Share to Facebook Share to Twitter Share to LinkedIn

Attackers make it their job to break through the security measures on a company or personal computer in order to profit in some way for the information that is stored on the device/server.

Their methods are in constant development to counter efforts to prevent security exploits. The target could be anything, from the smallest home business to the largest enterprise. There has been a significant rise in the amount of attacks targeting small businesses including at-home offices. Many small businesses rationalise that if they keep low on the radar and have a lower profile than competitors, they will be safe from cyber-attacks. This is not the case according to experts in security.

To counter the evolving threats a framework must be put in place that not only secures the network but is also flexible enough to adapt to changes in the type of attack.

According to Ponemon, a contractor hired by IBM, study “Cost of Data Breach Study,” the average cost of a data breach grew from £2.9 million in 2015 to £3.2 million in 2016. Most defences can stop known attacks but are defenceless against the unknown. organisations are attacked because of a lack of awareness around the importance of cyber-security.


Phishing attacks have consistently been the biggest threat. There isn’t any complete solution for deterring phishing attacks because attackers are always finding new ways to disguise attempts as legitimate emails. Common attempts include spoofing email address/domain names or painstakingly recreating legitimate emails and adding dangerous links.

Another real concern although less common, are threats that derive from mobile computing, email and employees bringing their own devices and apps into the workplace environment. These apps might not have been tested or certified and could possible contain flaws that enable hackers to gain information through them.

Preventive measures
• Educating Employees
o How to identify unusual communications
o Avoiding clicking on unknown links
o Looking for the “https:” to confirm encrypted websites
o To never bypass digital certificate warnings or pop-ups.
• Regularly update operating systems and
• Implementing BYOD (Bring your own device) polices and creating guest networks to keep critical data safe

Further Reading

For more information please visit: