SlideShare a Scribd company logo
1 of 40
Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
SERIES 4 : WEBINAR 2
FUTURE-PROOF YOUR BUSINESS
RECOVER
& RISE
SME DIGITAL
ACCELERATOR
STEPHANIE DANVERS
EVENTS & ENGAGEMENT LEAD
ALWAYS POSSIBLE
EMRYS GREEN
CLOUD ARTISANS
SERIES 1
GETTING ONLINE
SERIES 2
CUSTOMERS &
MARKETING
SERIES 3
SYSTEMS &
PRODUCTIVITY
SERIES 4
GROWTH & EXPANSION
Book your free places from four online digital series.
Workshops start at 12pm lunchtime.
ACTIVATE YOUR ONLINE.
Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
RECOVER
& RISE
SME DIGITAL
ACCELERATOR
Digital
Champions
Growth Hub
©2018 GET Consultants 4
© 2021 Coast to Capital
FREE digital support to drive small business success
• As an immediate follow up to the WSCC Recover & Rise Digital Accelerator
online workshops, the Coast to Capital Growth Hub provides fully funded
access to specialist digital business consultants.
• Attendees at any of these online workshops receive up to 8 hours of FREE
specialist support, fully funded by the Coast to Capital Growth Hub. You can
use any one of our seven-strong team of digital and business experts to help
you to implement the knowledge and ideas learnt from the webinars.
• Each Digital Champion offers a different blend of skills.
What do Digital Champions offer?
Ask Andrew all about
websites and CRMs, and
how to use Digital tech to
build stronger customer
relationships
Liaise with Lisa if you’re
looking to leverage Digital
Tech to improve productivity
and processes
Andrew Kerry-
Bedell
Lisa Kerr
For all things E-commerce
Malcolm is your Man
Reach out to Rachael, our
SEO expert, for support with
marketing plans and tactical
activity advice
Malcolm Duffitt Rachael Dines
5
Meet the Digital Champions (1)
Click here for more information on the Coast to Capital Digital Champions
Rendezvous with Rob who
can support your business
through the whole digital
transformation process
Reach out to Roya if you want
to utilise digital to accelerate
the growth of your business
by building your digital value
Rob Laurens Roya Croudace
Say hello to Susan if you are
seeking digitally focussed
product and/or service
related initiatives
Susan Winchester
6
Meet the Digital Champions (2)
Click here for more information on the Coast to Capital Digital Champions
©2018 GET Consultants 7
© 2021 Coast to Capital
• Use this Contact Form to request your preferred digital support or
• email growth.hub@coast2capital.org.uk with your:
• Name
• Contact details
• Postcode
• Area of expertise required or
• Leave a message on the office number on 01293 305965
One of our Growth Relationship Associates will then follow up with you to
discuss the support required, undertake a quick digital review, and signpost
you to an appropriate Digital Champion.
How to access Digital Champion support
Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
RECOVER & RISE SME DIGITAL ACCELERATOR - THIS SERIES
SERIES 4: GROWTH EXPANSION & NEW PRODUCTS
1: DIGITAL TOOLS FOR GROWTH
2: FUTURE-PROOF YOUR BUSINESS
3: TECHNOLOGY FOR GROWTH
4: BOOSTING PRODUCTIVITY
5: DIGITAL TOOLS FOR INNOVATION
6: TECH-DRIVEN GROWTH
7: Q&A, ASK THE EXPERTS AND NETWORKING
11TH JANUARY
13TH JANUARY
18TH JANUARY
20TH JANUARY
25TH JANUARY
27TH JANUARY
1ST FEBRUARY
Emrys Green FInstLM FRSA MIoD
How do I future-proof my business
in the digital world?
Some experience
● Associate with Always Possible
● Director of Cloud Artisans
● UK Youth Digital Hub Consultant
● Digital Associate with All Ways Making
● Technical Associate with Claritao & Converxion
● Apprenticeship Assessor (Inc Digital Marketing & Social Media)
● Board member of the Institute of Leadership & Management
● Steering Group member of a Digital Skills Partnership
● Institute of Directors branch committee
● Young Enterprise judge & business adviser
● Executive MBA
The next 80 minutes Some etiquette
Cyber security for growing businesses
Emerging technologies
The skills you need in your business
Your questions
Links (for reference)
Feel free to ‘raise your hand’ on Zoom if
you have a question or point of
clarification.
