SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
ADVICE
insider MAY 2016 15
How big a threat to business
is cyber crime?
Gary Sirrell It’s a huge threat that’s mas-
sively under reported. We can’t do anything
unless it’s reported. Report it to the Action
Fraud, the national central agency for
fraud, or the local police. Phishing (when
hackers send emails or set up websites in
the hope of ensnaring a naïve computer
user) is huge. People think they should
spend a lot of money on protecting their
IT. I would advise some basic training of
your staff; they’re your greatest asset but
also your greatest liability when it comes to
cyber crime. Ransomware (which hackers
use to block a company’s access to vital
data until the business pays a ransom)
is an effective business model because
they ask for the kind of sums – usually a
few hundred pounds – where companies
seriously consider paying the ransom to
quickly regain access to their data, and
many end up doing just that. A hospital in
the US recently paid a few thousand dollars
to a ransomware hacker. But you’re funding
organised crime if you do this.
Ian Batten There’s an easy way to avoid this:
have data backups. Businesses that don’t
have backups don’t care about their data.
This just doesn’t protect them against that
sort of crime, but a wide range of IT threats,
including hard drives going bad.
Helena Wootton One of our clients had a
secretary who copied the inbox of one of
the directors and then threatened to pass
out sensitive information. A report by PwC
found 60 per cent of small businesses were
attacked from inside last year.
SECUREWALLHOW SHOULD COMPANIES PROTECT THEMSELVES FROM CYBER CRIME?
PANEL ONE
IAN BATTEN
lecturer in computer security,
University of Birmingham
HELENA WOOTTON
partner, Browne Jacobson
GARY SIRRELL
detective sergeant, West Midlands
Police Cyber Crime Unit
“Your staff are your
greatest asset but
also your greatest
liability in when it
comes to cyber
crime.” Gary Sirrell
Why is the level of reporting
to police so low?
Sirrell There are some issues with Action
Fraud at the moment and there’s time
delays built into the system. The police are
quite good with victim care when it comes
IAN BATTEN HELENA WOOTTON GARY SIRRELL
SPONSORED BY
p15-17 Cybercrime breakfast.indd 15 07/04/2016 15:41
CYBER CRIME BREAKFAST
16 insider MAY 2016
to traditional crime, but not so good when it
comes to the technical side. But things are
improving.
Wootton Businesses are concerned about
being honest about breaches; they may not
want to report anything to the police be-
cause of the nature of the data that’s lost.
They also may not want to report it because
it’s an inside job.
Batten The argument that there’s a huge
undercurrent of cyber crime not being
reported may be true, but it’s unknowa-
ble. It seems strange the British Crime
Survey, seen as the gold standard of crime
reporting, doesn’t actually back up these
claims. These crimes can be protected
against fairly easily using old-fashioned
data processing hygiene. When I worked in
industry the big focus was on stopping the
corrupt employee in accounts receivable
How can cyber crime be best brought to
the forefront of directors’ minds?
Wootton What’s coming out of the new data
protection legislation is the threat of being
fined up to €20m, or four per cent of global
annual turnover. There’s also obligations on
businesses that process customer data. All
this is going to be more enforced rigorously.
Batten Very few companies recover from an
IT disaster. What concerns me is that the
narrative about cyber security is frighten-
ing people away from storing data in the
cloud, when there’s far more of a risk of a
fire or power failure in their building. If you
lose your accounts receivable or accounts
payable you’re dead.
Sirrell A lot of victims are being subject to
basic attacks which could be put right by
taking simple measures. If you make it
harder the bad guys will go elsewhere.
“The narrative about
security is frightening
people away from
the cloud when other
risks are far greater.”
Ian Batten
from colluding with the corrupt employee
in accounts payable and setting up a fake
supplier, which was made much easier be-
cause they all had each other’s passwords.
Dealing with those problems is much more
realistic than worrying about being attacked
by scary cyber hackers.
p15-17 Cybercrime breakfast.indd 16 07/04/2016 15:41
ADVICE
insider MAY 2016 17
What are the main measures businesses
should take to protect themselves?
Mark Lomas Everybody is a target online,
no matter how big the business. It’s about
having the right policies in place, before
you even think about the technical solu-
tions. Staff must be properly trained and
be made aware of the risks.
Susan Hallam Once you know the risks
look at what you need to do to address
them. Don’t try and avoid using the internet,
because that would be impossible.
Gary Sirrell Back up your data as often as
you can, keep data at multiple sites and
practice restoring from backups. Keep your
most important data in the safest place.
Is using the cloud more dangerous for
SMEs than storing data traditionally?
Hallam Many of us are in the cloud already,
but we don’t realise how actively we’re
using it. Don’t take a sledgehammer ap-
proach in trying to avoid the cloud. Instead
take a scalpel approach to make sure
you’re appropriately addressing the issues.
Small businesses are typically exposing
themselves to 400 different apps via staff,
so you need to know the risks you are
taking by allowing staff into the office with a
smartphone every day. Seventy-seven per
cent of apps are not ready to be used in a
secure fashion and are actually borrowing
data from other apps. So the biggest risk is
insider incompetence, by not knowing what
the risks are.
Hallam A lot of businesses are thriving
because they’re working in the cloud, so
they want to continue to use it and make
the most of it. But you should use two-step
verification to protect yourself. Also, many
businesses don’t realise that if someone
tries to get into your Dropbox who isn’t
recognised it will notify you.
How important is an ISO mark when it
comes to cyber security?
Lomas If we all hit those high standards
then we’ll make life so much harder for the
criminals. It’s like vaccination; it doesn’t take
too many children not to be vaccinated to
cause the outbreak of a disease. Ransom-
ware wouldn’t be spreading on the internet
if everybody was universally protected.
We can strive for that by meeting certain
standards in the industry.
Sirrell The ISO 27000 series is not the whole
answer, but it’s important. The Cyber Es-
sentials package, introduced to cover very
small companies that don’t have resources
to go for an ISO standard, is a cyber health
check for a business, which will give you
report on where to go next. It costs £400
to £500 and you do it once a year. The gov-
ernment is saying it won’t do business with
you or your supply chain if you’re not signed
up to Cyber Essentials.
Hallam There are government grants availa-
ble for businesses that are striving to meet
these standards.
PANEL TWO
SUSAN HALLAM
managing director, Hallam Internet
MARK LOMAS
IT consultant, Icomm Technologies
GARY SIRRELL
detective sergeant, West Midlands
Police Cyber Crime Unit
Lomas We’ve seen the emergence of stand-
ards when it comes to the cloud, especially
in the area of security. This includes ISO
27017, which many providers are looking
to certify themselves against. This gives a
level of assurance and clarity. A reason you
may go to the cloud for security is because
providers are going to be more obsessive
about applying best practices around se-
curity in a strict manner. This is something
businesses struggle with. Emails aren’t
necessarily secure either. You need to look
at what you’re using to transfer data, such
as Dropbox or WeTransfer. Staff are using
them through their own personal accounts,
which can have security implications. You
need to have a degree of control with
people in your organisation about what they
can and cannot do.
Sirrell There’s got to be an element of safe
help and investing in training of staff. There
are some very simple measures you can
take to protect against these threats. There’s
a vast amount of resources available to help
you, and it’s all free.
“You need a degree
of control in your
business about
what people can
or cannot do.”
Mark Lomas
“The biggest risk to
business is insider
incompetence, by
staff not knowing
what the risks are.”
Susan Hallam
SUSAN HALLAM MARK LOMAS GARY SIRRELL
SPONSORED BY
p15-17 Cybercrime breakfast.indd 17 07/04/2016 15:41

Contenu connexe

Tendances

WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?Hilary G. Killian
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The SceneKoen Van Loo
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
Positive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessPositive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessDinesh Laviskar
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?Sherry Jones
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyMark Albala
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 

Tendances (20)

WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The Scene
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Positive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessPositive and Negative impact of IT oN Business
Positive and Negative impact of IT oN Business
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
ODMOB Ransomware newsletter final
ODMOB Ransomware newsletter finalODMOB Ransomware newsletter final
ODMOB Ransomware newsletter final
 

En vedette

The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017Matheson Law Firm
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementCognizant
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FCMelissa Gibson
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime SurveyViren Aul
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 CriminologyKatrina Homer
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016Matheson Law Firm
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and CorruptionAdel Abouhana
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 

En vedette (12)

The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017
 
Legal500
Legal500Legal500
Legal500
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process Management
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
 
L Scope
L ScopeL Scope
L Scope
 
Crime Unit
Crime UnitCrime Unit
Crime Unit
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 Criminology
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and Corruption
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 

Similaire à Secure Wall - how should companies protect themselves from cyber crime?

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxNavinKumarDewangan
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdfSania Baker
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxsmumbahelp
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 

Similaire à Secure Wall - how should companies protect themselves from cyber crime? (20)

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docx
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 

Plus de Browne Jacobson LLP

Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020Browne Jacobson LLP
 
Exclusions: keeping you informed
Exclusions: keeping you informed Exclusions: keeping you informed
Exclusions: keeping you informed Browne Jacobson LLP
 
Procurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham sessionProcurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham sessionBrowne Jacobson LLP
 
Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019Browne Jacobson LLP
 
Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...Browne Jacobson LLP
 
Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019Browne Jacobson LLP
 
Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019Browne Jacobson LLP
 
Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019Browne Jacobson LLP
 
Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019Browne Jacobson LLP
 
Claims Club - March 2019 - Birmingham
Claims Club - March 2019 - BirminghamClaims Club - March 2019 - Birmingham
Claims Club - March 2019 - BirminghamBrowne Jacobson LLP
 
