The Business Exchange Swindon & Wiltshire Edition 30: April/May 2017 | Page 12

CYBER SECURITY: IS YOUR BUSINESS PREPARED?

Cyber security is becoming a dominant theme of 2017 with all technology at risk of being undermined by data theft, fraud and other cyber threats.
Only days into the year the BBC ran a feature asking,‘ Could a bank go under following a major theft in 2017?’ setting the tone for the increased threat as professional criminals become more sophisticated in their approach.
February saw the opening of the UK’ s National Cyber Security Centre( NCSC), demonstrating the importance of protecting our country’ s critical national infrastructure and economic well-being, as well as individuals. The Business Exchange recently held a Cyber Roundtable in partnership with Thrings solicitors, Lockton insurance and CIS IT at Desk Cowork in Swindon.
15 business leaders from across Wiltshire attended the discussion which looked at common cyber threats to business and what firms can do to help protect their company and its assets.
The Panel
Hot topics of discussion:
Alastair Govier Commercial Partner Thrings Specialising in cyber, Alastair works across the South West and the UK, advising and supporting businesses on issues such as risk management, data issues and disputes.
Ian Saxelby Assistant Vice President Lockton Companies LLP Ian works for international insurance firm Lockton insurance. One of their specialisms is cyber security and Ian works with clients across the South West corridor advising them on risk and protection.
Richard Marsh CEO CIS Richard heads up the firm which is committed to providing security solutions that maintain ultra-secure standards for business.
The damage a cyber-attack can cause a business
• Financial loss
• Reputational damage
• Fines through data loss
• Disruption of business continuity With fraudsters becoming more sophisticated in their approach, small businesses need to be aware of the risks and implications of an attack. There are multiple ways in which your business could be at risk, these include:
• Ransomware( A type of malicious software designed
• to encrypt and deny access to your data, until a sum of money is paid)
• Malware( Software that is specifically designed to disrupt, damage or gain authorised access to a computer system)
• Email spoofing( The forgery of an email header so that the message appears to have originated from somewhere other than the actual source.)
• Phishing( The fraudulent practice of sending emails purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers, or click on malicious links to attachments)
• Evil twin( A fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam)
Ransomware & Malware – The threat Anyone with an internet connection is vulnerable to an attack. These attacks are happening every day against your network, but you won’ t know they are occurring. It’ s a case of are you protected or not?
“ Smaller companies don’ t think they’ re a target, they think why would they target me? I’ m only a small firm with 25 employees. It’ s not people the other end, it’ s bots. They scan for everything they can within seconds and as soon as they find a way that’ s it.”
“ We’ ve seen in the last few months, two or three companies attacked by ransomware that encrypts anything useful on a server and leaves you with a note file on how to pay the ransom.
“ In a particularly malicious case, a client was left with a note saying,‘ We’ ve taken your Sage file and we’ re going to share it with your competitors’.” Richard Marsh
“ I’ ve seen a small accountant set down for three days with ransomware, demanding a number of bitcoins( crypto currency) in return for release of their data. Small businesses are incredibly wrong, if they don’ t see that they can become a target. Any firm that has a URL is open to a threat.” Ian Saxelby
Email spoofing and phishing Thousands of spoofed emails are received every day that look like they come from a legitimate sender. They might be requesting you to pay an invoice or to fill out a form, but each have the same agenda, to steal something from you, be it your data, or enable access to your system.
“ We had a case where a finance director received an email from the MD asking him to pay an invoice. At the start of the email it said,“ hope you’ re having a good day.” The FD had spoken to the MD in the morning and smelled a rat. With this he checked and the email was a fake. By being vigilant the firm saved thousands of pounds.” Alastair Govier
“ Educating staff on clicking and downloading documents from unsolicited emails is key.” Richard Marsh
People Training staff on cyber threats should be a top priority for any business. Advising them on what to look out for and best practice.
“ Employees are the biggest weakness in any business with regard to security. If you spend £ 100,000 installing a firewall, great. But what stops a member of staff from clicking on a link on a website and that’ s it, they’ re in.
“ CIS perform many checks to secure your business. One way is calling up and pretending to be IT support. We ask people to go to a website for example and fill in some details. Another check is we’ ll randomly leave USB sticks in receptions, car parks etc. The number of USBs that are picked up and put in a computer straight away is ridiculous. As soon as a person’ s involved, that’ s it. There are huge risks.” Richard Marsh
“ The cleaner finding a Post-it note with a password on it, stuck to a screen is a classic.” Alastair Govier
Evil Twin Being aware that fraudulent Wi-Fi points are out there is key. If you are working with sensitive data or financial information and must use a public Wi-Fi hotspot, take action to ensure you’ re connecting to the legitimate access point.
“ Remotely accessing data, there’ s always a risk. Our advice would be to password encrypt your data, so that if it does fall into the wrong hands, it can’ t be opened easily.” Richard Marsh
Protecting your business Conducting a risk assessment is the first step to take when creating a cyber security plan. Look at what really matters to you, what are the risk areas? What’ s business critical? And what support can you get from subject matter experts?
Creating a response plan is important too, detailing what to do if something happens. How will you communicate with customers and suppliers if a data breach occurs?
“ There are regulatory and legal implications surrounding any data breach. Businesses can get fined up to £ 500,000 if found in breach of the Data Protection Act, but the fines are increasing up to 4 % of your global revenue or a maximum of 20 billion Euros.
“ A director’ s personal liability is also called into question for breach of duty. You’ re not safe no matter the size of your business and you are more likely to be exposed if handling personal data. It primarily comes down to what protections you’ ve put in place.” Alastair Govier
“ Traditional professional indemnity insurance doesn’ t cover cyber threat. As this is a new market, underwriters want to gain market share, so cyber policies are relatively cheap at the moment.” Ian Saxelby
Reputation The YouGov polls commissioned by the ICO to mark European Data Protection Day, showed that 20 % of people would definitely stop using a company’ s services after hearing news of a data breach, while 57 % would consider stopping.
With this in mind, why would you not invest in ensuring your company is properly protected? After all, prevention is better and far cheaper than cure.
If you have a question for one of our experts following this article, please email: press @ tbeswindonandwilts. co. uk
12 THE BUSINESS EXCHANGE 2017