So, you’re confident that your organisation is not at risk of cyber attach. All your machines have anti-virus software, you’ve got a secure internet connection and machines are locked down with password protection… And we sincerely hope that you’re right to feel relaxed and contented that all is in hand.
HOWEVER, and we’re not meaning to be alarmist, you should be aware that there are still ways for those nasties to infiltrate your IT systems, and home-use is one of those ways.
Imagine the scenario. A dedicated member of your team has picked up an email over the weekend letting them know that an important proposal needs to be submitted early next week. Having inadvertently left their laptop at work they set about preparing the proposal on their home PC, including plenty of business sensitive information. Remembering their server passwords they upload the document to the cloud in order to share the proposal with the team as soon as possible. But low and behold – they’ve also managing to transfer malware (malicious software) at the same time – not exactly what they (or you) had in mind… And there’s the risk that sensitive information has been made freely available to those that can’t be trusted with it. They then send the document over email, spreading the damage still further.
So, how to avoid this type of scenario? Well, firstly, let us help. We can run through the various scenarios with you so that you’re fully aware of how malware can be spread. As cloud-based servers become the norm, and as we all adopt a multitude of devices on which we can work, so the risk of attack has increased dramatically, but there are ways of minimising risk. We’ll also work through the Government’s Cyber Essentials programme, bringing your kit, systems and procedures in line with recommendations, helping to limit the risk of cyber attack.
To conclude, the risks of cyber attack grow continuously BUT that doesn’t mean we shouldn’t be able to sleep soundly with the right systems, software and procedures in place.