We'd love to hear from you

If you have an enquiry about our solutions or services then feel free to drop us a line to see how we can help.

News


The Fort of Cyber Security – What is Malware?

The Fort of Cyber Security – What is Malware?

The existence of Malware is to cause chaos, don’t invite it into your Business

What exactly is Malware?

Malware is a contraction of malicious software. The pieces of software that are specifically designed with the intent of causing damage to devices, the aim of stealing private data or to simply cause destruction and chaos.

Often designed by a group of cybercriminals or hackers, looking to make money from either selling the software over the dark web, or by spreading the malware content themselves. Regardless of where the malware started from or who spreads it, if it ends up on your PC, it’s not good news.

What are the different types of Malware?

Coming in all different shapes and sizes, with a variety of forms, some types are much more harmful than others:

Computer Viruses – Anything that’s clean, viruses attach themselves to infect files, spreading uncontrollably damaging anything and everything in its path. Usually appearing as .exe files within your system.

Trojans – Disguised as what you think is legitimate software, or hidden with software that was once legitimate. Acts discreetly and creates back-doors within your security to let malware in.

Spyware  – Spyware, as you can probably guess, is malware specifically designed to spy on you, your actions and what you get up to. tracking your browsing habits, noting passwords entered and learning all your security procedures.

Ransomware – Malware that locks down your system, encrypts your files and will threaten to erase everything until you pay a hefty ransom.

Worms – Just a wriggly, if not more with your IT Network. Worms infect entire networks of devices, either locally or across the internet by using network interfaces. Using infected machines as it goes to infect others.

Adware – Not the most malicious in nature, simply aggressive advertising software that undermines your security to serve you an obscene amount of pop ups, which can allow other malware content to sneak in.

How do you prevent Malware?

When it comes to preventing malware, it’s more advised to follow rules to block it in the first place, instead of trying to find a cure to remove it from your IT systems after. There are a few common sense practises to follow to avert malware from entering your infrastructure.

Don’t trust anyone online; Hackers have and will use social engineering to specifically target you, including strange emails, sudden alerts as well as fake profile and special offers too good to be true. If you don’t know what something is, don’t click on it.

Check your downloads; From official storefronts to dark websites that lurk in the corner of the internet, wherever you plan to download a file, be cautious that it could still be infected, regardless of where you found it.

Ad-blockers are the key; With advertising so prominent on websites, not all of them are what they seem. Hackers can use infected banners to trigger downloads once clicked, be wary to click on any that seem enticing.

Browse carefully; Sticking to trustworthy sites is always the best way forward. Malware can be found anywhere, but mostly in small, locally hosted websites with poor security standards in place, don’t run the risks.

 

Even if you follow all the steps, there’s unfortunately no guarantee that you’ll remain malware free. Given the fact that worms have evolved from the depths of the ground to travel across your IT network infecting machines as it goes, no one is deemed safe.

 

 For more info get your free pinpoint guide on Malware below

 

 

** Discover the top 15 recommendations for your Cyber Security **

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

 

The Fort of Cyber Security – What is good Password Security?

The Fort of Cyber Security – What is good Password Security?

A password is the drawbridge to your entire digital world… don’t make it weak

What exactly is good Password Security?

Passwords are the digital keys to your online network of almost everything; friends, family, work and your financial accounts. If you take the risk and disregard the strength & integrity of your passwords, you’ll probably find that many other people also know what it is.

The aim is to form a memorable, yet strong password that won’t be easily broken. The two most important passwords are those for your email and social network accounts, if someone has access to your email, they can ‘forget password’ there way into all of your other accounts. Enabling them to scam your friends with dangerous links, fraudulent messages asking for money… Passwords are important, it may be the last line between you and a cybercriminal.

How do they attack our passwords?

There are various methods that can be used to crack passwords, below is a list forming of the multiple techniques that cybercriminals will use to break into your personal accounts :

Dictionary attacks – Using simple files that contain words found in the dictionary, you now understand why you shouldn’t use normal words in your passwords…

Brute force attacks – Similar style to the dictionary attacks, brute force also lets the hacker detect non-dictionary words by working through all possible alpha-numeric combinations, (e.g. aaa1 to zzz9). It’s not a fast process, but it will uncover your password eventually.

Rainbow table attacks – If rainbows were actually hashes of all possible password combinations for any given hashing algorithm, I don’t think we’d appreciate them as much. Opposed to the name, rainbow tables are huge, unwieldy things that require a lot of computer power.

Phishing – The simplest method, get the user to do it for you… just by simply asking for it. (Check out Phishing here).

