Written by Hylton Stewart, Head of Security at Conosco
Cyber security threats continue to rise, with trends over the last year showing significant increases in ransomware and phishing attacks specifically. The shift to remote working has contributed to the risks faced by businesses of all sizes, and attackers have been quick to adapt to new opportunities.
However, the basic ways of protecting your business from cyber attacks have remained largely the same.
Many small to medium business owners and directors are confident that their businesses will not be the victim of cyber attacks. After all, surely attackers will not actively be targeting your SME when there are so many large companies to target?
In fact, 81% of all cyber security breaches happen to small and medium-sized businesses and historically one small business in the UK is successfully hacked every 19 seconds, according to Hiscox. This is largely due to the fact that businesses in the SME segment are often unprepared, which makes them highly vulnerable. They normally do not have the budget to hire in house security staff or invest in defensive cyber security measures, and attackers know this, meaning they are actually more likely to suffer a data breach or business-impacting cyber attack than a larger enterprise.
With data breaches costing UK enterprises an average of $3.88 (£2.92) million per breach, according to IBM and Ponemon’s Cost of a Data Breach study, a cyber attack could be potentially crippling for a small business. In this piece, we cover everything you’ll need to understand, to help you protect your business from a cyber security attack.
So, what can you do to protect your business today?
All good security practices should start at the business level, taking into account the business objectives as well as the actual risks faced. This prevents organisations from overspending on the latest security software solution while failing to deal with the more urgent risks.
Start with a risk assessment and document the results in a risk register. You may want to consider enlisting the help of Managed Service Provider (MSP) as risk assessments can be complicated and time-consuming. Once completed it will form the basis of your security policies and will need to be updated at least annually. As your business matures, try to expand the risk register to encompass more than just IT and security risks, including business-level risks as well.
A risk assessment should:
Once you’ve complete your Risk Assessment, create a central business cyber security plan – one that supports your business goals and is based on your risks. This can be high level but should be detailed enough to allow for decision making on areas of security spending, and also should be clear enough to support staff awareness of their responsibilities. Make staff aware of this policy regularly and ensure they adhere to it.
Once you have assessed your risks and documented a security policy, you can move on to the foundational protections. This stage is a crucial step to understanding how to protect your business from a cyber security attack. Good basic cyber hygiene principles can still greatly reduce the risk of a successful cyber attack against your business and limit the costs – both financial and reputational – if one does occur.
Make sure you have these cyber security basics covered.
Educating your staff on cyber risks and attacks will go a long way to assisting them in protecting your business assets as well as performing their daily jobs with confidence, instead of having to double-check every email they look at and second guess themselves.
Some good basic security awareness topics to make sure your staff are aware of include:
Use a solution to deliver security awareness and general data protection training to staff, one that allows for tracking and reporting of completion so that you are able to provide evidence of staff training measures should you ever suffer a data breach. Ensure that training is provided regularly, at least annually if not 6 monthly to keep it fresh in your staff’s minds.
53% of IT leaders are concerned that limited visibility of endpoints will leave them open to a cyber security attack. Once you have the basics in place, it is time to consider the visibility of your IT and information estate. Will you be able to tell when a malicious attacker has breached your network, or gained access to a corporate mailbox? Do you know what devices are connected to your office network, or which accounts are accessing your data in the cloud?
Visibility into your IT and cloud estate is an important step on the journey to security maturity, helping to limit the time that malicious attackers are able to have access to your assets before being detected, thus limiting the damage they can do and the information they can steal. Research by Tanium showed that a huge 91% of respondents acknowledged fundamental weak points within the visibility of their IT estate. 31% of those surveyed said it was due to a lack of resources to help them manage risk and a further 31% said it was due to legacy systems not giving them accurate information.
Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) solutions can help prevent cyber attacks by providing visibility and monitoring, as well as incident detection and response capabilities to reduce risks and limit the potential damage of an attack. These solutions require skilled and dedicated staff to monitor and operate them, therefore many businesses will turn to an outsourced Security Operations Centre (SOC) to help them monitor and respond to alerts.
A good defence against malicious attacks and protection from data breaches requires a layered approach to cyber security, there is no single solution or action that will protect your business 100% of the time. Start with a good foundation and then layer on additional defences to cover risks and gaps in existing protections and mitigations. This will ensure that your risk of a successful cyber attack is lower and that when an attack against your business does succeed, which one will eventually, you are able to resolve it quickly and limit the damage.
If you have any questions about information security or need support protecting your business from cyber attacks, do get in touch with one of the experts at the Conosco Security Division: securitydivision@conosco.com