Now more than ever, businesses both large and small must proactively strengthen their cyber security defence to prevent data breaches and the high cost that comes with it. In 2022, a successful ransomware attack took place every 40 seconds, with an attempt occurring nearly every 11 seconds.

With cybercrime set to cost companies worldwide an estimated $10.5 trillion annually by 2025, improving cyber security defences has become a key theme in 2023.

Gartner predicts that by 2025, 60% of organisations will use cybersecurity risk as a "primary determinant” when choosing who to conduct business with. So, not only will your cyber security defences affect your internal security but also your future growth plans.

So, what attacks should you be aware of and what cyber security defences can you toughen up to deter those hackers and keep your data safe?

1. Social engineering

What is social engineering?

Social engineering is a form of attack which uses manipulation techniques to make security mistakes, reveal confidential data or offer up your personal information.

The attack: The attacker will research you and use information you have provided online such as on social media, Personal identifiable information (PII), contacts, location data, billing info, education and employment.

The cyber security defence: You need to be in control of your data.

  • Providing regular cyber security training to ALL your employees will keep them aware of social engineering indicators such as an unusual sender address, poor language in emails, and requests for sensitive information.
  • Check permission and privacy settings of any software or apps you use by disabling the location data and by not providing any PII.

2. Phishing, vishing, smishing

What are phishing, vishing and smishing?

Phishing, vishing and smishing are delivery methods for an attack, which use time pressure and emotions in an email or message. This causes us to react and will trigger a fight or flight response.

The attack: Attackers want you to share personal details such as passwords and bank details, open malicious links, or send money to them.

  • Phishing: This usually happens in emails or messages impersonating big names. It often includes a link for you to click. 95% of all cyber-attacks include phishing.
  • Spear phishing: This is a message curated just for you as a targeted and researched attack.
  • Vishing: This is voice imitation via voice messages or phone calls that try to steal identities.
  • Smishing: This happens via text message with a link, and it harvests your data.

The cyber security defence: Firstly, take 5 minutes to STOP fraud before actioning anything. Make sure you have an email security solution like Mimecast to stop business emails being compromised.

  • Always use the official contact details from the sender or company, if you need to contact them.
  • Always check the full sender's address, ask yourself were you expecting it and was the request out of the ordinary?
  • Think before you click links or open attachments that look unfamiliar
  • Use a search engine to see whether someone has previously flagged the message or text as malicious.
  • Use an 'I will never' list. For example, never ask for a pin code by this device.
  • Report any spam or anything suspicious-looking emails to your IT team or email security provider

3. Account security

What is account security?

Broadly speaking, account security refers to any action businesses take to defend their users' accounts and their business networks from cyber attacks.

A primary example of this is passwords. They might be simple to you but 59% of people reuse the same password, according to Spycloud. These are easy to remember, but also exceptionally easy for hackers to hack.

The attack: Bad passwords are the easiest way to compromise a system.

The cyber security defence:

  • Use a password manager where you can store, generate and recall all your passwords. Trusted password managers include Google password manager, Apple Keychain, NordPass and Bitwarden.
  • Use Multi-Factor Authentication (MFA) for the things you care about the most. Microsoft can vouch that 99.9% of attacks can be prevented with MFA. Even if your account is compromised, criminals cannot access your account.

Keep 3 passwords outside of password manager (email, password manager, MFA account) in ensure that you don’t lose complete access!

4. Secure connections

What are secure connections?

A secure connection is a connection that is encrypted by one or more security protocols, allowing data to be transferred safely. By contrast, an unsecure connection refers to one that is not encrypted. You are most at risk when using public Wi-Fi and insecure websites. In fact, 1 in 4 Wi-Fi hotspots are insecure.

The attack:

  • Some tampered Wi-Fi boxes can listen in to your phone calls and look the same as free Wi-Fi names.
  • Don’t enter data in websites that do not use HTTPS in the address.

The cyber security defence:

  • Use a secure VPN, which acts as an encrypted tunnel across your network.
  • Use your cellular data when out and about as opposed to free Wi-Fi.
  • Use HTTPS websites, they have an added layer of security.

5. Malware

What is malware?

Malware is a malicious form of software which interferes with the normal function of software and hardware; it typically includes viruses and can infect any device.

The attack: The most common attack is ransomware where hackers cease control of computer systems using code. Often hackers will demand you pay a ransom to get your data back.

The cyber security defence: Keep devices updated.

  • Only install apps from official app stores
  • Turn on automatic updates so you are always running the latest software version
  • Back up important data in the cloud.

6. Internet of Things (IoT)

What is the Internet of Things?

The Internet of Things is a network of physical objects with processing ability, sensors, software or other technologies that facilitate the connection and exchange of data with other devices and systems via the Internet.

The attack: Smart devices can be infected with bots (malware).

The cyber security defence:

  • Always read security reviews before buying a device and only buy from trusted companies.
  • Change default passwords on your device and router, to make that first line of defence very tough.
  • Ensure you have a firewall or that it is switched on to secure your network.
  • Use MFA on your devices.
  • Take work calls in a secure location where no prying devices could be listening.

Prevention is the key to reducing the risk of a cyber breach. By investing in cybersecurity software, using a VPN, and being aware of the common attack methods, businesses can continue to operate without interruption, whilst having strong defences in place to reduce any risk. If you are a victim of any fraud, please report it to Action Fraud.