Social Engineering – As the name suggests, the art of phishing, but gathering the information yourself. 

Malware – Such as keyloggers, screen scrapers… pieces of malware that are hidden on your system, recording and scanning your passwords.

Guessing – You’d be surprised how easy it is to guess passwords, a high percentage of people don’t take passwords seriously and will often make passwords from pets names, foods, surnames… it doesn’t take a specialist to figure out ‘Jake1234’.

Never underestimate the importance of securing your data, having multiple, unique passwords for every accounts you access is vital in protecting your business.

How do you make a strong, secure password?

Beginning with the obvious, no dictionary words, names or facts about you, pet names or locations; a strong password is a mixture of letters, numbers, symbols and ambiguous characters. for Example, ‘D56@h]!$vVcs09yH‘. The longer the password, the harder it is to crack.

There are various practises that you should stick by in order to maximise security:

Use Two-Factor-Authentication whenever possible

– Use a combination of Capital letters, lowercase, numbers and symbols alike the example above

– Don’t use simple, common passwords… qwerty… or Dog123456

– Make sure your passwords are at least 10 characters long

– Don’t use any speaking words, as seen by the dictionary attack, it’s too easy to crack

– Change your passwords regularly, you never know if you’ve been hacked

 

Choosing a password is entirely up to the user. The best password is one that doesn’t make any sense.

 

For more info get your free pinpoint guide on Password Security below

 

** Discover the top 15 recommendations for your Cyber Security **

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

 

The Fort of Cyber Security – What is Ransomware?

The Fort of Cyber Security – What is Ransomware?

How to protect your business against Ransomware

What exactly is Ransomware?

Ransomware is a form of malicious software. Which locks and encrypts your computer or device data, then demands a ransom to restore your access.

The cyber criminal uses your own information against you, the files are still on your computer, however they’re all encrypted and completely out of your control. They give you a set period of time and threaten to wipe the system if you don’t pay, causing many businesses to pay the ransom almost immediately.

Nevertheless, they’re not as kind as you may think… if you pay up and demand access back to your system, it doesn’t mean they will. You’re then out of pocket, still without all your data. Worst-case, if you pay up and they do return your files, they now know you’re able to pay up, don’t be surprised if they lock you out of your data again.

What are the different types of Ransomware?

Coming in all different shapes and sizes, with a variety of forms, some types are much more harmful than others:

Crypto Malware – The most harmful form of ransomware, the ability to encrypt everything on your system, once it’s started, you no longer have any control over your files, until you pay the ransom of course.

Screen Lockers – Infects your operating system to completely lock you out of your computer or device, making it impossible to access any of your files.

Scareware – As its name states, it’s used to scare you. Fake software claiming to be antivirus and demands money for ‘finding issues with your computer’.  Some types lock you out but others mostly flood your screen with pop ups and persistent alerts.

Doxware – Otherwise known has leakware, hackers will gain access to and will threaten to leak all your private documents, pictures and information, most victims will pay once their files have been hijacked.

How do you prevent being targeted by Ransomware attacks?

Ransomware is a popular money making market for hackers and can be hard to stop. Prevention is the most important aspect of securing your sensitive data. To block cybercriminals and help safeguard yourself from a ransomware attack, keep these points in mind:

  • Use security software with Advanced Threat Protection; Install trusted security suites to protect your data, you need more than just anti-virus.
  • Keep your Security software as well as your Operating System up to date, on the latest version at all times.
  • Never open email attachments or embedded links without analysing them first, you never know what it might be. similar to Phishing, you can be easily caught out into installing malicious content without you even knowing.
  • Be cautious of emails with attachments that require you to enable macros to view its content, once you enable macros, the malware inside is activated and will enter your system.
  • Use cloud services, they’re fantastic for mitigating ransomware infections
  • Don’t pay the ransom, yes you have a time limit and they’re threatening you with your won files, but a cybercriminal can ask you to pay over and over again and still never release you files, they locked you out, they won’t be kind and let you back in.

 

 For more info get your free pinpoint guide on Ransomware below

 

 

** Discover the top 15 recommendations for your Cyber Security **

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

 

The Fort of Cyber Security – What is a good Data Backup?

The Fort of Cyber Security – What is a good Data Backup?

Having a Data Backup is one thing, but a good one…

What exactly is a good Data Backup?

In this day and age, it’s essential to have backups of your entire IT system & infrastructure. With endless possibilities just around the corner, it’s only a matter of time before you lose everything.