You can also make contributions on the
Zoom chat; perhaps a question, another
tool or useful organisation/product that
you want to share too.
When in a breakout – ensure everyone
has time to speak. You should try to limit
yourself to one key point/contribution at a
time.
Padlet time
https://padlet.com/emrys4/wscc
Cyber Security
Cyber Security
● “Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It
aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies”
● It is best to understand and reduce risks from cyber security threats.
● You can also take action to ensure you can recover quickly from problems (i.e. backups, isolated data sets, offline versions of key information, insurance
cover to help with the cost of investigation & recovery action).
Cyber Security - Threats
● Backdoors
○ Backdoors allow remote access to computers or systems without users’ knowledge.
● Formjacking
○ Formjacking is the process of inserting malicious JavaScript code into online payment forms to
harvest customers’ card details.
● Cryptojacking
○ Cryptojacking is the malicious installation of cryptocurrency mining – or ‘cryptomining’ –
software. This software illicitly harnesses the victim’s processing power to mine for
cryptocurrency.
● DDoS attacks
○ DDoS (distributed denial-of-service) attacks attempt to disrupt normal web traffic and take
targeted websites offline by flooding systems, servers or networks with more requests than
they can handle, causing them to crash.
Cyber Security - Threats
● DNS poisoning attacks
○ DNS (domain name system) poisoning attacks compromise DNS to redirect traffic to malicious
sites. Affected sites are not ‘hacked’ themselves.
● Phishing attacks
○ Phishing is a method of social engineering used to trick people into divulging sensitive or
confidential information, often via email. Not always easy to distinguish from genuine
messages, these scams can inflict enormous damage on organisations.
● Social engineering
○ Social engineering is used to deceive and manipulate victims to obtain information or gain
access to their computer.
○ This is achieved by tricking users into clicking malicious links or by physically gaining access to
a computer through deception.
Cyber Security - Threats
● MITM attacks
○ A MITM (man-in-the-middle) attack occurs when a criminal hacker inserts themselves between
a device and a server to intercept communications that can then be read and/or altered.
○ MITM attacks often happen when a user logs on to an insecure public Wi-Fi network. Attackers
can insert themselves between a visitor’s device and the network. The user will then
unknowingly pass information through the attacker.
● Exploits
○ An exploit is a piece of malicious code that can compromise a security vulnerability. Many have
been developed by the security services. For instance, in 2017 the WannaCry ransomware
spread using an exploit known as EternalBlue. This exploit had been created by and stolen
from the US National Security Agency.
● Drive-by downloads
○ Drive-by downloads install malware when victims visit a compromised or malicious website.
They don’t rely on unsuspecting users taking action, such as clicking malicious email
attachments or links, to infect them.
Cyber Security - Malware
Malware is a broad term used to describe any file or program intended to harm or disrupt a computer. This includes:
● Botnet software
○ Botnet software is designed to infect large numbers of Internet-connected devices. Some
botnets comprise millions of compromised machines, each using a relatively small amount of
processing power. This means it can be difficult to detect this type of malware, even when the
botnet is running.
● Ransomware attack
○ Ransomware is a form of malware that encrypts victims’ information and demands payment in
return for the decryption key. Paying a ransom does not necessarily guarantee that you will be
able to recover the encrypted data.
● Rootkits and bootkits
○ Rootkits comprise several malicious payloads, such as keyloggers, RATs and viruses, allowing
attackers remote access to targeted machines.
○ Bootkits are a type of rootkit that can infect start-up code – the software that loads before the
operating system.
Cyber Security - Malware
● RATs
○ RATs (remote-access Trojans) are malware that installs backdoors on targeted systems to give
remote access and/or administrative control to malicious users.
● Spyware
○ Spyware is a form of malware used to illicitly monitor a user’s computer activity and harvest
personal information.
● Trojan
○ A Trojan is a type of malware that disguises itself as legitimate software but performs malicious
activity when executed.
● Viruses and worms
○ A computer virus is a piece of malicious code that is installed without the user’s knowledge.
Viruses can replicate and spread to other computers by attaching themselves to other
computer files.
○ Worms are like viruses in that they are self-replicating. However, they do not need to attach
themselves to another program to do so.
