SlideShare a Scribd company logo
1 of 11
Download to read offline
Every business that uses technology is a
potential victim of cybercrime. Hacking
and malware are becoming weekly news
headlines with the likes of Talk Talk, Marks
and Spencer and British Gas all being
known victims. Businesses are at risk
because there are so many different kinds
of threats out there.
It is important that businesses are
making the effort to ensure that their
computers and networks are secure
because otherwise the business itself is
at risk, not just the piece of technology
sitting on a desk!
////////////
www.acutec.co.uk
Ransomware is a form of hostile takeover where an
individual or group take over your computer system
and encrypt data. The data is then held hostage and
will only be returned to you and decrypted if you pay a
ransom fee. Sometimes these can appear with a
countdown and when you run out of time the
encryption key is deleted causing your data to be lost
forever.
Ransomware plays on
psychology, the countdown
forces people to feel that they
have to pay the ransom
because they are under
pressure and time is running
out. It is important to be aware
that there is no guarantee that
paying up will solve your
problem.
////////////
www.acutec.co.uk
Between September 2013
and May 2014 it is believed
over half a million people
were targeted.
STATS
It was estimated in 2012 that one
group of hackers was making
$34,000 a day through
ransomware attacks.
It is believed that $5
million was stolen via
ransomware in 2012.
www.acutec.co.uk
Phishing is where an individual receives an email
from what is believed to be a trusted source.
You could receive an email from what appears to
be your bank asking you whether you spent
money in an unusual country. The email may
ask you to click a link and verify your personal
information. You click the link in the hope of
sorting it out and in doing so provide a
malicious entity with data that will enable
them to access your bank account.
////////////
This is not just limited to email! You
can also receive communication
similar to this by phone call or text
message. Be careful when ‘verifying’
your personal details over the phone.
www.acutec.co.uk
SPEAR PHISHING
Spear phishing is a more personal way of trying
to gain your information with an individual
pretending to be someone you actually know
and trust. For example, you could receive an
email from someone you work with asking you to
deposit money into an account. If this is part of
both of your jobs the likelihood is you wouldn’t
question it and would go ahead with the request.
////////////
Sometimes spear
phishing can be obvious.
Look out for irregularities
like shortening of
names, spelling
mistakes or a lack of
usual signatures.
www.acutec.co.uk
VIRUSES
The point of a virus is to damage or
destroy the files on your computer. A virus
has the ability to replicate itself and can
enter your computer through an email
attachment or as an Internet download.
There are many different types of viruses
which infect specific different types of data
on your computer.
You should know
that a virus cannot
be spread without
some form of
human interaction
and that is why it is
so important to
have end user
education. Your
employees should
be fully aware of
what is out there.
////////////
www.acutec.co.uk
Trojans come in the form of computer programs with
harmful code inside what appears to be harmless
programming. They will usually appear to be in a form
that is useful or interesting to persuade you to install it. A
Trojan can make its way to you as an attachment in an
email or as a drive-by download.
Trojans are a doorway to many
other different types of cybercrime.
For example they can enable
software that initiates ransomware
to be installed or allow for your
computer to be involved in other
illegal activity such as attacking
other computers.
////////////
www.acutec.co.uk
WHAT TO DO IF IT
HAPPENS TO YOU
Change your
passwords. All of
them.
www.acutec.co.uk
Disconnect from the
Internet so your system is
no longer being
interrogated.
Alert all staff and make
sure that they
disconnect too.
If you have a backup system
in place, open this and create
a restore point so that the
system reverts to where it
was, removing malware.
Advise any clients
to not open emails
from you.
If your data is sensitive you
should contact the
Information Commissioner's
Office to report a data
breach.
Check your insurance
to see if you are
covered for data loss
and disclosure.
Report the case
to Action Fraud.
IMPACT////////////
If you’re worried
about your business’s
security or this
happens to you then
call ACUTEC on
01675 469020
www.acutec.co.uk
If your IT system is not secure then your business
is not secure leaving all aspects of the business
vulnerable, including:
Client data
Financial data
Website
Social media
Internal and external communication
acutec.co.uk
01675 469020
marketing@acutec.co.uk
@acutec_uk

More Related Content

What's hot

obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security snobbishmishap958
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagiamansyal
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
How to Remove binkiland.com Hijacker
How to Remove binkiland.com  HijackerHow to Remove binkiland.com  Hijacker
How to Remove binkiland.com HijackerAdoniscooper
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyoneAshesh R
 

What's hot (18)

obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
How to Stop Spam Emails in Yahoo Mail +1-877-618-6887
How to Stop Spam Emails in Yahoo Mail +1-877-618-6887How to Stop Spam Emails in Yahoo Mail +1-877-618-6887
How to Stop Spam Emails in Yahoo Mail +1-877-618-6887
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
How to Remove binkiland.com Hijacker
How to Remove binkiland.com  HijackerHow to Remove binkiland.com  Hijacker
How to Remove binkiland.com Hijacker
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
PortaldoSites
PortaldoSitesPortaldoSites
PortaldoSites
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyone
 

