Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain
Infographic - Why DDoS Mitigation Solutions are important
Similar to Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
Similar to Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain (20)
Here are some additional practical tips for cyber security:- Enable login alerts and two-factor authentication for all important online accounts. This adds an extra layer of security beyond just a password.- Use a password manager to generate and store strong, unique passwords for each account. Don't reuse the same password across multiple sites. - Be wary of phishing emails and only click links or open attachments from known, trusted senders. Hover over links to check the URL before clicking.- Keep software up-to-date, including apps, browsers and operating systems. Updates often include important security patches.- Use an ad blocker in your browser to prevent malicious ads from loading. Some ads can contain
1. Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
SERIES 4 : WEBINAR 2
FUTURE-PROOF YOUR BUSINESS
RECOVER
& RISE
SME DIGITAL
ACCELERATOR
STEPHANIE DANVERS
EVENTS & ENGAGEMENT LEAD
ALWAYS POSSIBLE
EMRYS GREEN
CLOUD ARTISANS
2. SERIES 1
GETTING ONLINE
SERIES 2
CUSTOMERS &
MARKETING
SERIES 3
SYSTEMS &
PRODUCTIVITY
SERIES 4
GROWTH & EXPANSION
Book your free places from four online digital series.
Workshops start at 12pm lunchtime.
ACTIVATE YOUR ONLINE.
Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
RECOVER
& RISE
SME DIGITAL
ACCELERATOR
5. Ask Andrew all about
websites and CRMs, and
how to use Digital tech to
build stronger customer
relationships
Liaise with Lisa if you’re
looking to leverage Digital
Tech to improve productivity
and processes
Andrew Kerry-
Bedell
Lisa Kerr
For all things E-commerce
Malcolm is your Man
Reach out to Rachael, our
SEO expert, for support with
marketing plans and tactical
activity advice
Malcolm Duffitt Rachael Dines
5
Meet the Digital Champions (1)
Click here for more information on the Coast to Capital Digital Champions
6. Rendezvous with Rob who
can support your business
through the whole digital
transformation process
Reach out to Roya if you want
to utilise digital to accelerate
the growth of your business
by building your digital value
Rob Laurens Roya Croudace
Say hello to Susan if you are
seeking digitally focussed
product and/or service
related initiatives
Susan Winchester
6
Meet the Digital Champions (2)
Click here for more information on the Coast to Capital Digital Champions
8. Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
RECOVER & RISE SME DIGITAL ACCELERATOR - THIS SERIES
SERIES 4: GROWTH EXPANSION & NEW PRODUCTS
1: DIGITAL TOOLS FOR GROWTH
2: FUTURE-PROOF YOUR BUSINESS
3: TECHNOLOGY FOR GROWTH
4: BOOSTING PRODUCTIVITY
5: DIGITAL TOOLS FOR INNOVATION
6: TECH-DRIVEN GROWTH
7: Q&A, ASK THE EXPERTS AND NETWORKING
11TH JANUARY
13TH JANUARY
18TH JANUARY
20TH JANUARY
25TH JANUARY
27TH JANUARY
1ST FEBRUARY
9. Emrys Green FInstLM FRSA MIoD
How do I future-proof my business
in the digital world?
10. Some experience
● Associate with Always Possible
● Director of Cloud Artisans
● UK Youth Digital Hub Consultant
● Digital Associate with All Ways Making
● Technical Associate with Claritao & Converxion
● Apprenticeship Assessor (Inc Digital Marketing & Social Media)
● Board member of the Institute of Leadership & Management
● Steering Group member of a Digital Skills Partnership
● Institute of Directors branch committee
● Young Enterprise judge & business adviser
● Executive MBA
11. The next 80 minutes Some etiquette
Cyber security for growing businesses
Emerging technologies
The skills you need in your business
Your questions
Links (for reference)
Feel free to ‘raise your hand’ on Zoom if
you have a question or point of
clarification.
You can also make contributions on the
Zoom chat; perhaps a question, another
tool or useful organisation/product that
you want to share too.
When in a breakout – ensure everyone
has time to speak. You should try to limit
yourself to one key point/contribution at a
time.
14. Cyber Security
● “Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It
aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies”
● It is best to understand and reduce risks from cyber security threats.
● You can also take action to ensure you can recover quickly from problems (i.e. backups, isolated data sets, offline versions of key information, insurance
cover to help with the cost of investigation & recovery action).
