?

Step 1: The full works security training

Security training is one of the most important defences against cyber crime – it’s no good having state of the art firewalls & email protection if your staff don’t know how to stay safe and identify cyber scams.

Pure IT provide full cyber security awareness and training, so if this is something you want just let us know.

Step 2: Back it up, pack it in, let me begin

Backups are key for any business, even outside of the subject of cyber security. If you don’t have a backup in-place then you’re lining yourself up for disaster; imagine if your data got encrypted by ransomware – how would you get it back? All your data from year dot would be gone.

Pure IT provide a full backup service as part of our IT support so if this is something you want just let us know.

Step 3: If you have the tools available, then to quote Gwen Stefani “Whatchu waitin’ for?”

There’s a plethora of tools available to keep you and your business safe from cyber attacks; from password generators/managers through to MFA (multi-factor authentication) & encryption, there’s something for everyone and chances are you already have at least one of these available to you. We highly recommend setting these up.

Pure IT provide assistance with setting up password managers, MFA, encryption, VPNs and many other security services, so if this is something you want just let us know.

Step 4: P, P and P again (I’m sure you can your own pun out of that)

Policy, protocol & procedure – the three P’s you need to prepare for a data breach. This policy details how your business will deal with data breaches and cyber attacks and should be used as a guide to reach your most-desired outcome (which in many cases will be mitigating the attack); include things your employees need to do such as using password managers or MFA. Your protocol will be the written plan of the procedures your employees must follow in the event of a cyber attack. Finally your procedure will include who needs to be alerted, what steps everyone should take to block the attack and how everyone in the business should react.

Pure IT provides cyber security awareness assistance so if this is something you want just let us know.

Step 5: Call in the cavalry

If you’re not an IT expert then this can seem daunting and complicated. Don’t worry though, that’s what we’re here for.

If at any point you don’t think you can do your own cyber security justice there’s no shame in bringing in the experts; a great IT support partner should be more than willing to help. Also on an unrelated note, Pure IT are an amazing IT support partner.

Pure IT are always willing to help with cyber security (and other IT matters of course) so if this is something you want just let us know.

More from us

How can we help?

Enter your details below & we'll get back to you

So you need support?