SlideShare a Scribd company logo
ADVICE
insider MAY 2016 15
How big a threat to business
is cyber crime?
Gary Sirrell It’s a huge threat that’s mas-
sively under reported. We can’t do anything
unless it’s reported. Report it to the Action
Fraud, the national central agency for
fraud, or the local police. Phishing (when
hackers send emails or set up websites in
the hope of ensnaring a naïve computer
user) is huge. People think they should
spend a lot of money on protecting their
IT. I would advise some basic training of
your staff; they’re your greatest asset but
also your greatest liability when it comes to
cyber crime. Ransomware (which hackers
use to block a company’s access to vital
data until the business pays a ransom)
is an effective business model because
they ask for the kind of sums – usually a
few hundred pounds – where companies
seriously consider paying the ransom to
quickly regain access to their data, and
many end up doing just that. A hospital in
the US recently paid a few thousand dollars
to a ransomware hacker. But you’re funding
organised crime if you do this.
Ian Batten There’s an easy way to avoid this:
have data backups. Businesses that don’t
have backups don’t care about their data.
This just doesn’t protect them against that
sort of crime, but a wide range of IT threats,
including hard drives going bad.
Helena Wootton One of our clients had a
secretary who copied the inbox of one of
the directors and then threatened to pass
out sensitive information. A report by PwC
found 60 per cent of small businesses were
attacked from inside last year.
SECUREWALLHOW SHOULD COMPANIES PROTECT THEMSELVES FROM CYBER CRIME?
PANEL ONE
IAN BATTEN
lecturer in computer security,
University of Birmingham
HELENA WOOTTON
partner, Browne Jacobson
GARY SIRRELL
detective sergeant, West Midlands
Police Cyber Crime Unit
“Your staff are your
greatest asset but
also your greatest
liability in when it
comes to cyber
crime.” Gary Sirrell
Why is the level of reporting
to police so low?
Sirrell There are some issues with Action
Fraud at the moment and there’s time
delays built into the system. The police are
quite good with victim care when it comes
IAN BATTEN HELENA WOOTTON GARY SIRRELL
SPONSORED BY
p15-17 Cybercrime breakfast.indd 15 07/04/2016 15:41
CYBER CRIME BREAKFAST
16 insider MAY 2016
to traditional crime, but not so good when it
comes to the technical side. But things are
improving.
Wootton Businesses are concerned about
being honest about breaches; they may not
want to report anything to the police be-
cause of the nature of the data that’s lost.
They also may not want to report it because
it’s an inside job.
Batten The argument that there’s a huge
undercurrent of cyber crime not being
reported may be true, but it’s unknowa-
ble. It seems strange the British Crime
Survey, seen as the gold standard of crime
reporting, doesn’t actually back up these
claims. These crimes can be protected
against fairly easily using old-fashioned
data processing hygiene. When I worked in
industry the big focus was on stopping the
corrupt employee in accounts receivable
How can cyber crime be best brought to
the forefront of directors’ minds?
Wootton What’s coming out of the new data
protection legislation is the threat of being
fined up to €20m, or four per cent of global
annual turnover. There’s also obligations on
businesses that process customer data. All
this is going to be more enforced rigorously.
Batten Very few companies recover from an
IT disaster. What concerns me is that the
narrative about cyber security is frighten-
ing people away from storing data in the
cloud, when there’s far more of a risk of a
fire or power failure in their building. If you
lose your accounts receivable or accounts
payable you’re dead.
Sirrell A lot of victims are being subject to
basic attacks which could be put right by
taking simple measures. If you make it
harder the bad guys will go elsewhere.
“The narrative about
security is frightening
people away from
the cloud when other
risks are far greater.”
Ian Batten
from colluding with the corrupt employee
in accounts payable and setting up a fake
supplier, which was made much easier be-
cause they all had each other’s passwords.
Dealing with those problems is much more
realistic than worrying about being attacked
