Businesses of any size and nature are susceptible to cyber attacks and should remain aware of the key threats they may face without sufficient infrastructure and awareness.
Often, smaller businesses, or those not in the public eye, may consider themselves immune; however, the unfortunate truth is that all businesses are attractive targets for different forms of cyber attack. Smaller businesses can be more vulnerable due to their lack of formal policies and controls, making them more commonly targeted than one might initially think.
Price Bailey aims to inform you of and prepare you for the continuing dangers of cyber threats, debrief you on various real-life examples of cyber-crimes suffered by businesses, and advise you on steps every business should take to avoid cyber attacks.
Below, we detail some recent cyber incidents we have observed and provide recommendations on how you can be better prepared to combat them:
Key considerations
How should I protect my business?
In addition to awareness of the threat and internal vigilance, proactive management, education and a company-wide security culture will go far in countering the threat, while at the same time ensuring more trained eyes to help counter potential attacks and enhance overall business resilience. Specific measures you should consider include:
- Having a cyber insurance policy: This makes good sense, but it is by no means a silver bullet and may not cover all outcomes such as reputational damage.
- Consider obtaining Cyber Essentials Certification: Cyber Essentials is a UK government-backed certification that helps businesses protect themselves against common cyber threats. It focuses on five key security controls: firewalls, secure configuration, user access control, malware protection, and patch management. Businesses should get Cyber Essentials certified to demonstrate their commitment to cybersecurity, reduce the risk of attacks, and build trust with customers and partners. Certification also helps ensure compliance with regulations and can be a requirement for some government contracts.
- Contingency planning: Boards should plan how they would react to different scenarios and have a mitigation plan for when their business is hacked or compromised. It is important that all departments are involved in this; cyber security is as much an HR issue as an IT one.
- Awareness: Senior managers should ensure all employees are cyber aware and alert to scams and social engineering, including not sharing passwords or memory sticks and are aware of public Wi-Fi risks.
- Supplier Integrity: Cloud and IT providers must demonstrate the integrity of the security protocols they have in place and their disaster recovery plans.
- Audits: Conduct a data audit to classify your most sensitive data.
- Antivirus: Always have up-to-date antivirus software and check that all mobile phones and tablets have antivirus software installed.
- Multi-Factor Authentication: Multi-Factor Authentication (MFA) adds an extra layer of security by requiring users to provide multiple forms of verification, like a password (something you know) and a code sent to your phone (something you have). Businesses should enable MFA to protect against data breaches, phishing attacks, and unauthorised access. It strengthens security across critical systems, ensuring that even if a password is compromised, the additional verification step blocks potential attackers. It’s especially important for protecting sensitive data, financial systems, and employee accounts. Typically, it is now recommended that MFA should be enabled wherever it is available.
Those unaware of modern cyber attacks may believe that having a strong IT team with appropriate firewalls and monitoring facilities is sufficient to eliminate the threat of attacks. This lack of knowledge can make them prime targets for scammers. Adequate training and a culture of awareness within your environment are essential for stronger prevention.
From a cyber perspective, a business is only as strong as its weakest link. Therefore, consistent awareness among all staff is imperative in the fight against cyber crime.