SlideShare a Scribd company logo
1 of 1
Download to read offline
57| The Bugle | Autumn 2016www.balsallbugle.com Facebook.com/balsallbugle twitter.com/balsallbugle (@balsallbugle)
IN BUSINESS
Amanda
Cruxton-Chance
Is your company 'cyber savvy?'
Young or old virtually everyone uses the internet these days. It's a part of modern day
society with clients using it to run their business and friends to communicate. But what
would you do if you fell victim to cyber-crime? Here AMANDA CRUXTON-CHANCE of
Balsall Common-based business development company Flourish, explains what to do
if your business is attacked…
The mere thought can be enough to bring on
a cold sweat and panic. The loss of data,
time spent trying to recoup it let alone that
feeling of being duped.
While the world wide web offers many
benefits it also poses potential risks. It is
reported by the National Federation of Small
Businesses that 42 per cent of businesses
have been victim of cyber-crime in the last
12 months.
So as a business what should you be aware
of and how can you help protect yourself
against an ‘attack?’
Adopting a simple risk management
approach - that of plan, implement and
review - will help protect your assets, your
reputation and bring peace of mind.
First off what is at risk? Well, your IT based
information will come in many forms
including client lists, databases, financial
data, product designs, business processes.
There is a risk to the business no matter
where they are held or stored.
Planning - Identify the financial and
information assets that are critical to your
business. Assess the equipment used in your
business e.g. mobiles, tablets, PCs. Assess
the level of password protection needed, and
ensure staff are aware of the risks and their
role in keeping the business safe. You may
need external specialist support to get the
right security controls in place. Consider who
or where you would turn in the event of an
attack. Have a plan.
Implement - ensure you have the
appropriate security controls in place. install
anti-virus solutions and keep web browsers
up to date. Consider restricting levels of
access to websites to lessen the risk. Use
firewalls and increase the protection of your
network including your wireless connections.
If staff work from home, ensure data is
encrypted when stored or retrieved. Restrict
the use of plug-in devices such as USB
sticks, external drivers. You could consider
monitoring the use of business equipment
and IT systems too by
collecting activity logs.
Review - test, monitor and improve where
necessary your security controls on a
frequent basis. Remove any IT equipment no
longer in use and first ensure the
information it contains is disposed of. If you
were burgled, you’d change your house keys
wouldn’t you so similarly review and manage
access levels as members of staff leave or
join the business.
All of these steps will help and in the
unfortunate event that you are ‘attacked’
then report the incident to the police via the
Action Fraud website and consider informing
customers and suppliers if data could have
been compromised.
*As a reader of The Bugle, Flourish offers a
no obligation consultation (up to one hour)
for local businesses. Visit the website
www.flourishbd.com for more information.
James Langton and his 'Snowsports Recovery Vehicle' design
By SAM COOPER
The outstanding design work of James Langton from Balsall Common
has been recognised after he became one of only 12 finalists in the
Steve Olney Memorial Awards.
The awards, funded by design and engineering company Contechs, are
held annually at the Warwickshire Golf and Country Club in memory of
one of the company’s founders, showcasing the best of Coventry
University’s School of Art and Design.
James, a recent
graduate of the
university with a
First Class Degree
in automotive
design, received
high praise for his
designs for a
modular Snow-
Sports Rescue
Vehicle, which he
created using
computer aided
design (CAD)
software Alias
Automotive and
Keyshot 5.
James’ designs have also been featured in the New Designers show at
London’s Business Design Centre and he is currently working as a
modeller for Concept Group International in Coventry.
He is also available for freelance Alias Automotive modelling work.
James said: “It was amazing to be selected as a finalist along with 11
very strong projects and talented designers; it was a fantastic event to
be a part of.”
The event gave both fellow designers and prospective employers the
chance to explore the best of Coventry’s newest graduates.
*James’ email address is jdlangton@btinternet.com,
and he is available for freelance work.
Designs on the future

More Related Content

Similar to Is your business cyber savvy

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 

Similar to Is your business cyber savvy (20)

Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
b-ciodigest_apr13.en-us
b-ciodigest_apr13.en-usb-ciodigest_apr13.en-us
b-ciodigest_apr13.en-us
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
 
Small Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All CloudSmall Business Technology Trends: And They Are All Cloud
Small Business Technology Trends: And They Are All Cloud
 
Inmaa Solutions profile
Inmaa Solutions profileInmaa Solutions profile
Inmaa Solutions profile
 
Making Artificial Intelligence Work in Managing Change
Making Artificial Intelligence Work in Managing ChangeMaking Artificial Intelligence Work in Managing Change
Making Artificial Intelligence Work in Managing Change
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Scr Tims
Scr TimsScr Tims
Scr Tims
 
Cisco best practices connecting manufaturing
Cisco best practices connecting manufaturingCisco best practices connecting manufaturing
Cisco best practices connecting manufaturing
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdf
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Gurudev Goud SAP-Digital Leader-Sales-Marketing-2017
Gurudev Goud SAP-Digital Leader-Sales-Marketing-2017Gurudev Goud SAP-Digital Leader-Sales-Marketing-2017
Gurudev Goud SAP-Digital Leader-Sales-Marketing-2017
 
