{"id":856,"date":"2021-12-01T16:02:10","date_gmt":"2021-12-01T16:02:10","guid":{"rendered":"https:\/\/nationalcrcgroup.co.uk\/?p=367"},"modified":"2021-12-01T16:02:10","modified_gmt":"2021-12-01T16:02:10","slug":"risks-of-cyber-security-for-small-businesses","status":"publish","type":"post","link":"https:\/\/fatbuzzhosting.com\/ncrcg\/risks-of-cyber-security-for-small-businesses\/","title":{"rendered":"Cyber Security Risks Facing Your Small Business"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/fatbuzzhosting.com\/ncrcgwp-content\/uploads\/2021\/12\/Nature_01-1-1024x434.png\" alt=\"Mountain range representing the cyber security risk to small business\" class=\"wp-image-710\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:26px\">Why are SMEs particularly at risk?<\/h2>\n\n\n\n<p>A <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2021\/cyber-security-breaches-survey-2021\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Ipsos Mori<\/a> survey found that 27% of small businesses were attacked once a week and only 15% had carried out a cyber security audit, meaning they had no knowledge of where the vulnerabilities in their systems can be found.<\/p>\n\n\n\n<p>A small business may not prioritise cyber security because they don\u2019t have the budget or processes in place to protect them from a cyber attack. But the financial loss of an attack could cause irrevocable damage to an SME.<\/p>\n\n\n\n<p>Another factor is that SMEs often associate cyber attacks with big organisations or institutions. They often think, \u2018<em>well, why would anyone care about targeting me?<\/em>\u2019 &#8211; when in reality that line of thinking is exactly why attackers do target SMEs. So let&#8217;s talk small business cyber security! <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:26px\">Why is protection important?<\/h2>\n\n\n\n<p>The importance of securing your business is to prevent unauthorised access to a substantial amount of personal and business information that is stored on devices and hardware.<\/p>\n\n\n\n<p>Digital platforms and devices play an important role in making businesses a success. This ranges from online banking, to storing private and confidential information online, website platforms and social media. Thus, if one of these were to get hacked, this could cause severe damage to your business.<\/p>\n\n\n\n<p>The main purpose is to protect the devices, services and networks used within organisations, especially small business cyber security.<\/p>\n\n\n\n<p>Below outlines the key areas as to why it is important to protect your SME:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It prevents data breaches. Avoid personal, company and customer information being leaked via the internet. A data breach can impact your company reputation, making it difficult to retain existing customers and gain new ones.<\/li><li>A cyber-attack can damage important files, hardware and software. This will result in downtime for your business while the issue is being resolved. This can mean your business will lose money.<\/li><li>By being resilient, you will be prepared for a situation arising and ensure there is a response plan in place. This means you will not lose important data and you can get back up and running quickly and efficiently as soon as possible.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:26px\">What are the main threats for small business?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong>Malware<\/strong><\/h3>\n\n\n\n<p>Malware is malicious software specifically designed to cause damage to a computer, server, contacts, or computer network. There are many forms of malware, this includes: viruses, worms, trojan horses, spyware, ransomware, scareware, botnets and rogue security.<\/p>\n\n\n\n<p>Each of the Malwares are a programme which replicates itself by transforming other computer programmes and inserting its own code. Users can frequently be tricked into clicking on links which can then infect their computer.<\/p>\n\n\n\n<p>How can you prevent this?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Update your operating system, browsers, and plugin<\/li><li>Remove software that is no longer used<\/li><li>Be conscious of fake security numbers<\/li><li>Utilise a strong password<\/li><li>Ensure your business is using firewall and anti-ransomware technology<\/li><\/ul>\n\n\n\n<p>Ensure your computer software is updated regularly to protect any viruses from harming your network, systems, and devices.<\/p>\n\n\n\n<p>By installing an anti-virus software, it will allow updates to be made regularly and clear out any harmful or potential harmful viruses.<\/p>\n\n\n\n<p>It\u2019s also important to ensure you\u2019re aware of the signs of a virus so you can deal with the problem quickly. Signs that your business computer has a virus include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Unexpected shutdowns<\/li><li>Your computer has slowed down and\/or takes a long time to shut down or restart<\/li><li>Repeated error messages<\/li><li>New toolbars you didn\u2019t install<\/li><li>Changes to your homepage<\/li><li>Your battery drains very quickly<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong>Phishing<\/strong><\/h3>\n\n\n\n<p>Phishing scams are used to obtain sensitive information such as usernames, passwords, financial details such as credit cards. This sensitive information can be obtained by disguising itself as an email or text message.<\/p>\n\n\n\n<p><em>How can you prevent this?