When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.
Cyber attacks can take many forms and it’s a challenge, particularly for small businesses, to defend against them. The latest UK Government Cyber Security Breaches Survey from April 2023 gives an insight into the types of attack that organisations (and particularly micro and small businesses) within the UK are experiencing. This covers companies, charities and educational institutions of varying size but not the public sector. The results of the survey in the area of attack types is shown in the chart below.
Source: Cyber Security Breaches Survey 2023.
The chart shows eleven types of attack, with ransomware coming in at surprisingly low 4%. We’re going to focus on the five most common cyber attacks and talk about how you can defend your business against them.
The survey identified phishing as not only the most common type of attack, but the one that caused the most disruption to its victims. This is where an email, or similar kind of electronic communication, is received by a user and it contains a malicious attachment, or link, or asks the user to carry out some kind of action, usually urgently. This can result in a number of outcomes, including a virus being downloaded, the device taken over or login details being captured.
To defend your organisation against phishing attacks, the UK National Cyber Security Centre recommends that you take the following actions:
These controls are part of a multi-layered approach to defending your organisation against phishing attacks.
Like phishing, impersonation is a type of social engineering attack which attempts to fool an unsuspecting user into taking some action that benefits the attacker, whether that it is logging onto a website, downloading a file or changing payment details. This may take place via a number of routes, with social media sites such as Facebook, Twitter and WhatsApp becoming increasingly popular. The person being impersonated is often a senior figure within the organisation, such as the CEO.
Because this attack works via persuasion rather than a technical means such as a virus, the main defence against it is awareness training of staff and careful design of procedures so that additional precautions are taken when doing sensitive tasks such as making payments. Everyone must be assured that following the established procedure even when someone they believe to be the CEO is giving them different instructions won’t result in disciplinary action.
Often delivered via phishing emails, this type of software-based attack may result in a malicious program being introduced into the network which will then contact base and download further programs to consolidate its position on your device. In many cases the program is able to copy itself from device to device, so spreading its reach and providing more opportunities for the attacker.
In general, the main defence against such programs is anti-malware software which runs on each endpoint and detects suspicious activity, often quarantining programs it believes to be malicious. Patching operating systems and application software promptly will also remove many of the routes in for viruses and paying attention to the correct configuration of devices is also an effective control that should be applied.
For a small business owner, the thought of someone gaining access to their online business bank account is a nightmare scenario that may keep them awake at night. This type of attack was highlighted in eleven percent of businesses surveyed, making it a necessary priority to address.
Ways to protect against this type of attack include:
Taking these actions will help to keep your well-earned funds secure.
Experienced by a similar number of businesses to the previous two attacks, user account takeover involves an attacker logging on as the user and either taking advantage of the access they have directly, or using it as part of a bigger fraud. Unfortunately, this is often achieved by simply guessing the password based on publicly available information or a list of commonly-used passwords. It could also be a follow-on from a successful phishing attack which has prompted a user to enter their logon details mistakenly thinking they were on a genuine website, where in fact it was one created by the attacker.
To lessen the risk of this attack happening, do the following:
By adopting these policies, you will frustrate the majority of attackers.
You will see that there are common themes in our descriptions of how to defend against the most widespread attacks, including password policies, use of MFA, awareness training and anti-malware software. Based on the idea that a small number of controls could defend against maybe eighty percent of the attacks, the UK Government created the Cyber Essentials scheme, which has the following as its five controls:
This maps well onto the results of the survey. However only five percent of the survey respondents were adhering to the Cyber Essentials controls, showing that there is still some way to go in emphasising the need to protect small business in cyberspace.
But if you need to use your limited time and resources to maximum effect, the good news is that many of the big issues that plague small businesses in cyber security can be addressed by implementing a relatively limited set of controls.
Written by CertiKit’s CEO, Ken Holmes CISSP, CIPP/E. Ken is the primary author of CertiKit’s toolkit range, an ISO 27001 Lead Auditor and has helped to implement, operate and audit ISO certifications over a varied 30-year career in the Information Technology industry.
(Image by jcomp on Freepik)
The CertiKit Cyber Essentials Toolkit is designed to help implement the five key controls of Cyber Essentials quickly and effectively with much less effort than doing it all yourself. Our high-quality template documents and checklists come complete with 12 months of support and lifetime updates. Using the toolkit is the first step to securing your IT systems and will prepare your business for certification.