Cyber Security – Practical Tips
● Keep your systems up to date and patched (Computers, servers, software, phones, apps)
● Use a firewall and virus scanning software on all systems
● Use and test backups regularly – local ‘Network attached storage’ is good as is a cloud backup service (like Livedrive, iCloud or Dropbox)
● Use a variety of passwords (a sentence structure can help) and multi-factor authentication (like Google Authenticator)
● Use a VPN if on a public network (like Private Internet Access or NordVPN)
Cyber Security – Practical Tips
● Consider how you keep records of data you store or process in the cloud
○ For example, keep an offline copy of every VAT return which means you have a copy of all
financial transactions from your accounting system…
○ And keep a copy of payslips, or received invoices etc.
● Don’t rely on suppliers claims for backups
○ Check the backups have been done / accessible (like with your hosting)
○ Download copies of backups periodically so you have offline versions
○ Set-up your own backup systems for key aspects – like daily emailed database backups or
bcc’ing a separate email account for key
● Consider insurance cover for cyber protection
Breakouts
https://padlet.com/emrys4/wscc
● 6 Minutes
● What is something you’ve learnt new about cyber security?
● Is there a question the group can help with?
● Add notes for your group to the padlet
Emerging Technologies
World Economic Forum –
Top 10 Emerging Technologies of 2021
1. Decarbonisation – With green energy
○ a radical expansion of photovoltaic, wind, hydroelectric, tidal, nuclear and other zero-emissions
technologies
2. Crops that self-fertilise
○ Root-grown instead of sown
3. Breath sensors diagnose diseases
○ Medical devices analyse breath instead of blood
4. On-demand drug manufacturing
○ Use microfluidics and portable equipment to create personalised drugs in local pharmacies
5. Energy from wireless signals
○ The internet of things could be powered by 5G or wifi signals. IOT is growing, wireless power
makes them even more portable or fully ‘wireless’.
World Economic Forum –
Top 10 Emerging Technologies of 2021
6. Engineering better ageing
○ A focus on increasing “healthspan”, not just lifespans – medical advancements identifying
‘markers’ for conditions and ways to ‘turn back’ the age process
7. Green ammonia
○ Reducing the CO2 footprint of fertiliser production which provides 50% of global food
production
8. Biomarker devices go wireless
○ Sensors built in to mouth guards or other devices that monitor and analyse sweat/saliva/blood
etc can detect health issues but also monitor things already diagnosed like diabetes.
9. Houses printed with local materials
○ Building houses with 3D printers using local materials like soils; reducing transportation and
enabling remote communities to build infrastructure.
10. Space connects the globe – IOT with nanosatellites
○ Over 10 billion devices make up the ‘Internet of things’, nanosatellites can receive and relay
data from IOT devices around the globe, allowing mass data processing and communications.
Emerging Technologies - Closer to home
● New generation GPS
○ Allowing more accurate ‘personal tracking’ and powering delivery and logistics tech
● Removal of analogue phone lines
○ Happening by 2025 but well in motion, everyone will be using VoIP
● Touchless / haptic technology
○ Touchless haptic technologies induce tactile sensations remotely, without the need to wear or
hold any controllers, or contact tactile displays.
● Battery electric vehicles
○ The major manufacturers are bringing out many options.
● Artificial Intelligence (AI)
○ Already powering lots of things – like Google Map’s journey time predictions and will power
self-driving cars. AI also powers chatbots, fraud prevention tools and shopping
recommendations.
Breakouts
https://padlet.com/emrys4/wscc
● 6 Minutes
● Is there an emerging technology that could help your business
thrive?
● Is there anything you can do soon which prepares you for
adopting future technology?
● Add notes for your group to the padlet
Skills
Skills – Industry 4.0
Skills
● You don’t just need programmers; in fact you may not need coders at all.
● You need people with the skills to seamlessly use products and platforms.
● You need those who can plan and connect technologies and skills.
● You may need highly experienced people, or you could utilise well skilled recent graduates or young people to help drive your business forward.
Skills
● Match the skills to the tools
○ Do you need an enterprise network architect?
Or someone who can configure a software
interface?
● Match the tools to the skills
○ Low code/no code solutions can be helpful. But
if you can have the power of being able to use
a level of code to achieve effectiveness,
possibly in less time, then consider it.
● Could it be cheaper, easier and more effective to outsource any of it?
Skills – its not all tech that’s in demand
● Coding, programming and infrastructure management
● Creative thinking
● People management
● Engineering
● Fintech / data analytics
● Scientific exploration (especially health & life sciences)
Skills – ask yourself
● What technology and digital skills do you need in your business?
