We'd love to hear from you

If you have an enquiry about our solutions or services then feel free to drop us a line to see how we can help.

Cyber Security


You might have been hacked, but would you know?

You might have been hacked, but would you know?

Identify and act on cyber threats to your business with Endpoint Detection & Response

 

Learn lessons from cyber-attacks to better defend your business

Businesses are facing well organised and dangerous attackers, including nation states and cyber-criminals that are determined to breach your cyber defences. Attacks are on the rise and, with the random nature by which IT networks are penetrated, it’s becoming an unfortunate inevitability that we will all suffer from an attack at some point, regardless of whether we have been specifically targeted or not.

We shouldn’t have to sit back and suffer… with the extreme rate of attacks taking place, why should we not learn lessons from what’s happened and use those lessons to better improve our defences for next time?

Adapt & better defend yourself with Endpoint Detection & Response

With an Endpoint Detection & Response (EDR) service, you cannot only be actively alerted to attacks taking place, but benefit from intelligent insights that break-down the steps involved to spot patterns & stop the same attack from taking place again.

All credible security vendors that supply & support EDR services will permit their customers access to the global intelligence and remedial protection insights gained globally from deployments of their software across each endpoint device.

What can we do with the insights?

EDR supports targeted attack analytics, which is a holistic approach to attack detection. Making advanced AI and expert threat research available to any organisation that’s a customer of the EDR product.

There is no longer the need to manually correlate scans of your devices, with limited intelligence gained from only your own network. This fragmented approach results in visibility gaps, too many false positives, longer threat dwell times and less precise detection.

With the power of EDR, your outsourced IT partner or internal IT personnel, can be the step-ahead in protecting your business with security awareness otherwise unavailable to them.

How does EDR work?

EDR collects event data across multiple termination point, including end user computers, servers, email and cloud applications, providing a holistic view across the business and a global view based on telemetry from thousands of enterprises.

The security vendor employs data scientists that create analytic applications, which employ the latest artificial intelligence and advanced machine learning techniques to detect suspicious activity. This activity is investigated by their own attack investigation teams, who’s role it is to determine actual attack patterns occurring in your environment and feedback critical updates to your console in real time, with details of the attack actor, the devices impacted by the attack and advice on remedial actions to take to repair & protect further exposure.

 

Want to get the best of cyber security for your business?

At Urban Network, we take a security first approach to everything that we do with technology.

If you have any concerns, questions or simply want to explore how to better secure your business, please do get in touch with the team for a FREE demonstration and initial consultation to explore how exposed your business might actually be.

To book a consultation or to arrange a further discussion, please get in touch via our form here, call 020 7749 6899 or email us hello@urbannetwork.co.uk.

Data backup…your last line of defence in the war against hackers

Data backup…your last line of defence in the war against hackers

Data backup…your last line of defence in the war against hackers

What is the threat to my data?

In the rise of threats to our valuable & private data, cyber-criminals are forever creating new ways to disrupt and defraud our professional and personal lives. One of the cyber threat trends that has seen a sharp increase in activity within recent years is Ransomware.

Ransomware takes its action via the form of malicious software that restricts or removes your access to file data stored on your computer or server. Downloaded from an illegitimate website or arriving on your computer via an email link or attachment, the Ransomware application rapidly installs itself & begins to infect or take control of your file data without the computer user even necessarily being aware an attack has taken place.

Ransomware, as the name suggest, is a means by which hackers can take something belonging to you or your business and hold it to ransom for release upon receiving a monetary payment from you. Although, there’s no guarantee they’ll even release the file upon receiving your payment!

 

Can we stop ourselves becoming a victim?

Although it is critical to ensure you have cyber defences in place, it is almost impossible to ensure that you are 100% protected from the threat of cyber-crime, particularly from the specific threat of Ransomware.

The malicious software used to launch a Ransomware attack is constantly evolving and can take many forms, despite security vendors continually updating their software & threat analysis, there is a strong chance that an innocent action by one of your users will result in their machine becoming infected at some point.

 

What can we do if we’re attacked?

Firstly, make efforts to limit your exposure to attack by ensuring you have cyber defences in place and have conducted awareness training for your team.

But, when you inevitably suffer from an attack, your last line in the defence against cyber-crime is to rely upon secure recovery point from a current, ring-fenced data backup solution.

With a professional-grade backup service, you can benefit from peace of mind that your up-to-date data is stored, securely, in an alternative offsite location and is ready for recovery at a moments notice in the event of loss or corruption to any, or all, of your files or system data.

 

But we already backup data to a disc?

Having a data backup of any kind is a helpful initial step to take in a bid to recover your data in the event of any loss. However! A basic backup to an external disk is by no means a reliable or secure means to achieve true peace of mind with all of your system data.

