{"id":2777,"date":"2018-04-10T18:18:35","date_gmt":"2018-04-10T15:18:35","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=2777"},"modified":"2018-04-10T18:19:37","modified_gmt":"2018-04-10T15:19:37","slug":"how-to-protect-your-business-against-cyber-crime","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/how-to-protect-your-business-against-cyber-crime\/","title":{"rendered":"How to Protect Your Business Against Cyber Crime"},"content":{"rendered":"<p>Is your business underestimating the impact of a potential cyber security breach?<\/p>\n<p>Even though cyber crime is estimated to cost businesses billions a year, a number of companies don\u2019t understand how they could be under threat.<\/p>\n<p>Not sure where to start? Here\u2019s <strong>how to protect your business against cyber crime<\/strong>.<\/p>\n<p><iframe loading=\"lazy\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/jugHjzJ7cCg?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen><\/iframe><\/p>\n<h2><strong>Understand What You\u2019re Up Against<\/strong><\/h2>\n<p>Before taking any other action, work out how secure your business is currently.<\/p>\n<p>With a cyber security audit you\u2019ll get a clear idea of where your business is right now, while identifying any potential threats.<\/p>\n<p>An audit should take both external and internal threats into account. For example, an employee who uses an infected home device at work can cause just as much harm as hackers.<\/p>\n<p>You should also back up data often to protect against the damage a cyber attack would cause. Installing malware is also an essential step to guard against cyber threats.<\/p>\n<p>From cookie theft to key logging, the list of potential threats can seem endless. It pays to keep updated and aware of all the risks.<\/p>\n<p>You should also be aware of new variants of old scams which might surface. An example of an old scam that remains a threat today is <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing, which comes in many forms<\/a> and can be very deceptive.<\/p>\n<p>The world of cyber crime is constantly evolving, which makes it hard to keep track of. But by doing your due diligence and keeping up to date with the latest recommended practice you give your business the best chance of being protected.<\/p>\n<h2><strong>Implement a Cyber Security Plan<\/strong><\/h2>\n<p>After your risk assessment is mapped out, it\u2019s time to put a strategic plan together. The first step is to implement a risk management policy, and ensuring you\u2019ve informed all employees of the changes.<\/p>\n<p>Everyone associated with your organisation, including suppliers and contractors, needs to be compliant with your security plan. Anyone who isn\u2019t should be classed as a security risk!<\/p>\n<p>Extra attention should be given to reviewing password policy. Ideally you would like all devices to <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">use 2-factor authentication<\/a> wherever possible.<\/p>\n<p>You should continue to monitor and test your security controls after your plan has been implemented. If you\u2019re aware of any abnormal activity within your business, you need to take action against it before it\u2019s too late.<\/p>\n<h2><strong>Use Security Solutions<\/strong><\/h2>\n<p>In the dark about the steps needed to protect your business? Fortunately there are a number of schemes and solutions out there to help you.<\/p>\n<p>In the UK there\u2019s a <a href=\"https:\/\/www.cyberessentials.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener nofollow\">government-backed Cyber Essentials scheme<\/a> which protects against up to 80% of all potential cyber attacks. Alternatively, by enrolling in <a href=\"https:\/\/www.ncsc.gov.uk\/scheme\/gchq-certified-training\" target=\"_blank\" rel=\"noopener nofollow\">GCHQ Certified Training<\/a> you can get an in-depth understanding of cyber security and the process of protecting your company..<\/p>\n<p>These schemes cover a variety of bases, including:<\/p>\n<ul>\n<li>Ensuring your internet connection is secure.<\/li>\n<li>Safeguarding devices.<\/li>\n<li>Restricting access to your data.<\/li>\n<li>Providing virus protection.<\/li>\n<li>Reducing the threat of hacking.<\/li>\n<\/ul>\n<p>Therefore, while it\u2019s essential to have your own cyber security plan in place, using existing schemes can ensure your business is as secure as possible.<\/p>\n<h2><strong>Be Prepared to Be Hacked<\/strong><\/h2>\n<p>Prepare for all eventualities!<\/p>\n<p>By preparing for a cyber attack you\u2019ll have a much better chance of dealing with it effectively.<\/p>\n<p>Unfortunately, every business is a potential victim of cyber crime. Having a plan in place to deal with an attack is not only recommended, it\u2019s essential.<\/p>\n<p>Some points to keep in mind:<\/p>\n<ul>\n<li>Limiting the amount of employees who have administrative access<\/li>\n<li>Regularly update policies<\/li>\n<li>Make sure you stay up to date with legal requirements<\/li>\n<li>Have the right insurance in place<\/li>\n<li>Have a plan for how your company would deal with downtime<\/li>\n<\/ul>\n<p>By following these steps and taking a proactive approach to cyber security, you\u2019ll be helping your business to reduce the risk of an attack.<\/p>\n<p>Interested in learning some more essential business tips? <a href=\"https:\/\/twitter.com\/innovateuk\" target=\"_blank\" rel=\"noopener nofollow\">Follow Innovate UK on Twitter<\/a> or <a href=\"https:\/\/www.youtube.com\/channel\/UC1b_aUzptvSaal89zzB2o3g\" target=\"_blank\" rel=\"noopener nofollow\">subscribe to their YouTube channel here<\/a>.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Is your business underestimating the impact of a potential cyber security breach? Even though cyber crime is estimated to cost businesses billions a year, a number of companies don\u2019t understand how they could be under threat. Not sure where to start? Here\u2019s how to protect your business against cyber crime. Understand What You\u2019re Up Against [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,15],"tags":[202,118,230],"class_list":["post-2777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-rd","tag-cybersecurity","tag-data-protection","tag-information-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=2777"}],"version-history":[{"count":7,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2777\/revisions"}],"predecessor-version":[{"id":2787,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2777\/revisions\/2787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/2786"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=2777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=2777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=2777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}