Big data for cybersecurity - skilledfield slides - 25032021
Big data for cybersecurity - skilledfield slides - 25032021Big data for cybersecurity - skilledfield slides - 25032021
Big data for cybersecurity - skilledfield slides - 25032021
 
Computers & Technology Articles | ArticleBiz.com
Computers & Technology Articles | ArticleBiz.comComputers & Technology Articles | ArticleBiz.com
Computers & Technology Articles | ArticleBiz.com
 
2023 Top 10 Trends for Business, Data and Analysis
2023 Top 10 Trends for Business, Data and Analysis2023 Top 10 Trends for Business, Data and Analysis
2023 Top 10 Trends for Business, Data and Analysis
 
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
 
Mi0039 e-commerce
Mi0039  e-commerceMi0039  e-commerce
Mi0039 e-commerce
 

Recently uploaded

Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
ZurliaSoop
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Smartinfologiks
 

Recently uploaded (12)

How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i template
 
Amethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfAmethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdf
 
Embracing the Virtual Workforce: Remote Companies Hiring Now
Embracing the Virtual Workforce: Remote Companies Hiring NowEmbracing the Virtual Workforce: Remote Companies Hiring Now
Embracing the Virtual Workforce: Remote Companies Hiring Now
 
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
 
Expanding Horizons: Hiring Remote Employees across State Lines
Expanding Horizons: Hiring Remote Employees across State LinesExpanding Horizons: Hiring Remote Employees across State Lines
Expanding Horizons: Hiring Remote Employees across State Lines
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
 
Supply Chain Location Decision and Management
Supply Chain Location Decision and ManagementSupply Chain Location Decision and Management
Supply Chain Location Decision and Management
 
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCCARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptx
 
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSESEXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
 
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIESPEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
 

Is your business cyber savvy

  • 1. 57| The Bugle | Autumn 2016www.balsallbugle.com Facebook.com/balsallbugle twitter.com/balsallbugle (@balsallbugle) IN BUSINESS Amanda Cruxton-Chance Is your company 'cyber savvy?' Young or old virtually everyone uses the internet these days. It's a part of modern day society with clients using it to run their business and friends to communicate. But what would you do if you fell victim to cyber-crime? Here AMANDA CRUXTON-CHANCE of Balsall Common-based business development company Flourish, explains what to do if your business is attacked… The mere thought can be enough to bring on a cold sweat and panic. The loss of data, time spent trying to recoup it let alone that feeling of being duped. While the world wide web offers many benefits it also poses potential risks. It is reported by the National Federation of Small Businesses that 42 per cent of businesses have been victim of cyber-crime in the last 12 months. So as a business what should you be aware of and how can you help protect yourself against an ‘attack?’ Adopting a simple risk management approach - that of plan, implement and review - will help protect your assets, your reputation and bring peace of mind. First off what is at risk? Well, your IT based information will come in many forms including client lists, databases, financial data, product designs, business processes. There is a risk to the business no matter where they are held or stored. Planning - Identify the financial and information assets that are critical to your business. Assess the equipment used in your business e.g. mobiles, tablets, PCs. Assess the level of password protection needed, and ensure staff are aware of the risks and their role in keeping the business safe. You may need external specialist support to get the right security controls in place. Consider who or where you would turn in the event of an attack. Have a plan. Implement - ensure you have the appropriate security controls in place. install anti-virus solutions and keep web browsers up to date. Consider restricting levels of access to websites to lessen the risk. Use firewalls and increase the protection of your network including your wireless connections. If staff work from home, ensure data is encrypted when stored or retrieved. Restrict the use of plug-in devices such as USB sticks, external drivers. You could consider monitoring the use of business equipment and IT systems too by collecting activity logs. Review - test, monitor and improve where necessary your security controls on a frequent basis. Remove any IT equipment no longer in use and first ensure the information it contains is disposed of. If you were burgled, you’d change your house keys wouldn’t you so similarly review and manage access levels as members of staff leave or join the business. All of these steps will help and in the unfortunate event that you are ‘attacked’ then report the incident to the police via the Action Fraud website and consider informing customers and suppliers if data could have been compromised. *As a reader of The Bugle, Flourish offers a no obligation consultation (up to one hour) for local businesses. Visit the website www.flourishbd.com for more information. James Langton and his 'Snowsports Recovery Vehicle' design By SAM COOPER The outstanding design work of James Langton from Balsall Common has been recognised after he became one of only 12 finalists in the Steve Olney Memorial Awards. The awards, funded by design and engineering company Contechs, are held annually at the Warwickshire Golf and Country Club in memory of one of the company’s founders, showcasing the best of Coventry University’s School of Art and Design. James, a recent graduate of the university with a First Class Degree in automotive design, received high praise for his designs for a modular Snow- Sports Rescue Vehicle, which he created using computer aided design (CAD) software Alias Automotive and Keyshot 5. James’ designs have also been featured in the New Designers show at London’s Business Design Centre and he is currently working as a modeller for Concept Group International in Coventry. He is also available for freelance Alias Automotive modelling work. James said: “It was amazing to be selected as a finalist along with 11 very strong projects and talented designers; it was a fantastic event to be a part of.” The event gave both fellow designers and prospective employers the chance to explore the best of Coventry’s newest graduates. *James’ email address is jdlangton@btinternet.com, and he is available for freelance work. Designs on the future