● Have you considered a skills audit of your staff?
○ Identifying the technology and digital skills gaps will help you to plan your recruitment needs
○ If it’s not appropriate to have in-house resource, who might you partner with to provide these?
● Have you considered utilising University consultancy or graduate placement opportunities?
○ These are opportunities to get high talent for short periods of time, usually cost effective (and
sometimes free)
○ They can also lead to longer term staff for you
● What are the wider skills people need for your business? Like critical and creative thinking, people management skills or a solutions focussed mindset?
Links
Links to some helpful tools
● Network Attached Storage (for backups)
○ seagate.com/gb/en/products/nas-drives
● Cloud Backup solutions
○ Computers: Dropbox.com / livedrive.com
○ iOS: icloud.com & Android: support.google.com/android/answer/2819582
● Multi-factor authentications:
○ Google Authenticator: support.google.com/accounts/answer/1066447
○ 1Password (also a password manager): support.1password.com/one-time-passwords
● VPN’s:
○ Private Internet Access - privateinternetaccess.com
○ NordVPN - nordvpn.com
LinkedIn: Emrys Green
Email: emrys@alwayspossible.co.uk
Your Questions ● Anything else you still need to know?
Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
RECOVER & RISE SME DIGITAL ACCELERATOR - UPCOMING
WEBINARS
BOOK YOUR PLACE NOW @ https://bit.ly/WSCC_RR_2021

More Related Content

What's hot

Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSFidelis Cybersecurity
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce CyberRecruit
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19Emile Sayegh
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Chris Hails
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantHaltdos
 

What's hot (20)

Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19The Great Disruption No One Planned For: COVID-19
The Great Disruption No One Planned For: COVID-19
 
CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
CERT Certification
CERT CertificationCERT Certification
CERT Certification
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
CTI Report
CTI ReportCTI Report
CTI Report
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 

Similar to Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain

Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxsomi12
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service providerVishvendra Saini
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
Detecon Cyber Security Radar
Detecon Cyber Security RadarDetecon Cyber Security Radar
Detecon Cyber Security RadarDaniel Steinfeld
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 

Similar to Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain (20)

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Detecon Cyber Security Radar
Detecon Cyber Security RadarDetecon Cyber Security Radar
Detecon Cyber Security Radar
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Opi cyber talk for executives
Opi cyber talk for executivesOpi cyber talk for executives
Opi cyber talk for executives
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain

  • 1. Brought to you by West Sussex local authorities and supported by Coast to Capital LEP RECOVER & RISE SME DIGITAL ACCELERATOR SERIES 4 : WEBINAR 2 FUTURE-PROOF YOUR BUSINESS RECOVER & RISE SME DIGITAL ACCELERATOR STEPHANIE DANVERS EVENTS & ENGAGEMENT LEAD ALWAYS POSSIBLE EMRYS GREEN CLOUD ARTISANS
  • 2. SERIES 1 GETTING ONLINE SERIES 2 CUSTOMERS & MARKETING SERIES 3 SYSTEMS & PRODUCTIVITY SERIES 4 GROWTH & EXPANSION Book your free places from four online digital series. Workshops start at 12pm lunchtime. ACTIVATE YOUR ONLINE. Brought to you by West Sussex local authorities and supported by Coast to Capital LEP RECOVER & RISE SME DIGITAL ACCELERATOR RECOVER & RISE SME DIGITAL ACCELERATOR
  • 4. ©2018 GET Consultants 4 © 2021 Coast to Capital FREE digital support to drive small business success • As an immediate follow up to the WSCC Recover & Rise Digital Accelerator online workshops, the Coast to Capital Growth Hub provides fully funded access to specialist digital business consultants. • Attendees at any of these online workshops receive up to 8 hours of FREE specialist support, fully funded by the Coast to Capital Growth Hub. You can use any one of our seven-strong team of digital and business experts to help you to implement the knowledge and ideas learnt from the webinars. • Each Digital Champion offers a different blend of skills. What do Digital Champions offer?