There are a number of manual elements to a disk backup that limit its effectiveness in a disaster; most critically, the need for a person to take the disk offsite and remember to bring it back again.

In the event of a Ransomware attack, should the disk be connected to the network, it will most likely be infected and render the backup useless. This, twinned with limited means of running effective regularly scheduled backups, results in a data backup to disk being a too restrictive and risky means of recovery in the event of a disaster.

 

What should we do instead?

All businesses should operate with an automated on-site + off-site backup service, confirming to the 3-2-1 backup rule.

3 copies of your data – one active on your server/cloud storage/computers, one local backup copy and one offsite copy.

2 forms of media – varying medium of disk or device used to store the backup copies.

1 copy held offsite.

The service should be managed and monitored daily by your external IT service provider or member of internal IT personnel – with strict urgency placed on taking action in the event of a failure or issue logged from the previous day’s backup.

It all sounds costly, however implementing a professional-grade backup solution doesn’t have to cost the earth; particularly if you factor in the cost and inconvenience of a total, or even partial, loss of data.

Employing these rules within your business can go a long way to ensuring a fast & effective recovery from a disaster, should you suffer the loss or corruption of any data, however large or small.

 

Want to get the best of cyber security for your business?

At Urban Network, we take a security first approach to everything that we do with technology.

If you have any concerns, questions or simply want to explore how to better secure your business, please do get in touch with the team for a FREE demonstration and initial consultation to explore how exposed your business might actually be.

To book a consultation or to arrange a further discussion, please get in touch via our form here, call 020 7749 6899 or email us hello@urbannetwork.co.uk.

Who else knows your username & password?

Who else knows your username & password?

Your details might be all over the Dark Web… what is it?

There are three varying grades of the internet – the ‘Public Web’, surprisingly forming only around 4% of the internet, is what we all use everyday, and includes services like websites and social media platforms. The ‘Deep Web’, representing the largest amount at around 93% of the internet, consists of private servers & systems, such as cloud services and CRM databases. Which leaves around 3% of the internet cordoned off typically for illegal activity. Identified as the ‘Dark Web’, untraceable and difficult to access, it is therefore a prime location for the shared activities between criminals of all kinds.

 

How do my details get there and why?

If a hacker has been able to steal a list of user login credentials from a particular system or service; these private details will have value to other cyber criminals, and therefore are shared and sold with other parties on the Dark Web.

This community want access to your details to penetrate your lifestyle, mimic your actions and, through a number of different means, look to defraud you and those you are connected with.

 

Should I be worried?

If your login credentials, email addresses and passwords, have been exposed and listed on the Dark Web, they will likely be available to anyone & everyone that wants them….

And, far worse; if you typically use the same passwords, email addresses and login IDs across lots of different platforms you access, such as accessing your online banking, social media profiles, email accounts and private photo & data storage; you are incredibly vulnerable to cyber-attack and being defrauded via your entire internet presence.

With access to all of these private services, it is incredibly likely your identity will be stolen and used as a platform to try to defraud those you are connected with via social media and email.

 

But, what can I do?

There are services available that can scan the Dark Web and first & foremost identify whether you are at risk. Such services can maintain a constant look & watch by trawling the data found within the dark web for your personal credentials, such as; email address, or other associated usernames or handles, and then raise an alert if anything of note can be found at any time.

If your details are found, you are then immediately made aware of your position of vulnerability, and critically can take action by at least resetting your passwords and user IDs wherever used.

 

How can I avoid becoming a target?

It is almost impossible to stop yourself from becoming a target; an unfortunate harsh reality we must all accept, is that at some point, our personal data will be stolen from somewhere. Whether that’s through our own lack of cyber security, being the victim of a phishing attack, or, a mistake on someone elses part.

BUT! What’s more far more important is being aware when you’re at risk, and having a process in place to mitigate your exposure both personally, and for your business. By implementing best security practices, such as the setting of secure passwords, ensuring that you regularly change those passwords, differ the passwords & login details across different systems, and lastly, implement cyber security features such as 2-Factor / Multi-Factor Authentication (2FA/MFA).

By enforcing cyber security features, such as 2FA or MFA, you are able to add another hurdle to cyber criminals in the process of accessing web-based data & services, beyond the first-tier of only usernames and passwords. Should your password be obtained elsewhere and that person tries to access a system that you use, you’ll receive notification by text message, phone call, or email, to your device to authorise that login; therefore faulting cyber criminals from getting to your data.

 

Want to get the best of cyber security for your business?

At Urban Network, we take a security first approach to everything that we do with technology.

If you have any concerns, questions or simply want to explore how to better secure your business, please do get in touch with the team for a FREE demonstration and initial consultation to explore how exposed your business might actually be.

To book a consultation or to arrange a further discussion, please get in touch via our form below, call 020 7749 6899 or email us hello@urbannetwork.co.uk.

Dark Web Demo