Claims Club - March 2019 - London
Claims Club - March 2019 - London Claims Club - March 2019 - London
Claims Club - March 2019 - London Browne Jacobson LLP
 
Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London Browne Jacobson LLP
 
State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019 State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019 Browne Jacobson LLP
 
Privileged communications webinar, March 2019
Privileged communications webinar, March 2019 Privileged communications webinar, March 2019
Privileged communications webinar, March 2019 Browne Jacobson LLP
 
Social care forum, March 2019, Manchester
Social care forum, March 2019, ManchesterSocial care forum, March 2019, Manchester
Social care forum, March 2019, ManchesterBrowne Jacobson LLP
 
Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter Browne Jacobson LLP
 
Public sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, NottinghamPublic sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, NottinghamBrowne Jacobson LLP
 
Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...Browne Jacobson LLP
 

Plus de Browne Jacobson LLP (20)

Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020
 
Exclusions: keeping you informed
Exclusions: keeping you informed Exclusions: keeping you informed
Exclusions: keeping you informed
 
Procurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham sessionProcurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham session
 
Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019
 
Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...
 
Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019
 
Health tech slides 12 june 2019
Health tech slides   12 june 2019Health tech slides   12 june 2019
Health tech slides 12 june 2019
 
Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019
 
Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019
 
Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019
 
Claims Club - March 2019 - Birmingham
Claims Club - March 2019 - BirminghamClaims Club - March 2019 - Birmingham
Claims Club - March 2019 - Birmingham
 
Claims Club - March 2019 - London
Claims Club - March 2019 - London Claims Club - March 2019 - London
Claims Club - March 2019 - London
 
Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London
 
State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019 State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019
 
In House Lawyers, March 2019
In House Lawyers, March 2019In House Lawyers, March 2019
In House Lawyers, March 2019
 
Privileged communications webinar, March 2019
Privileged communications webinar, March 2019 Privileged communications webinar, March 2019
Privileged communications webinar, March 2019
 
Social care forum, March 2019, Manchester
Social care forum, March 2019, ManchesterSocial care forum, March 2019, Manchester
Social care forum, March 2019, Manchester
 
Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter
 
Public sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, NottinghamPublic sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, Nottingham
 
Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...
 

Dernier

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Dernier (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Secure Wall - how should companies protect themselves from cyber crime?