  • 5. Ask Andrew all about websites and CRMs, and how to use Digital tech to build stronger customer relationships Liaise with Lisa if you’re looking to leverage Digital Tech to improve productivity and processes Andrew Kerry- Bedell Lisa Kerr For all things E-commerce Malcolm is your Man Reach out to Rachael, our SEO expert, for support with marketing plans and tactical activity advice Malcolm Duffitt Rachael Dines 5 Meet the Digital Champions (1) Click here for more information on the Coast to Capital Digital Champions
  • 6. Rendezvous with Rob who can support your business through the whole digital transformation process Reach out to Roya if you want to utilise digital to accelerate the growth of your business by building your digital value Rob Laurens Roya Croudace Say hello to Susan if you are seeking digitally focussed product and/or service related initiatives Susan Winchester 6 Meet the Digital Champions (2) Click here for more information on the Coast to Capital Digital Champions
  • 7. ©2018 GET Consultants 7 © 2021 Coast to Capital • Use this Contact Form to request your preferred digital support or • email growth.hub@coast2capital.org.uk with your: • Name • Contact details • Postcode • Area of expertise required or • Leave a message on the office number on 01293 305965 One of our Growth Relationship Associates will then follow up with you to discuss the support required, undertake a quick digital review, and signpost you to an appropriate Digital Champion. How to access Digital Champion support
  • 8. Brought to you by West Sussex local authorities and supported by Coast to Capital LEP RECOVER & RISE SME DIGITAL ACCELERATOR RECOVER & RISE SME DIGITAL ACCELERATOR - THIS SERIES SERIES 4: GROWTH EXPANSION & NEW PRODUCTS 1: DIGITAL TOOLS FOR GROWTH 2: FUTURE-PROOF YOUR BUSINESS 3: TECHNOLOGY FOR GROWTH 4: BOOSTING PRODUCTIVITY 5: DIGITAL TOOLS FOR INNOVATION 6: TECH-DRIVEN GROWTH 7: Q&A, ASK THE EXPERTS AND NETWORKING 11TH JANUARY 13TH JANUARY 18TH JANUARY 20TH JANUARY 25TH JANUARY 27TH JANUARY 1ST FEBRUARY
  • 9. Emrys Green FInstLM FRSA MIoD How do I future-proof my business in the digital world?
  • 10. Some experience ● Associate with Always Possible ● Director of Cloud Artisans ● UK Youth Digital Hub Consultant ● Digital Associate with All Ways Making ● Technical Associate with Claritao & Converxion ● Apprenticeship Assessor (Inc Digital Marketing & Social Media) ● Board member of the Institute of Leadership & Management ● Steering Group member of a Digital Skills Partnership ● Institute of Directors branch committee ● Young Enterprise judge & business adviser ● Executive MBA
  • 11. The next 80 minutes Some etiquette Cyber security for growing businesses Emerging technologies The skills you need in your business Your questions Links (for reference) Feel free to ‘raise your hand’ on Zoom if you have a question or point of clarification. You can also make contributions on the Zoom chat; perhaps a question, another tool or useful organisation/product that you want to share too. When in a breakout – ensure everyone has time to speak. You should try to limit yourself to one key point/contribution at a time.
  • 14. Cyber Security ● “Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies” ● It is best to understand and reduce risks from cyber security threats. ● You can also take action to ensure you can recover quickly from problems (i.e. backups, isolated data sets, offline versions of key information, insurance cover to help with the cost of investigation & recovery action).
  • 15. Cyber Security - Threats ● Backdoors ○ Backdoors allow remote access to computers or systems without users’ knowledge. ● Formjacking ○ Formjacking is the process of inserting malicious JavaScript code into online payment forms to harvest customers’ card details. ● Cryptojacking ○ Cryptojacking is the malicious installation of cryptocurrency mining – or ‘cryptomining’ – software. This software illicitly harnesses the victim’s processing power to mine for cryptocurrency. ● DDoS attacks ○ DDoS (distributed denial-of-service) attacks attempt to disrupt normal web traffic and take targeted websites offline by flooding systems, servers or networks with more requests than they can handle, causing them to crash.
  • 16. Cyber Security - Threats ● DNS poisoning attacks ○ DNS (domain name system) poisoning attacks compromise DNS to redirect traffic to malicious sites. Affected sites are not ‘hacked’ themselves. ● Phishing attacks ○ Phishing is a method of social engineering used to trick people into divulging sensitive or confidential information, often via email. Not always easy to distinguish from genuine messages, these scams can inflict enormous damage on organisations. ● Social engineering ○ Social engineering is used to deceive and manipulate victims to obtain information or gain access to their computer. ○ This is achieved by tricking users into clicking malicious links or by physically gaining access to a computer through deception.
