get2Clouds(R)

Cyber Threats To Your Business

2017-06-02
Company Data Security

Cloud computing has become the glue for companies which use BYOD (Bring Your Own Device), it gives employees the chance to work remotely and access company files from any location (which increases productivity), bringing the ability to connect to and manipulate corporate networks and assets through a laptop or smartphone. This, plus increasingly popular pieces of wearable tech and Internet of Things devices companies and their employees take to using, means there are always more places that cyber criminals can choose to target.

In the face of the rising likelihood of a cyber attack, businesses should look to test their cyber resilience as well as that of their suppliers in order to identify and secure vulnerabilities through which they might be targeted.

Security policies, tools and systems should be regularly reviewed, and employees should be schooled on cyber security to avoid a breach by way of human error through any access point, regardless of location or device. A particular focus on employees who use BYOD, both remotely and on site, will help to avoid attacks which may come in through unsecure networks, shoulder surfing or otherwise. If employees access company data through a cloud, ensure that the cloud is secured and data is encrypted; plus all staff should know company policy regarding files containing customer data, business secrets or other sensitive information so that such files can be stored and secured in the proper way.

Although it’s important to have inbound perimeter and intrusion protection, better still is to have a security posture of containment. Assuming a breach will happen and knowing how it will be controlled when it does happen ensures the least possible damage will be done to both firm and clientele.

When using get2Clouds® for file transfers or syncing with the cloud, not only will files be broken up so that ransomware, like the recent WannaCry attack, cannot detect the file type, but the state of the art encryption used means it can only be accessed with your password. In the event that a hacker gains access to the business cloud, they will not be able to read or use any data stored there because they will not be able to decrypt it.

Security Statistics

  • Small businesses are more likely to be targeted than big ones.
  • From 2015 to 2016 ransomware attacks increased by 300 percent.
  • People are more aware of cyber threats in 2017, but no change has been made to behaviour or preventative action taken.
  • Cyber security is still seen as solely an IT issue (it shouldn't be!).
  • 42% of businesses don’t have a data breach response plan.
  • 52% of companies fell victim to a cyber attack in 2016 have not changed their security since.
  • The average amount of time a hacker stays hidden on a network is 140 days (nearly 5 months).