Similar to Cyber Security Guide

Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
The Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersThe Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersSpouse Ware
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxikirkton
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxAASTHA76
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 

Similar to Cyber Security Guide (20)

Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
The Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersThe Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From Hackers
 
internet security
internet securityinternet security
internet security
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

More from Chris Roche

The 7 Essentials for Cyber Security
The 7 Essentials for Cyber SecurityThe 7 Essentials for Cyber Security
The 7 Essentials for Cyber SecurityChris Roche
 
How to Introduce Yammer to Your Business
How to Introduce Yammer to Your BusinessHow to Introduce Yammer to Your Business
How to Introduce Yammer to Your BusinessChris Roche
 
5 Ways Office 365 Will Transform Your Team
5 Ways Office 365 Will Transform Your Team5 Ways Office 365 Will Transform Your Team
5 Ways Office 365 Will Transform Your TeamChris Roche
 
5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing Email5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing EmailChris Roche
 
5 Reasons to Move to Office 365 Today
5 Reasons to Move to Office 365 Today5 Reasons to Move to Office 365 Today
5 Reasons to Move to Office 365 TodayChris Roche
 
5 Myths About Moving to the Cloud
5 Myths About Moving to the Cloud5 Myths About Moving to the Cloud
5 Myths About Moving to the CloudChris Roche
 
4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + SecurityChris Roche
 
What to Consider Before Migrating to the Cloud
What to Consider Before Migrating to the CloudWhat to Consider Before Migrating to the Cloud
What to Consider Before Migrating to the CloudChris Roche
 
What are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureWhat are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureChris Roche
 
6 Ways to Save Your iphone Battery
6 Ways to Save Your iphone Battery 6 Ways to Save Your iphone Battery
6 Ways to Save Your iphone Battery Chris Roche
 
4 Tips to Make Life Easier with Onedrive
4 Tips to Make Life Easier with Onedrive4 Tips to Make Life Easier with Onedrive
4 Tips to Make Life Easier with OnedriveChris Roche
 
What to look for in an IT Support Partner
What to look for in an IT Support PartnerWhat to look for in an IT Support Partner
What to look for in an IT Support PartnerChris Roche
 
What Charities Need to Be Aware of with GDPR
What Charities Need to Be Aware of with GDPR What Charities Need to Be Aware of with GDPR
What Charities Need to Be Aware of with GDPR Chris Roche
 
Getting the most out of Skype for Business
Getting the most out of Skype for BusinessGetting the most out of Skype for Business
Getting the most out of Skype for BusinessChris Roche
 
5 things in office 365 that will help you to achieve more every day
5 things in office 365 that will help you to achieve more every day5 things in office 365 that will help you to achieve more every day
5 things in office 365 that will help you to achieve more every dayChris Roche
 
4 things to do in Microsoft Azure
4 things to do in Microsoft Azure4 things to do in Microsoft Azure
4 things to do in Microsoft AzureChris Roche
 
What are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureWhat are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureChris Roche
 
Bronx-Engineering
Bronx-EngineeringBronx-Engineering
Bronx-EngineeringChris Roche
 
heart-of-england-mencap
heart-of-england-mencapheart-of-england-mencap
heart-of-england-mencapChris Roche
 
Purnell's Restaurant
Purnell's RestaurantPurnell's Restaurant
Purnell's RestaurantChris Roche
 

More from Chris Roche (20)

The 7 Essentials for Cyber Security
The 7 Essentials for Cyber SecurityThe 7 Essentials for Cyber Security
The 7 Essentials for Cyber Security
 
How to Introduce Yammer to Your Business
How to Introduce Yammer to Your BusinessHow to Introduce Yammer to Your Business
How to Introduce Yammer to Your Business
 
5 Ways Office 365 Will Transform Your Team
5 Ways Office 365 Will Transform Your Team5 Ways Office 365 Will Transform Your Team
5 Ways Office 365 Will Transform Your Team
 
5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing Email5 Tips to Spot a Phishing Email
5 Tips to Spot a Phishing Email
 
5 Reasons to Move to Office 365 Today
5 Reasons to Move to Office 365 Today5 Reasons to Move to Office 365 Today
5 Reasons to Move to Office 365 Today
 
5 Myths About Moving to the Cloud
5 Myths About Moving to the Cloud5 Myths About Moving to the Cloud
5 Myths About Moving to the Cloud
 
4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security4 Highlights of Enterprise Mobility + Security
4 Highlights of Enterprise Mobility + Security
 
What to Consider Before Migrating to the Cloud
What to Consider Before Migrating to the CloudWhat to Consider Before Migrating to the Cloud
What to Consider Before Migrating to the Cloud
 
What are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureWhat are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft Azure
 
6 Ways to Save Your iphone Battery
6 Ways to Save Your iphone Battery 6 Ways to Save Your iphone Battery
6 Ways to Save Your iphone Battery
 
4 Tips to Make Life Easier with Onedrive
4 Tips to Make Life Easier with Onedrive4 Tips to Make Life Easier with Onedrive
4 Tips to Make Life Easier with Onedrive
 