  • 17. Cyber Security - Threats ● MITM attacks ○ A MITM (man-in-the-middle) attack occurs when a criminal hacker inserts themselves between a device and a server to intercept communications that can then be read and/or altered. ○ MITM attacks often happen when a user logs on to an insecure public Wi-Fi network. Attackers can insert themselves between a visitor’s device and the network. The user will then unknowingly pass information through the attacker. ● Exploits ○ An exploit is a piece of malicious code that can compromise a security vulnerability. Many have been developed by the security services. For instance, in 2017 the WannaCry ransomware spread using an exploit known as EternalBlue. This exploit had been created by and stolen from the US National Security Agency. ● Drive-by downloads ○ Drive-by downloads install malware when victims visit a compromised or malicious website. They don’t rely on unsuspecting users taking action, such as clicking malicious email attachments or links, to infect them.
  • 18. Cyber Security - Malware Malware is a broad term used to describe any file or program intended to harm or disrupt a computer. This includes: ● Botnet software ○ Botnet software is designed to infect large numbers of Internet-connected devices. Some botnets comprise millions of compromised machines, each using a relatively small amount of processing power. This means it can be difficult to detect this type of malware, even when the botnet is running. ● Ransomware attack ○ Ransomware is a form of malware that encrypts victims’ information and demands payment in return for the decryption key. Paying a ransom does not necessarily guarantee that you will be able to recover the encrypted data. ● Rootkits and bootkits ○ Rootkits comprise several malicious payloads, such as keyloggers, RATs and viruses, allowing attackers remote access to targeted machines. ○ Bootkits are a type of rootkit that can infect start-up code – the software that loads before the operating system.
  • 19. Cyber Security - Malware ● RATs ○ RATs (remote-access Trojans) are malware that installs backdoors on targeted systems to give remote access and/or administrative control to malicious users. ● Spyware ○ Spyware is a form of malware used to illicitly monitor a user’s computer activity and harvest personal information. ● Trojan ○ A Trojan is a type of malware that disguises itself as legitimate software but performs malicious activity when executed. ● Viruses and worms ○ A computer virus is a piece of malicious code that is installed without the user’s knowledge. Viruses can replicate and spread to other computers by attaching themselves to other computer files. ○ Worms are like viruses in that they are self-replicating. However, they do not need to attach themselves to another program to do so.
  • 20. Cyber Security – Practical Tips ● Keep your systems up to date and patched (Computers, servers, software, phones, apps) ● Use a firewall and virus scanning software on all systems ● Use and test backups regularly – local ‘Network attached storage’ is good as is a cloud backup service (like Livedrive, iCloud or Dropbox) ● Use a variety of passwords (a sentence structure can help) and multi-factor authentication (like Google Authenticator) ● Use a VPN if on a public network (like Private Internet Access or NordVPN)
  • 21. Cyber Security – Practical Tips ● Consider how you keep records of data you store or process in the cloud ○ For example, keep an offline copy of every VAT return which means you have a copy of all financial transactions from your accounting system… ○ And keep a copy of payslips, or received invoices etc. ● Don’t rely on suppliers claims for backups ○ Check the backups have been done / accessible (like with your hosting) ○ Download copies of backups periodically so you have offline versions ○ Set-up your own backup systems for key aspects – like daily emailed database backups or bcc’ing a separate email account for key ● Consider insurance cover for cyber protection
  • 22. Breakouts https://padlet.com/emrys4/wscc ● 6 Minutes ● What is something you’ve learnt new about cyber security? ● Is there a question the group can help with? ● Add notes for your group to the padlet
  • 24.
  • 25.
  • 26. World Economic Forum – Top 10 Emerging Technologies of 2021 1. Decarbonisation – With green energy ○ a radical expansion of photovoltaic, wind, hydroelectric, tidal, nuclear and other zero-emissions technologies 2. Crops that self-fertilise ○ Root-grown instead of sown 3. Breath sensors diagnose diseases ○ Medical devices analyse breath instead of blood 4. On-demand drug manufacturing ○ Use microfluidics and portable equipment to create personalised drugs in local pharmacies 5. Energy from wireless signals ○ The internet of things could be powered by 5G or wifi signals. IOT is growing, wireless power makes them even more portable or fully ‘wireless’.
