Cyber Security with Patrick from Computer Clinic
31 October 2023
The answer to this will depend on the business and their budget. Some first steps include:
To be honest, I can give you a complete list along with the pros and cons of each one. However, realistically, only large companies are able to implement everything. I believe business owners are intelligent people and, armed with the right information, they can assess their own risk versus the costs and are able to decide on how far to go in terms of cyber security. Effectively how many layers of protection do you want to implement?
So here are three alternative potential vulnerabilities that I'm currently experiencing:
One a week and they are all completely different and it is through lack of investment in their security layers or a genuine belief that everything is being handled correctly by their current website or IT provider.
A lot of people believe that if they have antivirus software they are protected but as you are now learning, it is a layered approach so antivirus alone is not enough. Antivirus does protect against viruses in software but it does not stop human error where passwords are inadvertently obtained by hackers.
So, what is human error? It is people giving away information - clicking or opening stuff they shouldn't. So training is a key defence.
How good are your staff? Have they ever been sent a phishing test to identify security gaps? Have they ever received formal cyber security training?
Scams are very elaborate these days, so very hard to spot, and impulse clicks on the spur of the moment often lead to trouble.
There are too many to go into and they are always changing so there is not a one size fits all solution for this. However, some common examples are:
It's the unknown, what happens next? The stress and additional workload for both the business owners and the staff. The physical aspects are downtime, outages, reputation damage, loss of data, identity theft and being held to ransom. It is a terrible situation to be in.
Call for professional IT support immediately and although there are set action plans and procedures, being able to think on your feet is vital. Focus just as much as finding a way to keep the business operating immediately as to finding out how it occurred in the first place and stopping the breach. Send out a communication (have one ready) to inform everyone of the situation too, as it is best coming from you than others.
Bit Warden Teams or Enterprise version – see our blog on this.
Install the SecurityScorecard Security Ratings plugin to your browser. This will tell you how secure your security profile is based on all the domains you own and if you haven't been 'checked' as yet, there will be no score but you can request a free check which normally takes about 2 weeks to complete.
Another website (that hackers use) is Shodan. This shows in real time all the vulnerabilities worldwide. A hacker would use this website to search for a specific item to target, such as a vulnerable VPN connection in NZ.
The problem is that you can tick yes to what you want on insurance forms thinking it is correct but if the worst happens and you claim, then if some of these ticks are not true then it could invalidate your insurance. Effectively you would have to then prove that what you stated on your insurance form was actually in place (which is hard to do in the middle of a cyber crisis) and if you can't prove this then technically you were insured on the wrong basis which may invalidate your insurance. So we would suggest getting your insurance form professionally assessed by an IT company.
No, the cloud is just another computer in another location. You need to contact your cloud provider to establish what measures they have in place to safeguard your data and ensure it is backed up too. The main way to protect your cloud is by putting MFA/2FA on every login to the cloud provider's system.