  • 1. ADVICE insider MAY 2016 15 How big a threat to business is cyber crime? Gary Sirrell It’s a huge threat that’s mas- sively under reported. We can’t do anything unless it’s reported. Report it to the Action Fraud, the national central agency for fraud, or the local police. Phishing (when hackers send emails or set up websites in the hope of ensnaring a naïve computer user) is huge. People think they should spend a lot of money on protecting their IT. I would advise some basic training of your staff; they’re your greatest asset but also your greatest liability when it comes to cyber crime. Ransomware (which hackers use to block a company’s access to vital data until the business pays a ransom) is an effective business model because they ask for the kind of sums – usually a few hundred pounds – where companies seriously consider paying the ransom to quickly regain access to their data, and many end up doing just that. A hospital in the US recently paid a few thousand dollars to a ransomware hacker. But you’re funding organised crime if you do this. Ian Batten There’s an easy way to avoid this: have data backups. Businesses that don’t have backups don’t care about their data. This just doesn’t protect them against that sort of crime, but a wide range of IT threats, including hard drives going bad. Helena Wootton One of our clients had a secretary who copied the inbox of one of the directors and then threatened to pass out sensitive information. A report by PwC found 60 per cent of small businesses were attacked from inside last year. SECUREWALLHOW SHOULD COMPANIES PROTECT THEMSELVES FROM CYBER CRIME? PANEL ONE IAN BATTEN lecturer in computer security, University of Birmingham HELENA WOOTTON partner, Browne Jacobson GARY SIRRELL detective sergeant, West Midlands Police Cyber Crime Unit “Your staff are your greatest asset but also your greatest liability in when it comes to cyber crime.” Gary Sirrell Why is the level of reporting to police so low? Sirrell There are some issues with Action Fraud at the moment and there’s time delays built into the system. The police are quite good with victim care when it comes IAN BATTEN HELENA WOOTTON GARY SIRRELL SPONSORED BY p15-17 Cybercrime breakfast.indd 15 07/04/2016 15:41
  • 2. CYBER CRIME BREAKFAST 16 insider MAY 2016 to traditional crime, but not so good when it comes to the technical side. But things are improving. Wootton Businesses are concerned about being honest about breaches; they may not want to report anything to the police be- cause of the nature of the data that’s lost. They also may not want to report it because it’s an inside job. Batten The argument that there’s a huge undercurrent of cyber crime not being reported may be true, but it’s unknowa- ble. It seems strange the British Crime Survey, seen as the gold standard of crime reporting, doesn’t actually back up these claims. These crimes can be protected against fairly easily using old-fashioned data processing hygiene. When I worked in industry the big focus was on stopping the corrupt employee in accounts receivable How can cyber crime be best brought to the forefront of directors’ minds? Wootton What’s coming out of the new data protection legislation is the threat of being fined up to €20m, or four per cent of global annual turnover. There’s also obligations on businesses that process customer data. All this is going to be more enforced rigorously. Batten Very few companies recover from an IT disaster. What concerns me is that the narrative about cyber security is frighten- ing people away from storing data in the cloud, when there’s far more of a risk of a fire or power failure in their building. If you lose your accounts receivable or accounts payable you’re dead. Sirrell A lot of victims are being subject to basic attacks which could be put right by taking simple measures. If you make it harder the bad guys will go elsewhere. “The narrative about security is frightening people away from the cloud when other risks are far greater.” Ian Batten from colluding with the corrupt employee in accounts payable and setting up a fake supplier, which was made much easier be- cause they all had each other’s passwords. Dealing with those problems is much more realistic than worrying about being attacked by scary cyber hackers. p15-17 Cybercrime breakfast.indd 16 07/04/2016 15:41
  • 3. ADVICE insider MAY 2016 17 What are the main measures businesses should take to protect themselves? Mark Lomas Everybody is a target online, no matter how big the business. It’s about having the right policies in place, before you even think about the technical solu- tions. Staff must be properly trained and be made aware of the risks. Susan Hallam Once you know the risks look at what you need to do to address them. Don’t try and avoid using the internet, because that would be impossible. Gary Sirrell Back up your data as often as you can, keep data at multiple sites and practice restoring from backups. Keep your most important data in the safest place. Is using the cloud more dangerous for SMEs than storing data traditionally? Hallam Many of us are in the cloud already, but we don’t realise how actively we’re using it. Don’t take a sledgehammer ap- proach in trying to avoid the cloud. Instead take a scalpel approach to make sure you’re appropriately addressing the issues. Small businesses are typically exposing themselves to 400 different apps via staff, so you need to know the risks you are taking by allowing staff into the office with a smartphone every day. Seventy-seven per cent of apps are not ready to be used in a secure fashion and are actually borrowing data from other apps. So the biggest risk is insider incompetence, by not knowing what the risks are. Hallam A lot of businesses are thriving because they’re working in the cloud, so they want to continue to use it and make the most of it. But you should use two-step verification to protect yourself. Also, many businesses don’t realise that if someone tries to get into your Dropbox who isn’t recognised it will notify you. How important is an ISO mark when it comes to cyber security? Lomas If we all hit those high standards then we’ll make life so much harder for the criminals. It’s like vaccination; it doesn’t take too many children not to be vaccinated to cause the outbreak of a disease. Ransom- ware wouldn’t be spreading on the internet if everybody was universally protected. We can strive for that by meeting certain standards in the industry. Sirrell The ISO 27000 series is not the whole answer, but it’s important. The Cyber Es- sentials package, introduced to cover very small companies that don’t have resources to go for an ISO standard, is a cyber health check for a business, which will give you report on where to go next. It costs £400 to £500 and you do it once a year. The gov- ernment is saying it won’t do business with you or your supply chain if you’re not signed up to Cyber Essentials. Hallam There are government grants availa- ble for businesses that are striving to meet these standards. PANEL TWO SUSAN HALLAM managing director, Hallam Internet MARK LOMAS IT consultant, Icomm Technologies GARY SIRRELL detective sergeant, West Midlands Police Cyber Crime Unit Lomas We’ve seen the emergence of stand- ards when it comes to the cloud, especially in the area of security. This includes ISO 27017, which many providers are looking to certify themselves against. This gives a level of assurance and clarity. A reason you may go to the cloud for security is because providers are going to be more obsessive about applying best practices around se- curity in a strict manner. This is something businesses struggle with. Emails aren’t necessarily secure either. You need to look at what you’re using to transfer data, such as Dropbox or WeTransfer. Staff are using them through their own personal accounts, which can have security implications. You need to have a degree of control with people in your organisation about what they can and cannot do. Sirrell There’s got to be an element of safe help and investing in training of staff. There are some very simple measures you can take to protect against these threats. There’s a vast amount of resources available to help you, and it’s all free. “You need a degree of control in your business about what people can or cannot do.” Mark Lomas “The biggest risk to business is insider incompetence, by staff not knowing what the risks are.” Susan Hallam SUSAN HALLAM MARK LOMAS GARY SIRRELL SPONSORED BY p15-17 Cybercrime breakfast.indd 17 07/04/2016 15:41