The key to backing up your data is simple, just follow the 3-2-1 backup rule.

In other words, just make sure you’ve got more than 3 copies all in unique, separate locations.

You really want to make backing up data a part of your daily life cycle. If you happen to lose your data due to a hardware defect or ransomware attack, having a backup could save your business.

Where do you even start with a Data Backup?

There are lots of ways to back up your data. Each way has its own procedure. Still, here are some general guidelines when it comes to making a good backup:

Storage is cheap, so it makes the most sense to just back up everything.

Cloud storage offers some advantages over local storage.

The more places your data is backed up, the better.

Don’t underestimate the value of having physical copies of things

Identify what you need to back up.

Backing up isn’t an all-or-nothing proposition.

Never underestimate the importance of securing your data, having multiple, unique versions of your infrastructure or lastly, losing all your data to a malicious hacker.

What options of backup are available?

There are plenty of options to back up your data. It’s smart to understand the types of backup and get one that suits your requirements:

External Hard Drives

– Cloud Backup

– Flash Drives

– Online Backup Services

A lot depends on the kind of data you’re protecting. Cybercriminals can use seemingly unimportant data and patch it together to commit identity theft. A strong backup strategy can make a big difference in your digital life and give you peace of mind.

 

For more info get your free pinpoint guide on Data backup below

 

 

** Discover the top 15 recommendations for your Cyber Security **

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

 

Cybercriminals Leverage Microsoft Sway in a Phishing Attack

Cybercriminals Leverage Microsoft Sway in a Phishing Attack

  • The phishing attack also affects those organizations that do not use the software.
  • The attack is triggered by sending potential victims a malicious Sway phishing page through email with notification for voicemail or fax.

A new report has revealed that attackers are exploiting Microsoft Sway to send phishing emails to unsuspecting users. Microsoft Sway is an app that is available on the Web and Windows 10. The app lets the user create presentations, newsletters, and documents complete with photos, videos, and other media.

What is the matter?

According to Avanan, the phishing attack also affects those organizations that do not use the software.

By creating and posting a Sway page on sway[.]office[.]com, criminals can devise landing pages that look legitimate but actually carry malicious content. Since the pages are hosted are on Microsoft’s own Sway domain, it becomes quite easy for the phishing pages and their links to be automatically trusted by URL filters. In this way, the users are fooled into thinking that the phishing pages and URLs are valid.

How does the attack start?

  • The attack is triggered by sending potential victims a malicious Sway phishing page through email with notification for voicemail or fax. This email includes words like ‘Urgent’ or ‘Important’ in order to create a sense of urgency among the recipients.
  • Once the recipient logs into a Sway site with an Office account, the malicious page appears to be legitimate with Office 365 styling and menus.
  • A malicious Sway page can include trusted brand names affiliated with Microsoft such as a SharePoint logo. Such a page typically displays a tempting URL that invites the victim to click on it. This would cause the download of malware or trigger a spoofed login page.

Bottom line

This is not the first time Sway has been identified as a tool for conducting phishing attacks. In 2018, Forcepoint Security Labs had reported a similar phishing attack leveraging Microsoft Sway. The attackers were using the novel method for distributing malicious links hosted through the legitimate ‘sway.office.com’.

     

    We’re Urban Network, we can help save your Business.

    We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

    Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

    Among our range of skills, we have a specialism in boosting productivity. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase efficiency in the workplace.

    If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

     

    News Source: https://cyware.com/news/cybercriminals-leverage-microsoft-sway-in-a-phishing-attack-f4427945

     

    The Fort of Cyber Security – What is Smishing

    The Fort of Cyber Security – What is Smishing

    Pull up the drawbridge and protect your business from Smishing

    But what exactly is Smishing?

    The word ‘Smishing’ originates from both ‘SMS’ and ‘phishing’ combined. Phishing is the trickery of using imitation to get you to reveal personal, sensitive, or private information.

    However, instead of using email, normal phone calls, hoax websites or VoIP, Smishing is carried out through text or SMS messages. 

    In similarity to both Phishing & Vishing, Smishing also uses a vast selection of scare tactics and emotional manipulation to trick you into giving up your information. The goal of is simple and exactly the same: To steal your money, your identity, or both.

    Why is Smishing so perilous to my business?

    Your private information needs to stay private, with a simple text message, that could all go up in flames.

    Build a moat around your data and learn how to protect it, here’s a few key tactics of Smishing:

     The use of Social engineering – Leveraging your trust in order to obtain your private information

    The threatening approach – “If you ignore this message you will be charged daily until you accept the terms”

    Links & attachments (malicious) – Simple but effective, send 1000 texts with a single link, someone’s bound to click it

    Along with various amounts of siege tools available, cybercriminals have an endless amount of tricks to get your information.

