From all of us at CyberTec Security, we would like to thank you for your interest in working with us. We have a vision of reducing risk by 80% for every SME in the UK and we’re incredibly grateful that you’re part of the vision.
Scored are calculated by weighing your company against all of the other companies we have dealt with.
We then take the average of the companies we deal with, the UK average and the average with our clients and accurately score your company based on where you fit into this mix.
Your existing breaches are visceral.
They are genuine issues we have found that need solving immediately (if they haven’t been already) and based on our research we are usually able to tell you exactly who in your organisation is responsible for these breaches. Please note that they might not even know that they have had a breach themselves. The affected systems is speculatory as until we run an in-depth network analysis we cannot fully comprehend the extent of any damage.
Phishing attacks intend to obtain sensitive information such as usernames, passwords and payment details. We have all received this type of email, the sender pretends to be a trustworthy entity.
1) Check the email address of the sender, the sender can show a reliable name but the email address will expose whether they are truly who they say they are.
2) Look out for poor grammar. This is often a clear indicator of a phishing scam.
3) Look out for aggressive language like “Urgent! Your account is X days overdrawn Contact us IMMEDIATELY”
An impersonation email is a form of phishing that masquerades as a known and trusted individual or company.
1) Promote awareness around the office of concepts such as always ‘think before you click’
2) Remember to confirm emails containing sensitive data with the person through a different channel. For instance, if your Finance Manager sends you an email containing payment links, call your finance manager and hear it from their voice.
3) Promote a cyber security culture in the workplace
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
1) Keep your software up to date
2) Use anti-virus software
3) Use a pop-up blocker such as “AdBlock” to prevent spam tabs opening
4) Turn off automatic downloads on your browser
Physical access to a server room by a stranger or staff member with no permission are examples of unauthorised physical access. Strangers can also access your data through your company’s WiFi.
1) Implement identification cards to verify people entering the premises, including visitors, contractors and personnel
2) By installing motion detectors and alarm systems you can attain an additional level of security
3) Implement a guest WiFi
Hackers bypass security encryption to gain access to your bank accounts.
1) Implement anti-virus software, ensuring all software is kept up to date
2) Install an inclusive firewall program that can pinpoint unauthorised programs attempting to transmit data over the internet
3) Change your online banking passwords several times throughout the year, ensuring the password is secure with a long mix of numbers, letters, both capital and lowercase letters.
By investing into cyber security, you will avoid losing money and time when you are breached or attacked by cyber criminals who want your data to monetise.
Make sure to put the certification logos onto your website and email signatures to show your prospects how seriously you take the security of their data.
Make sure to tell your clients that you’re taking care of their data; they’ll be more satisfied with your service and stay with your business for longer.
Stolen passwords are one of the simplest and most common causes of data breaches. Far too many people rely on predictable phrases like ‘Password1’ and ‘123456’, which means cyber criminals don’t even need to break into a sweat to gain access to sensitive information.
Even moderately secure passwords can be cracked with the help of a computer programmes that run through millions of the most popular credentials, so you need to think hard to create something original whenever you choose your password. You’re also vulnerable if you leave your password written down or use the same phrase for multiple accounts.
All software has technical vulnerability that crooks can exploit in countless ways. That’s why the organisations that maintain those programs routinely look for and address exploits before they are discovered by criminals.
Any time a vulnerability is fixed, the software provider releases a patch, which needs to be applied by the organisations that use the program. This must be done promptly, because crooks – now alerted to the vulnerability – will be actively looking for organisations that are still exposed to the threat.
Malware is a perfect example of just how simple cyber crime can be. Crooks purchase a piece of malicious software, find a system that contains a known vulnerability, plant the malware and scoop up the rewards.
What those rewards are depends on the type of malware. It could be anything from a keylogger, which tracks what a user types into a machine, to ransomware, which locks a system and demands payment for the user to regain access.
Employees don’t have to act maliciously to commit a data breach. They might simply make a mistake, such as including the wrong person in the Cc field of an email, attaching the wrong document or losing a laptop.
They could also be vulnerable to giving away information to someone they shouldn’t by being subconsciously manipulated into doing so – this is called social engineering.
Preventing breaches takes education from the ground up within an organisation. Work with your team to correctly educate them about threats and how you can prevent them. We have included a downloadable workbook and tests we will give to you for free so you can educate your staff and make an effort to become more cyber secure.
These are the 5 most vital elements to keep any business safe. Without these any other efforts you make are essentially redundant. If needed, we are a certifying body for IASME (there are only a handful of these in the UK) so we can work with you towards your certification of the government backed scheme Cyber Essentials.
(it’s highly likely this will become a legal requirement for business in the coming future)
Choose from one of our three packages specifically designed to reduce your risk based upon the stage you’re at in business
Place down your deposit, agree to our simple terms and condition and make your first real step to becoming a more secure organisation
Download our employee cyber security handbook, send it to your organisation using our email template and then test your staff when the time is right.
We have created a simplified guide to cyber security within an organisation. Help your staff become more cyber secure by distributing it.
Please wait while we process your payment...
Please wait while we redirect you...