15. Cyber Security - Threats
● Backdoors
○ Backdoors allow remote access to computers or systems without users’ knowledge.
● Formjacking
○ Formjacking is the process of inserting malicious JavaScript code into online payment forms to
harvest customers’ card details.
● Cryptojacking
○ Cryptojacking is the malicious installation of cryptocurrency mining – or ‘cryptomining’ –
software. This software illicitly harnesses the victim’s processing power to mine for
cryptocurrency.
● DDoS attacks
○ DDoS (distributed denial-of-service) attacks attempt to disrupt normal web traffic and take
targeted websites offline by flooding systems, servers or networks with more requests than
they can handle, causing them to crash.
16. Cyber Security - Threats
● DNS poisoning attacks
○ DNS (domain name system) poisoning attacks compromise DNS to redirect traffic to malicious
sites. Affected sites are not ‘hacked’ themselves.
● Phishing attacks
○ Phishing is a method of social engineering used to trick people into divulging sensitive or
confidential information, often via email. Not always easy to distinguish from genuine
messages, these scams can inflict enormous damage on organisations.
● Social engineering
○ Social engineering is used to deceive and manipulate victims to obtain information or gain
access to their computer.
○ This is achieved by tricking users into clicking malicious links or by physically gaining access to
a computer through deception.
17. Cyber Security - Threats
● MITM attacks
○ A MITM (man-in-the-middle) attack occurs when a criminal hacker inserts themselves between
a device and a server to intercept communications that can then be read and/or altered.
○ MITM attacks often happen when a user logs on to an insecure public Wi-Fi network. Attackers
can insert themselves between a visitor’s device and the network. The user will then
unknowingly pass information through the attacker.
● Exploits
○ An exploit is a piece of malicious code that can compromise a security vulnerability. Many have
been developed by the security services. For instance, in 2017 the WannaCry ransomware
spread using an exploit known as EternalBlue. This exploit had been created by and stolen
from the US National Security Agency.
● Drive-by downloads
○ Drive-by downloads install malware when victims visit a compromised or malicious website.
They don’t rely on unsuspecting users taking action, such as clicking malicious email
attachments or links, to infect them.
18. Cyber Security - Malware
Malware is a broad term used to describe any file or program intended to harm or disrupt a computer. This includes:
● Botnet software
○ Botnet software is designed to infect large numbers of Internet-connected devices. Some
botnets comprise millions of compromised machines, each using a relatively small amount of
processing power. This means it can be difficult to detect this type of malware, even when the
botnet is running.
● Ransomware attack
○ Ransomware is a form of malware that encrypts victims’ information and demands payment in
return for the decryption key. Paying a ransom does not necessarily guarantee that you will be
able to recover the encrypted data.
● Rootkits and bootkits
○ Rootkits comprise several malicious payloads, such as keyloggers, RATs and viruses, allowing
attackers remote access to targeted machines.
○ Bootkits are a type of rootkit that can infect start-up code – the software that loads before the
operating system.
19. Cyber Security - Malware
● RATs
○ RATs (remote-access Trojans) are malware that installs backdoors on targeted systems to give
remote access and/or administrative control to malicious users.
● Spyware
○ Spyware is a form of malware used to illicitly monitor a user’s computer activity and harvest
personal information.
● Trojan
○ A Trojan is a type of malware that disguises itself as legitimate software but performs malicious
activity when executed.
● Viruses and worms
○ A computer virus is a piece of malicious code that is installed without the user’s knowledge.
Viruses can replicate and spread to other computers by attaching themselves to other
computer files.
○ Worms are like viruses in that they are self-replicating. However, they do not need to attach
themselves to another program to do so.
20. Cyber Security – Practical Tips
● Keep your systems up to date and patched (Computers, servers, software, phones, apps)
● Use a firewall and virus scanning software on all systems
● Use and test backups regularly – local ‘Network attached storage’ is good as is a cloud backup service (like Livedrive, iCloud or Dropbox)
● Use a variety of passwords (a sentence structure can help) and multi-factor authentication (like Google Authenticator)
● Use a VPN if on a public network (like Private Internet Access or NordVPN)
21. Cyber Security – Practical Tips
● Consider how you keep records of data you store or process in the cloud
○ For example, keep an offline copy of every VAT return which means you have a copy of all
financial transactions from your accounting system…
○ And keep a copy of payslips, or received invoices etc.
