In today’s world of text speak, instant messaging, emoticons and emoji’s, less is more! For most people, mobile phones are the primary form of communication and their use within business is now ubiquitous. As capable as mobile devices – smartphones, tablet devices, laptops – are at easing communications and improving productivity, if there is not structure and control to their usage, there is a risk that they can open the organisation to a cyber attack or data breach, particularly if the mobiles are the employees own as in BYOD – Bring Your Own Device. So businesses need TBH – To Be Honest and KISS – Keep It Simple Stupid! No offence!
‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches. It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses. The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.
So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?
Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.
We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation. However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.