by scary cyber hackers.
p15-17 Cybercrime breakfast.indd 16 07/04/2016 15:41
ADVICE
insider MAY 2016 17
What are the main measures businesses
should take to protect themselves?
Mark Lomas Everybody is a target online,
no matter how big the business. It’s about
having the right policies in place, before
you even think about the technical solu-
tions. Staff must be properly trained and
be made aware of the risks.
Susan Hallam Once you know the risks
look at what you need to do to address
them. Don’t try and avoid using the internet,
because that would be impossible.
Gary Sirrell Back up your data as often as
you can, keep data at multiple sites and
practice restoring from backups. Keep your
most important data in the safest place.
Is using the cloud more dangerous for
SMEs than storing data traditionally?
Hallam Many of us are in the cloud already,
but we don’t realise how actively we’re
using it. Don’t take a sledgehammer ap-
proach in trying to avoid the cloud. Instead
take a scalpel approach to make sure
you’re appropriately addressing the issues.
Small businesses are typically exposing
themselves to 400 different apps via staff,
so you need to know the risks you are
taking by allowing staff into the office with a
smartphone every day. Seventy-seven per
cent of apps are not ready to be used in a
secure fashion and are actually borrowing
data from other apps. So the biggest risk is
insider incompetence, by not knowing what
the risks are.
Hallam A lot of businesses are thriving
because they’re working in the cloud, so
they want to continue to use it and make
the most of it. But you should use two-step
verification to protect yourself. Also, many
businesses don’t realise that if someone
tries to get into your Dropbox who isn’t
recognised it will notify you.
How important is an ISO mark when it
comes to cyber security?
Lomas If we all hit those high standards
then we’ll make life so much harder for the
criminals. It’s like vaccination; it doesn’t take
too many children not to be vaccinated to
cause the outbreak of a disease. Ransom-
ware wouldn’t be spreading on the internet
if everybody was universally protected.
We can strive for that by meeting certain
standards in the industry.
Sirrell The ISO 27000 series is not the whole
answer, but it’s important. The Cyber Es-
sentials package, introduced to cover very
small companies that don’t have resources
to go for an ISO standard, is a cyber health
check for a business, which will give you
report on where to go next. It costs £400
to £500 and you do it once a year. The gov-
ernment is saying it won’t do business with
you or your supply chain if you’re not signed
up to Cyber Essentials.
Hallam There are government grants availa-
ble for businesses that are striving to meet
these standards.
PANEL TWO
SUSAN HALLAM
managing director, Hallam Internet
MARK LOMAS
IT consultant, Icomm Technologies
GARY SIRRELL
detective sergeant, West Midlands
Police Cyber Crime Unit
Lomas We’ve seen the emergence of stand-
ards when it comes to the cloud, especially
in the area of security. This includes ISO
27017, which many providers are looking
to certify themselves against. This gives a
level of assurance and clarity. A reason you
may go to the cloud for security is because
providers are going to be more obsessive
about applying best practices around se-
curity in a strict manner. This is something
businesses struggle with. Emails aren’t
necessarily secure either. You need to look
at what you’re using to transfer data, such
as Dropbox or WeTransfer. Staff are using
them through their own personal accounts,
which can have security implications. You
need to have a degree of control with
people in your organisation about what they
can and cannot do.
Sirrell There’s got to be an element of safe
help and investing in training of staff. There
are some very simple measures you can
take to protect against these threats. There’s
a vast amount of resources available to help
you, and it’s all free.
“You need a degree
of control in your
business about
what people can
or cannot do.”
Mark Lomas
“The biggest risk to
business is insider
incompetence, by
staff not knowing
what the risks are.”
Susan Hallam
SUSAN HALLAM MARK LOMAS GARY SIRRELL
SPONSORED BY
p15-17 Cybercrime breakfast.indd 17 07/04/2016 15:41