  • 27. World Economic Forum – Top 10 Emerging Technologies of 2021 6. Engineering better ageing ○ A focus on increasing “healthspan”, not just lifespans – medical advancements identifying ‘markers’ for conditions and ways to ‘turn back’ the age process 7. Green ammonia ○ Reducing the CO2 footprint of fertiliser production which provides 50% of global food production 8. Biomarker devices go wireless ○ Sensors built in to mouth guards or other devices that monitor and analyse sweat/saliva/blood etc can detect health issues but also monitor things already diagnosed like diabetes. 9. Houses printed with local materials ○ Building houses with 3D printers using local materials like soils; reducing transportation and enabling remote communities to build infrastructure. 10. Space connects the globe – IOT with nanosatellites ○ Over 10 billion devices make up the ‘Internet of things’, nanosatellites can receive and relay data from IOT devices around the globe, allowing mass data processing and communications.
  • 28. Emerging Technologies - Closer to home ● New generation GPS ○ Allowing more accurate ‘personal tracking’ and powering delivery and logistics tech ● Removal of analogue phone lines ○ Happening by 2025 but well in motion, everyone will be using VoIP ● Touchless / haptic technology ○ Touchless haptic technologies induce tactile sensations remotely, without the need to wear or hold any controllers, or contact tactile displays. ● Battery electric vehicles ○ The major manufacturers are bringing out many options. ● Artificial Intelligence (AI) ○ Already powering lots of things – like Google Map’s journey time predictions and will power self-driving cars. AI also powers chatbots, fraud prevention tools and shopping recommendations.
  • 29. Breakouts https://padlet.com/emrys4/wscc ● 6 Minutes ● Is there an emerging technology that could help your business thrive? ● Is there anything you can do soon which prepares you for adopting future technology? ● Add notes for your group to the padlet
  • 32. Skills ● You don’t just need programmers; in fact you may not need coders at all. ● You need people with the skills to seamlessly use products and platforms. ● You need those who can plan and connect technologies and skills. ● You may need highly experienced people, or you could utilise well skilled recent graduates or young people to help drive your business forward.
  • 33. Skills ● Match the skills to the tools ○ Do you need an enterprise network architect? Or someone who can configure a software interface? ● Match the tools to the skills ○ Low code/no code solutions can be helpful. But if you can have the power of being able to use a level of code to achieve effectiveness, possibly in less time, then consider it. ● Could it be cheaper, easier and more effective to outsource any of it?
  • 34. Skills – its not all tech that’s in demand ● Coding, programming and infrastructure management ● Creative thinking ● People management ● Engineering ● Fintech / data analytics ● Scientific exploration (especially health & life sciences)
  • 35. Skills – ask yourself ● What technology and digital skills do you need in your business? ● Have you considered a skills audit of your staff? ○ Identifying the technology and digital skills gaps will help you to plan your recruitment needs ○ If it’s not appropriate to have in-house resource, who might you partner with to provide these? ● Have you considered utilising University consultancy or graduate placement opportunities? ○ These are opportunities to get high talent for short periods of time, usually cost effective (and sometimes free) ○ They can also lead to longer term staff for you ● What are the wider skills people need for your business? Like critical and creative thinking, people management skills or a solutions focussed mindset?
  • 36. Links
  • 37. Links to some helpful tools ● Network Attached Storage (for backups) ○ seagate.com/gb/en/products/nas-drives ● Cloud Backup solutions ○ Computers: Dropbox.com / livedrive.com ○ iOS: icloud.com & Android: support.google.com/android/answer/2819582 ● Multi-factor authentications: ○ Google Authenticator: support.google.com/accounts/answer/1066447 ○ 1Password (also a password manager): support.1password.com/one-time-passwords ● VPN’s: ○ Private Internet Access - privateinternetaccess.com ○ NordVPN - nordvpn.com
  • 38. LinkedIn: Emrys Green Email: emrys@alwayspossible.co.uk
  • 39. Your Questions ● Anything else you still need to know?
  • 40. Brought to you by West Sussex local authorities and supported by Coast to Capital LEP RECOVER & RISE SME DIGITAL ACCELERATOR RECOVER & RISE SME DIGITAL ACCELERATOR - UPCOMING WEBINARS BOOK YOUR PLACE NOW @ https://bit.ly/WSCC_RR_2021