Cyber-attacks are a constantly changing threat, so you need to prepared and act quickly when one strikes
If you have a robust and tested cyber-attack response plan, with assigned responsibilities and defined lines of communication, these events will be manageable. For organisations that don’t, an attack will be incredibly stressful and for some businesses it spells the beginning of the end.
Current reports indicate more than 100 New Zealand businesses a day experience some sort of cyber-attack. At NSP, we believe that figure is understated. And what’s very concerning, is that more than 60% of NZ businesses lack an incident response plan making them highly vulnerable to cyber-crime.
An experienced IT Security Provider can assist your organisation in establishing a robust security posture, criteria to guide your threat response, recovery points for critical business applications and designated lines of communication in order to return your business effectively to operation.
A security plan by NSP will ensure your businesses has the best social and technical preventative measures in place to test for and eliminate vulnerabilities. So when the malicious attack or infection happens you are able to remove, or at least limit, the damage with a well-defined security response plan.
With threats like Cryptolocker on the rise, education regarding social engineering helps create a ‘No Blame’ culture, an important component of your security plan. As many as 80% of employees won’t notify anyone if they feel they have clicked on something suspicious or are experiencing issues that they think they created. Staff need to feel comfortable raising their hands and what immediate action they should take. Simple things like pulling the network cable from the back of their computer or disconnecting from the wireless network will help contain the event and lessen the impact to your business.
Next generation technologies assist in the prevention of these constantly shifting cyber threats and provide a continuous view of your security, enabled by regular updates, frequent maintenance and re-tuning as new attacks arise. However, not all security software is equally effective, so sound advice from an experienced security provider is strongly recommended.
And if a major security event like Cryptolocker does strike, you’ll need to have confidence that you can recover your data assets. Businesses rely on backups, however hackers are smart enough to know this and will make it one of their first targets. Ensuring that your backups are audited, working and secured, so a hacker will have a hard time corrupting or disabling them, is a necessary part of your IT Security Policy.