More Related Content

What's hot

WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
Hilary G. Killian
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The Scene
Koen Van Loo
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Kushal Mondal
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
Clearswift
 
Positive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessPositive and Negative impact of IT oN Business
Positive and Negative impact of IT oN Business
Dinesh Laviskar
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Jason Hong
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
Taranggg11
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?Sherry Jones
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
Narayan Makaram
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
Mark Albala
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
McafeeCareers
 

What's hot (20)

WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The Scene
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Positive and Negative impact of IT oN Business
Positive and Negative impact of IT oN BusinessPositive and Negative impact of IT oN Business
Positive and Negative impact of IT oN Business
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
ODMOB Ransomware newsletter final
ODMOB Ransomware newsletter finalODMOB Ransomware newsletter final
ODMOB Ransomware newsletter final
 

Viewers also liked

The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017
Matheson Law Firm
 
Legal500
Legal500Legal500
Legal500
Ohnicio Kalb
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process Management
Cognizant
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FCMelissa Gibson
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Crime Unit
Crime UnitCrime Unit
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
Viren Aul
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 Criminology
Katrina Homer
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016
Matheson Law Firm
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and Corruption
Adel Abouhana
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 

Viewers also liked (12)

The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017The International Comparative Legal Guide to: Business Crime 2017
The International Comparative Legal Guide to: Business Crime 2017
 
Legal500
Legal500Legal500
Legal500
 
Tackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process ManagementTackling Financial Crime through Business Process Management
Tackling Financial Crime through Business Process Management
 
Business Crime Research Assignment FC
Business Crime Research Assignment FCBusiness Crime Research Assignment FC
Business Crime Research Assignment FC
 
L Scope
L ScopeL Scope
L Scope
 
Crime Unit
Crime UnitCrime Unit
Crime Unit
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
 
Chapter 2 Criminology
Chapter 2 CriminologyChapter 2 Criminology
Chapter 2 Criminology
 
The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016The International Comparative Legal Guide to Business Crime 2016
The International Comparative Legal Guide to Business Crime 2016
 
Bribery and Corruption
Bribery and CorruptionBribery and Corruption
Bribery and Corruption
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 

Similar to Secure Wall - how should companies protect themselves from cyber crime?

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
Ainsha Noordin (Umie)
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
anpapathanasiou
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
NavinKumarDewangan
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
Sania Baker
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
ntoscano50
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
RajviNikeetaRathore
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docx
smumbahelp
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
FireEye, Inc.
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Core Security
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
Courion Corporation
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
Copper Mobile, Inc.
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 

Similar to Secure Wall - how should companies protect themselves from cyber crime? (20)

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docx
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 

More from Browne Jacobson LLP

Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020
Browne Jacobson LLP
 
Exclusions: keeping you informed
Exclusions: keeping you informed Exclusions: keeping you informed
Exclusions: keeping you informed
Browne Jacobson LLP
 
Procurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham sessionProcurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham session
Browne Jacobson LLP
 
Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019
Browne Jacobson LLP
 
Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...
Browne Jacobson LLP
 
Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019
Browne Jacobson LLP
 
Health tech slides 12 june 2019
Health tech slides   12 june 2019Health tech slides   12 june 2019
Health tech slides 12 june 2019
Browne Jacobson LLP
 
Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019
Browne Jacobson LLP
 
Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019
Browne Jacobson LLP
 
Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019
Browne Jacobson LLP
 
Claims Club - March 2019 - Birmingham
Claims Club - March 2019 - BirminghamClaims Club - March 2019 - Birmingham
Claims Club - March 2019 - Birmingham
Browne Jacobson LLP
 
Claims Club - March 2019 - London
Claims Club - March 2019 - London Claims Club - March 2019 - London
Claims Club - March 2019 - London
Browne Jacobson LLP
 
Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London
Browne Jacobson LLP
 
State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019 State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019
Browne Jacobson LLP
 
In House Lawyers, March 2019
In House Lawyers, March 2019In House Lawyers, March 2019
In House Lawyers, March 2019
Browne Jacobson LLP
 
Privileged communications webinar, March 2019
Privileged communications webinar, March 2019 Privileged communications webinar, March 2019
Privileged communications webinar, March 2019
Browne Jacobson LLP
 
Social care forum, March 2019, Manchester
Social care forum, March 2019, ManchesterSocial care forum, March 2019, Manchester
Social care forum, March 2019, Manchester
Browne Jacobson LLP
 
Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter
Browne Jacobson LLP
 
Public sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, NottinghamPublic sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, Nottingham
Browne Jacobson LLP
 
Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...
Browne Jacobson LLP
 

More from Browne Jacobson LLP (20)

Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020Employment law update - Browne Jacobson Exeter - 06 February 2020
Employment law update - Browne Jacobson Exeter - 06 February 2020
 
Exclusions: keeping you informed
Exclusions: keeping you informed Exclusions: keeping you informed
Exclusions: keeping you informed
 
Procurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham sessionProcurement workshop training slides - Birmingham session
Procurement workshop training slides - Birmingham session
 
Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019Local authority acquisition and disposal of land - July 2019
Local authority acquisition and disposal of land - July 2019
 
Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...Your employees, their future employers, and your intellectual property - July...
Your employees, their future employers, and your intellectual property - July...
 
Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019Public Sector Planning Club - 4 July 2019
Public Sector Planning Club - 4 July 2019
 
Health tech slides 12 june 2019
Health tech slides   12 june 2019Health tech slides   12 june 2019
Health tech slides 12 june 2019
 
Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019Education Law Conference Manchester - Monday 10 June 2019
Education Law Conference Manchester - Monday 10 June 2019
 
Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019Education Law Conference Exeter - Thursday 6 June 2019
Education Law Conference Exeter - Thursday 6 June 2019
 
Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019Redress Schemes for Abuse and Misconduct, March 2019
Redress Schemes for Abuse and Misconduct, March 2019
 
Claims Club - March 2019 - Birmingham
Claims Club - March 2019 - BirminghamClaims Club - March 2019 - Birmingham
Claims Club - March 2019 - Birmingham
 
Claims Club - March 2019 - London
Claims Club - March 2019 - London Claims Club - March 2019 - London
Claims Club - March 2019 - London
 
Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London Admin and Public Law - April 2019 - London
Admin and Public Law - April 2019 - London
 
State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019 State aid and IP in R&D agreements, March 2019
State aid and IP in R&D agreements, March 2019
 
In House Lawyers, March 2019
In House Lawyers, March 2019In House Lawyers, March 2019
In House Lawyers, March 2019
 
Privileged communications webinar, March 2019
Privileged communications webinar, March 2019 Privileged communications webinar, March 2019
Privileged communications webinar, March 2019
 
Social care forum, March 2019, Manchester
Social care forum, March 2019, ManchesterSocial care forum, March 2019, Manchester
Social care forum, March 2019, Manchester
 
Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter Public sector breakfast club, February 2019, Exeter
Public sector breakfast club, February 2019, Exeter
 
Public sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, NottinghamPublic sector planning club, February 2019, Nottingham
Public sector planning club, February 2019, Nottingham
 
Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...Mental health, capacity and deprivation of liberty case law update, February ...
Mental health, capacity and deprivation of liberty case law update, February ...
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Secure Wall - how should companies protect themselves from cyber crime?