What to look for in an IT Support Partner
What to look for in an IT Support PartnerWhat to look for in an IT Support Partner
What to look for in an IT Support Partner
 
What Charities Need to Be Aware of with GDPR
What Charities Need to Be Aware of with GDPR What Charities Need to Be Aware of with GDPR
What Charities Need to Be Aware of with GDPR
 
Getting the most out of Skype for Business
Getting the most out of Skype for BusinessGetting the most out of Skype for Business
Getting the most out of Skype for Business
 
5 things in office 365 that will help you to achieve more every day
5 things in office 365 that will help you to achieve more every day5 things in office 365 that will help you to achieve more every day
5 things in office 365 that will help you to achieve more every day
 
4 things to do in Microsoft Azure
4 things to do in Microsoft Azure4 things to do in Microsoft Azure
4 things to do in Microsoft Azure
 
What are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureWhat are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft Azure
 
Bronx-Engineering
Bronx-EngineeringBronx-Engineering
Bronx-Engineering
 
heart-of-england-mencap
heart-of-england-mencapheart-of-england-mencap
heart-of-england-mencap
 
Purnell's Restaurant
Purnell's RestaurantPurnell's Restaurant
Purnell's Restaurant
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Cyber Security Guide

  • 1.
  • 2. Every business that uses technology is a potential victim of cybercrime. Hacking and malware are becoming weekly news headlines with the likes of Talk Talk, Marks and Spencer and British Gas all being known victims. Businesses are at risk because there are so many different kinds of threats out there. It is important that businesses are making the effort to ensure that their computers and networks are secure because otherwise the business itself is at risk, not just the piece of technology sitting on a desk! //////////// www.acutec.co.uk
  • 3. Ransomware is a form of hostile takeover where an individual or group take over your computer system and encrypt data. The data is then held hostage and will only be returned to you and decrypted if you pay a ransom fee. Sometimes these can appear with a countdown and when you run out of time the encryption key is deleted causing your data to be lost forever. Ransomware plays on psychology, the countdown forces people to feel that they have to pay the ransom because they are under pressure and time is running out. It is important to be aware that there is no guarantee that paying up will solve your problem. //////////// www.acutec.co.uk
  • 4. Between September 2013 and May 2014 it is believed over half a million people were targeted. STATS It was estimated in 2012 that one group of hackers was making $34,000 a day through ransomware attacks. It is believed that $5 million was stolen via ransomware in 2012. www.acutec.co.uk
  • 5. Phishing is where an individual receives an email from what is believed to be a trusted source. You could receive an email from what appears to be your bank asking you whether you spent money in an unusual country. The email may ask you to click a link and verify your personal information. You click the link in the hope of sorting it out and in doing so provide a malicious entity with data that will enable them to access your bank account. //////////// This is not just limited to email! You can also receive communication similar to this by phone call or text message. Be careful when ‘verifying’ your personal details over the phone. www.acutec.co.uk
  • 6. SPEAR PHISHING Spear phishing is a more personal way of trying to gain your information with an individual pretending to be someone you actually know and trust. For example, you could receive an email from someone you work with asking you to deposit money into an account. If this is part of both of your jobs the likelihood is you wouldn’t question it and would go ahead with the request. //////////// Sometimes spear phishing can be obvious. Look out for irregularities like shortening of names, spelling mistakes or a lack of usual signatures. www.acutec.co.uk
  • 7. VIRUSES The point of a virus is to damage or destroy the files on your computer. A virus has the ability to replicate itself and can enter your computer through an email attachment or as an Internet download. There are many different types of viruses which infect specific different types of data on your computer. You should know that a virus cannot be spread without some form of human interaction and that is why it is so important to have end user education. Your employees should be fully aware of what is out there. //////////// www.acutec.co.uk
  • 8. Trojans come in the form of computer programs with harmful code inside what appears to be harmless programming. They will usually appear to be in a form that is useful or interesting to persuade you to install it. A Trojan can make its way to you as an attachment in an email or as a drive-by download. Trojans are a doorway to many other different types of cybercrime. For example they can enable software that initiates ransomware to be installed or allow for your computer to be involved in other illegal activity such as attacking other computers. //////////// www.acutec.co.uk
  • 9. WHAT TO DO IF IT HAPPENS TO YOU Change your passwords. All of them. www.acutec.co.uk Disconnect from the Internet so your system is no longer being interrogated. Alert all staff and make sure that they disconnect too. If you have a backup system in place, open this and create a restore point so that the system reverts to where it was, removing malware. Advise any clients to not open emails from you. If your data is sensitive you should contact the Information Commissioner's Office to report a data breach. Check your insurance to see if you are covered for data loss and disclosure. Report the case to Action Fraud.
  • 10. IMPACT//////////// If you’re worried about your business’s security or this happens to you then call ACUTEC on 01675 469020 www.acutec.co.uk If your IT system is not secure then your business is not secure leaving all aspects of the business vulnerable, including: Client data Financial data Website Social media Internal and external communication