    How do you prevent Smishing attacks?

    Everyone receives texts on a daily basis, most of the time they are from your friends, family or a legitimate source. But, every once in a while, you’ll be targeted by an anonymous number. To help you remain vigilant, below are some specific steps to prevent Smishing:

    – Never reply to unknown numbers unless you are 100% confident it’s trustworthy

    – Don’t reply to text messages riddled with errors & mistakes.

    – Don’t click on any links or attachments within a text message.

    – Never install applications that come through a text message, verify things first but always stick to the app store.

    – If the preview looks dodgy, don’t even open it, just delete it.

    Also, in order to maximise security for your mobile phone, we recommend a VPN. A Virtual Private Network will secure and encrypt any communication taking place between your mobile and the Internet on the other end. Therefore giving you an extra layer of protection.

     

    For more info get your free pinpoint guide on Smishing below

     

     

    ** Discover the top 15 recommendations for your Cyber Security **

    We’re Urban Network, we can help save your Business.

    We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

    Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

    Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

    If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

     

    The Fort of Cyber Security – What is Vishing?

    The Fort of Cyber Security – What is Vishing?

    Protect your business from the realms of Vishing

    But what exactly is Vishing?

    The word ‘Vishing’ is a mixture of ‘voice’ and ‘phishing.’ In which Phishing is the method of using imitation to get you to reveal personal, sensitive, or private information.

    However, instead of using email, normal phone calls, or hoax websites, Vishers use an internet telephone service (VoIP). 

    Using a vast selection of scare tactics and emotional manipulation, the aim is to trick you into giving up your information. These Vishers even create fake Caller ID profiles which makes the phone numbers seem trustworthy & legit. The goal of Vishing is simple: steal your money, your identity, or both.

    Why do I need to know about Vishing?

    Alike anyone else, your identity is everything. Vishing can come in a variety of forms, you need to be ready to catch out what’s real & trustworthy, compared to what’s fraud and will steal everything from you.

    The most common form arrives in the voice of your Bank or your Credit card company.

    “Your personal account has been breached. Please call this number to reset your account.”

    The method of approach here is to inflict anxiety and panic, the fear of losing everything you’ve worked so hard for.

    You might also see Vishing in the form of excitement and freebies.

    “Congratulations! You’ve just won our grand prize of a 2 week holiday to the Maldives.”

    From this point of view that seems fantastic, however you’ll soon be asked to pay a ‘returnable fee’ to claim the prize, you won’t get that back.

    As you can tell, there are hundreds of different methods to trick you into paying money or sharing your details.

    How do you prevent Vishing attacks?

    Everyone receives phone calls on a daily basis, 100% of the time they are completely legitimate, however you’ll always get an unknown number pop up when you least expect it. To help you remain vigilant, below are some specific steps to prevent Vishing:

    – Be aware

    – Don’t give into pressure

    – Ignore phone calls from unknown numbers (If they’re important they’ll leave a message that’ll give you an idea if they’re trustworthy)

    Stay calm, if you’re unsure just hang up

    Always be cautious, certain people can be very convincing

     

    For more info get your free pinpoint guide on Vishing below

     

     

    ** Discover the top 15 recommendations for your Cyber Security **

    We’re Urban Network, we can help save your Business.

    We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

    Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

    Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

    If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

     

    The Fort of Cyber Security – What is Phishing?

    The Fort of Cyber Security – What is Phishing?

    How to protect your business against Phishing

    What exactly is Phishing?

    Phishing is the attempt and procedure of trying to gather private information using fraudulent emails and websites.

    It’s more so known as a cyber attack that uses disguised emails as a weapon. The aim of the cybercriminals is to trick the email recipient into believing that the message is something of high importance — a message from the bank, for instance, or a note from someone in their company. All in hope of getting them to click into the email and open up the attachments or worse, hit reply and send over there identity.

    What are the different types of Phishing?

    Phishing comes in all different shapes and sizes, with a mixture of attacks that all link together in the hope and goal to steal your information.

    Deceptive Phishing – The most common type of attack, Usually an email from a recognised sender, hoping to steal your information via the means of imitating a legitimate provider

    Spear Phishing – More prominent on social media platforms, an email from a recognised sender with personalised information to gain your trust and hopefully your private information

    CEO Fraud – Phishing aimed primarily at the big fish companies; specifically targeting executives. Used to authorise fraudulent financial transfers as well as key information all of the employees.