  • 1. ADVICE insider MAY 2016 15 How big a threat to business is cyber crime? Gary Sirrell It’s a huge threat that’s mas- sively under reported. We can’t do anything unless it’s reported. Report it to the Action Fraud, the national central agency for fraud, or the local police. Phishing (when hackers send emails or set up websites in the hope of ensnaring a naïve computer user) is huge. People think they should spend a lot of money on protecting their IT. I would advise some basic training of your staff; they’re your greatest asset but also your greatest liability when it comes to cyber crime. Ransomware (which hackers use to block a company’s access to vital data until the business pays a ransom) is an effective business model because they ask for the kind of sums – usually a few hundred pounds – where companies seriously consider paying the ransom to quickly regain access to their data, and many end up doing just that. A hospital in the US recently paid a few thousand dollars to a ransomware hacker. But you’re funding organised crime if you do this. Ian Batten There’s an easy way to avoid this: have data backups. Businesses that don’t have backups don’t care about their data. This just doesn’t protect them against that sort of crime, but a wide range of IT threats, including hard drives going bad. Helena Wootton One of our clients had a secretary who copied the inbox of one of the directors and then threatened to pass out sensitive information. A report by PwC found 60 per cent of small businesses were attacked from inside last year. SECUREWALLHOW SHOULD COMPANIES PROTECT THEMSELVES FROM CYBER CRIME? PANEL ONE IAN BATTEN lecturer in computer security, University of Birmingham HELENA WOOTTON partner, Browne Jacobson GARY SIRRELL detective sergeant, West Midlands Police Cyber Crime Unit “Your staff are your greatest asset but also your greatest liability in when it comes to cyber crime.” Gary Sirrell Why is the level of reporting to police so low? Sirrell There are some issues with Action Fraud at the moment and there’s time delays built into the system. The police are quite good with victim care when it comes IAN BATTEN HELENA WOOTTON GARY SIRRELL SPONSORED BY p15-17 Cybercrime breakfast.indd 15 07/04/2016 15:41
  • 2. CYBER CRIME BREAKFAST 16 insider MAY 2016 to traditional crime, but not so good when it comes to the technical side. But things are improving. Wootton Businesses are concerned about being honest about breaches; they may not want to report anything to the police be- cause of the nature of the data that’s lost. They also may not want to report it because it’s an inside job. Batten The argument that there’s a huge undercurrent of cyber crime not being reported may be true, but it’s unknowa- ble. It seems strange the British Crime Survey, seen as the gold standard of crime reporting, doesn’t actually back up these claims. These crimes can be protected against fairly easily using old-fashioned data processing hygiene. When I worked in industry the big focus was on stopping the corrupt employee in accounts receivable How can cyber crime be best brought to the forefront of directors’ minds? Wootton What’s coming out of the new data protection legislation is the threat of being fined up to €20m, or four per cent of global annual turnover. There’s also obligations on businesses that process customer data. All this is going to be more enforced rigorously. Batten Very few companies recover from an IT disaster. What concerns me is that the narrative about cyber security is frighten- ing people away from storing data in the cloud, when there’s far more of a risk of a fire or power failure in their building. If you lose your accounts receivable or accounts payable you’re dead. Sirrell A lot of victims are being subject to basic attacks which could be put right by taking simple measures. If you make it harder the bad guys will go elsewhere. “The narrative about security is frightening people away from the cloud when other risks are far greater.” Ian Batten from colluding with the corrupt employee in accounts payable and setting up a fake supplier, which was made much easier be- cause they all had each other’s passwords. Dealing with those problems is much more realistic than worrying about being attacked by scary cyber hackers. p15-17 Cybercrime breakfast.indd 16 07/04/2016 15:41
  • 3. ADVICE insider MAY 2016 17 What are the main measures businesses should take to protect themselves? Mark Lomas Everybody is a target online, no matter how big the business. It’s about having the right policies in place, before you even think about the technical solu- tions. Staff must be properly trained and be made aware of the risks. Susan Hallam Once you know the risks look at what you need to do to address them. Don’t try and avoid using the internet, because that would be impossible. Gary Sirrell Back up your data as often as you can, keep data at multiple sites and practice restoring from backups. Keep your most important data in the safest place. Is using the cloud more dangerous for SMEs than storing data traditionally? Hallam Many of us are in the cloud already, but we don’t realise how actively we’re using it. Don’t take a sledgehammer ap- proach in trying to avoid the cloud. Instead take a scalpel approach to make sure you’re appropriately addressing the issues. Small businesses are typically exposing themselves to 400 different apps via staff, so you need to know the risks you are taking by allowing staff into the office with a smartphone every day. Seventy-seven per cent of apps are not ready to be used in a secure fashion and are actually borrowing data from other apps. So the biggest risk is insider incompetence, by not knowing what the risks are. Hallam A lot of businesses are thriving because they’re working in the cloud, so they want to continue to use it and make the most of it. But you should use two-step verification to protect yourself. Also, many businesses don’t realise that if someone tries to get into your Dropbox who isn’t recognised it will notify you. How important is an ISO mark when it comes to cyber security? Lomas If we all hit those high standards then we’ll make life so much harder for the criminals. It’s like vaccination; it doesn’t take too many children not to be vaccinated to cause the outbreak of a disease. Ransom- ware wouldn’t be spreading on the internet if everybody was universally protected. We can strive for that by meeting certain standards in the industry. Sirrell The ISO 27000 series is not the whole answer, but it’s important. The Cyber Es- sentials package, introduced to cover very small companies that don’t have resources to go for an ISO standard, is a cyber health check for a business, which will give you report on where to go next. It costs £400 to £500 and you do it once a year. The gov- ernment is saying it won’t do business with you or your supply chain if you’re not signed up to Cyber Essentials. Hallam There are government grants availa- ble for businesses that are striving to meet these standards. PANEL TWO SUSAN HALLAM managing director, Hallam Internet MARK LOMAS IT consultant, Icomm Technologies GARY SIRRELL detective sergeant, West Midlands Police Cyber Crime Unit Lomas We’ve seen the emergence of stand- ards when it comes to the cloud, especially in the area of security. This includes ISO 27017, which many providers are looking to certify themselves against. This gives a level of assurance and clarity. A reason you may go to the cloud for security is because providers are going to be more obsessive about applying best practices around se- curity in a strict manner. This is something businesses struggle with. Emails aren’t necessarily secure either. You need to look at what you’re using to transfer data, such as Dropbox or WeTransfer. Staff are using them through their own personal accounts, which can have security implications. You need to have a degree of control with people in your organisation about what they can and cannot do. Sirrell There’s got to be an element of safe help and investing in training of staff. There are some very simple measures you can take to protect against these threats. There’s a vast amount of resources available to help you, and it’s all free. “You need a degree of control in your business about what people can or cannot do.” Mark Lomas “The biggest risk to business is insider incompetence, by staff not knowing what the risks are.” Susan Hallam SUSAN HALLAM MARK LOMAS GARY SIRRELL SPONSORED BY p15-17 Cybercrime breakfast.indd 17 07/04/2016 15:41