Why IT security should be your top priority

Share this Blog post

Failed IT security horror stories and the cost to organisations are common. From data breaches such as 100 million Facebook users being exposed to the internet, to outages and ransomware attacks, the threats and counter-attacks grow daily.

Organisations affected face a huge bill to restore the damage. Last year, a Government survey revealed almost half of UK businesses had suffered cyber or security breaches, most costing thousands of pounds. Some businesses fail following a cyber-attack, especially when reputational damage cannot be restored.

A sensible approach to prevention

The Government’s Cyber Essentials scheme was started in 2014 to help companies of all sizes improve their cyber security. It’s claimed that fulfilling the basic steps will reduce the risk of an attack by 80 percent.

Certification is given to businesses that complete the scheme, proving their commitment to protecting data from cyber threats; it’s one reason why ITRM will become Cyber Essentials certified, to reassure our clients that our treatment of their data is in safe hands.

The new IT security risks

Recently the Vectra 2019 Spotlight Report on Healthcare identified Internet of Things (IoT) devices, unpartitioned networks and outdated systems as more likely to be exploited by cybercriminals looking to steal personal information and disrupt organisations.

This means that WannaCry style ransomware attacks which cost the NHS £92 million in 2017 are less prevalent as it’s easier for criminals to attack HTTPS tunnels, as these often look like service provider traffic. Having said that, organisations should still monitor for ransomware as well as spyware.

Security and IoT

However useful IoT might be, the security risk it poses is clear.

According to Willis Towers Watson employee negligence is responsible for 66 percent of cyber breaches. And yet, it appears some are keener to access the convenience of these devices than consider the security risks.

For businesses, using IoT on a network requires a totally different approach to security to the one required for laptops and smartphones. Mishandled, a failure to secure enterprise IoT could cause untold damage as one US casino found out, after hackers pinched its high-roller database via the smart thermostat of a fish tank in the lobby.

Cloud requires better security

Analysts predict the global cloud computing market will grow by 20 percent this year to exceed $200 billion, while Citrix recently suggested that the term cloud will no longer be required as it becomes the everyday computing model.

Businesses with on premise systems coming to the end of their life will inevitably want to switch to cloud hosting. But the most important issues will be, how best to store vast amounts of data, as well as remote access for staff, partners, suppliers and so on.

While cloud providers have improved their own security protocols, the bigger danger to cloud security is the end user.

Don’t overlook basic security requirements

It might sound overly simplistic to talk about firewalls, anti-virus, software passwords and suchlike but actually, these more basic security features are still being overlooked and yet, are relatively easy to rectify.

With the move towards cloud and more people requiring access, the need for basic security to be in place, is even greater.

Strong passwords prevail

Strong passwords feature highly if organisations are to have any chance of keeping sensitive data safe. This often means needing to train staff on the importance of only accessing such systems from secure locations and ensuring remote locations, such as home computers, meet certain security standards. So too, a bring your own device (BYOD) policy is critical to ensure hardware safety throughout your organisation.

The importance of a backup plan

While nobody wants to think about a worst case scenario it’s always best to be prepared, should the worst happen.

Most companies will have a disaster plan but the IT version isn’t always up-to-date. Being able to immediately detect and respond to a threat is the best way to ensure damage is limited and data is recoverable. The simple fact is that, given the sheer number of attacks businesses are facing, it’s no longer a case of if but more a case of when.  


How We Can Help

Stay on top of the latest cybersecurity threats to your network by getting a free consultation with the experts at ITRM today to ensure you’re as secure as possible.

Share this Blog post

Related Articles

Navigating AI & Cybersecurity: Challenges and Opportunities

Navigating AI & Cybersecurity: Challenges and Opportunities

In this blog, our team of experts have put their heads together to profile the double-edged sword that is AI in cybersecurity, exploring both the challenges and possibilities it opens up.

1st November 2023
5 Reasons Why Small Businesses Need IT Support

5 Reasons Why Small Businesses Need IT Support

For many small business owners, managed IT support is often misunderstood as a luxury only larger companies can afford. For that reason, most small businesses and startups fail to see the value in outsourcing IT support services. However, this blog will detail the reasons why that shouldn’t be the case.

10th January 2022
Visit our blog for more articles like these

Your privacy

By clicking “Accept all cookies”, you agree ITRM can store cookies on your device and disclose information in accordance with our Cookie Policy.

Cookie Settings

When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.