<\/em><\/p>\n\n\n\n<p>The most common email signs are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spelling and grammar mistakes<\/li><li>It\u2019s from a shop or provider you don\u2019t use<\/li><li>They might be pushy, rude or demanding<\/li><li>They ask for financial or other personal information. A genuine company would never ask you to supply this type of information over an email<\/li><li>It includes a suspicious attachment<\/li><li>The email address looks suspicious. Before responding to anything, always check the email address.<\/li><li>The link looks suspicious. If you hover over the links in the email and they don\u2019t show the URL of the company the email is apparently from or are lengthy and confusing, this is another sign of a phishing attack<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong>Ransomware<\/strong><\/h3>\n\n\n\n<p>Ransomware infects your computer and holds data to ransom; this can lead to a demand of a substantial amount of money for its release. It occurs through gaining access to computers via phishing emails with infected links or attachments which employees can click without knowing it\u2019s infected.<\/p>\n\n\n\n<p>Below are common signs of a ransomware attack:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can\u2019t access your desktop or files<\/li><li>Your files have a new extension appended to their name. While a word document will have .doc at the end for example, an infected file might have a strange extension such as .ezz<\/li><li>Software tools you haven\u2019t installed are appearing on your network<\/li><li>Unexplained administrator accounts have been created<\/li><\/ul>\n\n\n\n<p>If a ransomware attack occurs within your organisation, it is important that the demanded payment is not paid. By paying the amount, it does not ensure that you will get your files back nor does it prevent future attacks.<\/p>\n\n\n\n<p>How can you prevent this? <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Conduct regular back ups<\/li><li>Update all software<\/li><li>Use strong security software<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong>DDoS Attacks<\/strong><\/h3>\n\n\n\n<p>DDoS stands for a distributed denial-of-service attack. This is to purposely attempt to disrupt traffic to a network, this will result in businesses not being able to trade for minutes, hours and at times days. This is due to the company\u2019s server shutting down.<\/p>\n\n\n\n<p><em>How can you prevent this?<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Secure your network infrastructure<\/li><li>Update systems and networks regularly<\/li><li>Know the amount of bandwidth your business uses and add more if needed<\/li><li>Ensure basic network security is installed<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong>Hacking<\/strong><\/h3>\n\n\n\n<p>Many businesses can get hacked for many reasons. Below are ways to prevent hackers from gaining access to your network and system:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use strong passwords<\/li><li>Use two-factor authentication<\/li><li>Have different passwords for everything<\/li><li>Choose an Internet Service Provider that offers built-in security features<\/li><li>Keep anti-virus and anti-spyware software up to date<\/li><li>Install a network firewall<\/li><li>Encrypt customer data and sensitive information<\/li><li>Limit access to certain online information<\/li><li>Block high-risk sites from being viewed by employees<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\"><strong>Viruses<\/strong><\/h3>\n\n\n\n<p>Ensure your computer software is updated regularly to protect any viruses from harming your network, systems, and devices.<\/p>\n\n\n\n<p>By installing an anti-virus software, it will ensure updates are made regularly and clear out any harmful or potentially harmful viruses.<\/p>\n\n\n\n<p>It\u2019s also important to ensure your small business is aware of the signs of a virus so you can deal with the problem quickly. Signs that your computer has picked up a virus include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Unexpected shutdowns<\/li><li>Your computer has slowed down and\/or takes a long time to shut down or restart<\/li><li>Repeated error messages<\/li><li>New toolbars you didn\u2019t install<\/li><li>Changes to your homepage<\/li><li>Your battery drains very quickly<\/li><\/ul>\n\n\n\n<p>Although the risks of virtual attacks are high, especially for small businesses, it is extremely important to ensure you take the steps above to reduce\/or eliminate it from occurring by ensuring employees are always trained and are aware of the signs.<\/p>\n\n\n\n<p>Contact National CRC Group today to find out how we can help you and your small business with cyber security for your networks and systems.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/fatbuzzhosting.com\/ncrcgcontact-us\/\" style=\"background-color:#e44707\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing, malware, ransomware, and more. Is your business at risk? <\/p>\n","protected":false},"author":2,"featured_media":2184,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,13,18,16,17,14],"tags":[],"class_list":["post-856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack","category-cyber-security","category-malware","category-phishing","category-ransomware","category-smes"],"acf":[],"_links":{"self":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/posts\/856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/comments?post=856"}],"version-history":[{"count":0,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/posts\/856\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/media\/2184"}],"wp:attachment":[{"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/media?parent=856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/categories?post=856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fatbuzzhosting.com\/ncrcg\/wp-json\/wp\/v2\/tags?post=856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}