    Pharming – The method in tricking the user onto a malicious website, by changing the IP address to a trusted name and gaining information via login forms that farm your details.

    How do you prevent being targeted by phishing attacks?

    Phishing attacks are easy to spot once you understand what they want from you and what they look like, whether they plan on stealing your identity, your money or just personal information, there’s a few ways to tell if it’s real or attempted theft:

    • Always check the spelling of the URLs in email links before you click or enter sensitive information
    • Watch out for URL redirects, where you’re subtly sent to a different website with identical design
    • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply
    • Don’t post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media

     

    For more info get your free pinpoint guide on Phishing below

     

     

    ** Discover the top 15 recommendations for your Cyber Security **

    We’re Urban Network, we can help save your Business.

    We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

    Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

    Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

    If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

     

    The Fort of Cyber Security – What is a VPN?

    The Fort of Cyber Security – What is a VPN?

    Protect your business with a Virtual Private Network

    But what exactly is a VPN?

    A Virtual Private Network gives you online privacy & anonymity by creating a private network from a public internet connection.

    VPNs hide your IP address so your online actions are untraceable. Most importantly, VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot.

    Why do you need to use a VPN you ask?

    Browsing the web or transacting on an unsecured Wi-Fi network means you could be potentially exposing your personal information and browsing endeavours. Which is why a virtual private network, more commonly known as a VPN, should be a must for anyone concerned about their online security and privacy. Especially from a business point of view.

    How do you go about choosing a VPN?

    What’s the best way to choose a virtual private network you’re probably thinking? Here are some questions to ask when you’re choosing a VPN provider:

    – Do they respect your privacy?  (You’ll be surprised that not all providers will have a no-log policy…)

    – Do they run the most current protocol?

    – Do they set data limits?

    Where are the servers located?

    Will you be able to set up VPN access on multiple devices?

    – How much will it cost?

     

    For more info get your free pinpoint guide on Virtual Private Networks below

     

     

     

    ** Discover the top 15 recommendations for your Cyber Security **

    We’re Urban Network, we can help save your Business.

    We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

    Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

    Among our range of skills, we have a specialism in securing your data. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase security in the workplace.

    If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

     

    Cyber-Attacks Hit UK Firms Once Per Minute in 2019

    Cyber-Attacks Hit UK Firms Once Per Minute in 2019

    UK businesses were deluged with cyber-attacks in 2019, with the average firm hit by over half a million attempts to compromise systems, according to new stats from Beaming.

    The Hastings-based business Internet Service Provider (ISP) extrapolated the findings from data on its own corporate customers across the country.

    It calculated the average number of attacks aimed at a single business last year was 576,575, around 152% higher than the 281,094 recorded in 2018 and the highest since the ISP began analyzing this kind of data in 2016.

    That means UK businesses were forced to repel 66 attacks per hour on average in 2019.

    The firm identified 1.8 million unique IP addresses responsible for the attacks last year, just under a fifth (18%) of which were located in China. However, this is more an indication of the sheer number of potentially hijacked machines based in the country rather than the origin of the attackers.

    There was a fairly big drop to second placed Brazil (7%), which was followed by Taiwan (6%) and Russia (5%) in terms of originating IP addresses for attacks.

    Attackers most commonly targeted network device admin tools and IoT endpoints like connected security cameras and building control systems, according to Beaming. These suffered 92,448 attacks in total last year, while 35,807 were targeted at file sharing applications.

    Beaming managing director, Sonia Blizzard, described 2019 as the “worst year on record” for cyber-attacks against UK firms, claiming that most were “completely indiscriminate.”

    “Most business leaders, particularly at the smaller end of the spectrum, still don’t recognize the threat or incorrectly assume that their broadband router and antivirus systems will be sufficient to keep them safe,” she continued.

    “With the number of companies falling victim to cybercrime increasing each year, it is clear that most need to do more to protect themselves. We advise businesses to put in place multiple layers of protection, use methods such as two-factor authentication, and to secure their data while it travels over the internet.”

       

      We’re Urban Network, we can help save your Business.

      We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

      Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

      Among our range of skills, we have a specialism in boosting productivity. Ensuring we aid our clients with employing the best & most appropriate practices, procedures and tools to increase efficiency in the workplace.

      If you have any concerns or challenges with your technology generally, we would like to hear from you. Please contact the team today.

       

      News Source: https://www.infosecurity-magazine.com/news/cyberattacks-uk-firms-once-per