● Don’t rely on suppliers claims for backups
○ Check the backups have been done / accessible (like with your hosting)
○ Download copies of backups periodically so you have offline versions
○ Set-up your own backup systems for key aspects – like daily emailed database backups or
bcc’ing a separate email account for key
● Consider insurance cover for cyber protection
26. World Economic Forum –
Top 10 Emerging Technologies of 2021
1. Decarbonisation – With green energy
○ a radical expansion of photovoltaic, wind, hydroelectric, tidal, nuclear and other zero-emissions
technologies
2. Crops that self-fertilise
○ Root-grown instead of sown
3. Breath sensors diagnose diseases
○ Medical devices analyse breath instead of blood
4. On-demand drug manufacturing
○ Use microfluidics and portable equipment to create personalised drugs in local pharmacies
5. Energy from wireless signals
○ The internet of things could be powered by 5G or wifi signals. IOT is growing, wireless power
makes them even more portable or fully ‘wireless’.
27. World Economic Forum –
Top 10 Emerging Technologies of 2021
6. Engineering better ageing
○ A focus on increasing “healthspan”, not just lifespans – medical advancements identifying
‘markers’ for conditions and ways to ‘turn back’ the age process
7. Green ammonia
○ Reducing the CO2 footprint of fertiliser production which provides 50% of global food
production
8. Biomarker devices go wireless
○ Sensors built in to mouth guards or other devices that monitor and analyse sweat/saliva/blood
etc can detect health issues but also monitor things already diagnosed like diabetes.
9. Houses printed with local materials
○ Building houses with 3D printers using local materials like soils; reducing transportation and
enabling remote communities to build infrastructure.
10. Space connects the globe – IOT with nanosatellites
○ Over 10 billion devices make up the ‘Internet of things’, nanosatellites can receive and relay
data from IOT devices around the globe, allowing mass data processing and communications.
28. Emerging Technologies - Closer to home
● New generation GPS
○ Allowing more accurate ‘personal tracking’ and powering delivery and logistics tech
● Removal of analogue phone lines
○ Happening by 2025 but well in motion, everyone will be using VoIP
● Touchless / haptic technology
○ Touchless haptic technologies induce tactile sensations remotely, without the need to wear or
hold any controllers, or contact tactile displays.
● Battery electric vehicles
○ The major manufacturers are bringing out many options.
● Artificial Intelligence (AI)
○ Already powering lots of things – like Google Map’s journey time predictions and will power
self-driving cars. AI also powers chatbots, fraud prevention tools and shopping
recommendations.
29. Breakouts
https://padlet.com/emrys4/wscc
● 6 Minutes
● Is there an emerging technology that could help your business
thrive?
● Is there anything you can do soon which prepares you for
adopting future technology?
● Add notes for your group to the padlet
32. Skills
● You don’t just need programmers; in fact you may not need coders at all.
● You need people with the skills to seamlessly use products and platforms.
● You need those who can plan and connect technologies and skills.
● You may need highly experienced people, or you could utilise well skilled recent graduates or young people to help drive your business forward.
33. Skills
● Match the skills to the tools
○ Do you need an enterprise network architect?
Or someone who can configure a software
interface?
● Match the tools to the skills
○ Low code/no code solutions can be helpful. But
if you can have the power of being able to use
a level of code to achieve effectiveness,
possibly in less time, then consider it.
● Could it be cheaper, easier and more effective to outsource any of it?
34. Skills – its not all tech that’s in demand
● Coding, programming and infrastructure management
● Creative thinking
● People management
● Engineering
● Fintech / data analytics
● Scientific exploration (especially health & life sciences)
35. Skills – ask yourself
● What technology and digital skills do you need in your business?
● Have you considered a skills audit of your staff?
○ Identifying the technology and digital skills gaps will help you to plan your recruitment needs
○ If it’s not appropriate to have in-house resource, who might you partner with to provide these?
● Have you considered utilising University consultancy or graduate placement opportunities?
○ These are opportunities to get high talent for short periods of time, usually cost effective (and
sometimes free)
○ They can also lead to longer term staff for you
● What are the wider skills people need for your business? Like critical and creative thinking, people management skills or a solutions focussed mindset?
40. Brought to you by West Sussex local authorities
and supported by Coast to Capital LEP
RECOVER & RISE
SME DIGITAL ACCELERATOR
RECOVER & RISE SME DIGITAL ACCELERATOR - UPCOMING
WEBINARS
BOOK YOUR PLACE NOW @ https://bit.ly/WSCC_RR_2021