How can you improve your cyber security defences?

There are many actions to take to ensure that your business is fully equipped with optimal cyber security defences. Review your strategy and invest in the proper protection before it is too late.

What are the first steps? Here are a few ideas to help you start strengthening your cyber security defences. First, get the experts in and achieve the government recognised Cyber Essentials Plus certification. Then, tackle one of the most prevalent forms of cyber attack: phishing. Performing email phishing assessments, internal and external penetration testing, and web app testing will give you insights into how strong your cyber security defence is and highlight areas for improvement. Finally, ensure that you train your people using simulations and email security awareness training so they are prepared if a breach was to occur.

At T-Tech, we can help you with all of this. Get started today by booking a meeting.

Get in touch

___________

Resources

Action Fraud. https://www.actionfraud.police.uk/

UK National Cyber Security Centre. https://www.ncsc.gov.uk/

NCSC advice: Mitigating malware & ransomware attacks: https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks#stepsifinfected

Report a phishing email to: report@phishing.gov.uk

Report a smishing Text message: forward the message, phone number or company name to 7726. This is a free service.

Password strength check: https://howsecureismypassword.net/

Password breach check: https://haveibeenpwned.com/

Government Code of Practise for Internet of Things (IoT) devices: https://www.gov.uk/government/publications/code-of-practice-for-consumer-iot-security

OTHER NEWS

Be Ready for the Automation Revolution

Its clear automation has the power to revolutionise the UK accountancy sector, empowering accounting firms to unlock their full potential. At the recent ICAEW Annual Conference AI was a hot topic and speakers spoke of practical applications of its...
READ MORE

Microsoft Copilot: what is it, why does it matter and what you need to know

You may have heard the words Microsoft Copilotbeing used when looking at recent trends in AIWell, the new AI offering from Microsoft is being released next year. Microsoft are betting big on Copilot, having invested 13 billion dollars over the...

READ MORE

Explore Microsoft's Copilot

Are you ready to revolutionize the way you do accounting? Imagine streamlining your accountancy practice, boosting productivity, and delivering exceptional results for your clients, all with the power of artificial intelligence. Microsoft's Copilot...

READ MORE

Streamline Success: 4 Lessons from the Intapp Webinar

Staying ahead in the accountancy industry is not just about crunching numbers; it's about embracing innovative solutions. More than just a recap, this blog will show the key takeaways of using a document management system from Intapp, which can shed...

READ MORE

Microsoft 365 Copilot is coming but is your organisation ready?

Technology is rapidly evolving and many industries like the accountancy industry are embracing the advantages it has to offer. Microsoft has finally introduced their ground-breaking AI tool namely Microsoft 365 CoPilot, designed to transform...

READ MORE

T-Tech Ranked on Channel Futures 2023 prestigious MSP 501 list

T-Tech has been named as one of the world’s premier managed service providers in the prestigious 2023 Channel Futures MSP 501 rankings.

READ MORE

10 questions accountants should ask their IT provider

As businesses increasingly rely on technology to operate efficiently, it's important for accountancy firms to have a reliable IT provider to help manage their systems. However, finding the right IT services for accountants and the right IT provider...

READ MORE

Why Antivirus and 2FA Alone Won't Suffice for an IT Security Strategy

Antivirus and two-factor authentication (2FA) are two commonly used security measures in the world of cyber security. While these measures can be effective when used properly, they should not be relied upon as the sole security strategy for several...

READ MORE

The Power of AI in Accounting: A Game-Changer

Artificial intelligence (AI) has been transforming various industries for several years now, and the accounting industry is no exception. AI has the potential to significantly improve the efficiency and accuracy of accounting tasks, and it's time...

READ MORE

Practice Gateway: T-Tech’s answer to moving beyond the MTD conundrum

“For 30 years we’ve had the self-assessment tax return ‘season’ – a complete slog for tax teams to endure and navigate. That time is about to end, in dramatic change.”

READ MORE

Time to close the books on traditional accounting and upskill with automation

The accountancy market is going through unprecedented times. There is significant client demand, pressure on fees, and the market for recruitment means salaries are going up, and people have less loyalty toward their employers. Recruitment for the...

READ MORE

T-Tech 2022 Wrapped is here. Here are our most memorable moments.

To say this year has been busy would be an understatement. We have had a jampacked year full of highs and lows (but mostly highs!), so let’s take a look back at some of the highlights.

READ MORE

Over half of UK accountancy firms are making technology solutions a priority, report finds

More than half of UK accountancy firms are making technology solutions a priority over the next 12 months, but 88% feel overwhelmed about the options available.

READ MORE

Daniel Teacher named One To Watch in The LDC Top 50 Most Ambitious Business Leaders programme

Daniel Teacher, Managing Director of T-Tech, has been named as a One To Watch in The LDC Top 50 Most Ambitious Business Leaders programme for 2022.

READ MORE

MTD for ITSA: get ahead of the curve and prepare your clients

Making Tax Digital is evolving. We saw MTD-compatible technology take the industry by storm in 2019, and now it’s advancing even further with MTD for ITSA being introduced in April 2024.

READ MORE

The latest and greatest in Microsoft Teams

What more can Teams do for us that it isn’t doing already? From the shift to remote working, and now to hybrid, it feels as though we’ve got all the tools we need within Teams. But there’s always room for improvement, and we are lucky that Microsoft...

READ MORE