We'd love to hear from you

If you have an enquiry about our solutions or services then feel free to drop us a line to see how we can help.

News


Your servers are full of Data, Cyber Criminals love them.

Your servers are full of Data, Cyber Criminals love them.

P 37% of cyber attacks are discovered directly on servers, making them the most likely place to identify an attack within an organisation. That’s one of the alarming stats taken from a recent survey of 2,700 IT managers around the world.

 

 But why are servers such tempting targets for cyber hackers?

1. Servers are at high value

Servers often contain an organisation’s most valuable data. For example, personally identifiable information (PII) such as employee and customer records could be stolen if they’re not adequately secured (for example, with encryption) on the server.

Regulations, such as the strongly introduced GDPR that protects EU citizens’ data, levy significant fines for non-compliance. Attackers know this and will threaten to release sensitive data if their demands are not met.

2. Server downtime is very costly

Servers are the motherboard of organisations and are critical to their day-to-day functioning. Unexpected downtime can seriously impact productivity by revoking access to important files or communication tools such as Microsoft Teams. Ransomware attacks can cause organisations to grind to a halt unless a costly ransom is paid.

In instances where an organisation is reliant on servers for commercial function downtime can be even more severe.

3. Servers are the perfect staging ground to attack

Servers are usually strongly connected in an organisation’s network. They are also online & running 24/7 all year round, which makes them an ideal platform for launching further attacks and performing reconnaissance looking for weak spots to exploit across the entire network. If you can’t identify a compromised server, the gates to your IT stronghold could be wide open to the elements.

So what can be done in order to secure your organisation’s servers? The answer is in the right combination of advanced protection, visibility with powerful tools like Endpoint Detection and Response (EDR) and server specific features such as File Integrity Monitoring.

With Sophos Sandstorm, you’ll receive a next-gen advanced threat defence. It provides a whole new level of targeted attack protection, visibility & Analysis. IT can quickly & accurately identify evasive threats before they enter your network.

What other solutions miss, Sophos Sandstorm uses powerful, cloud-based, next-generation sandbox technology.

 

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

GDPR Fines are nasty, here’s a few ways to avoid them.

GDPR Fines are nasty, here’s a few ways to avoid them.

In the recent months as you’re well aware of, both British Airways (BA) and Marriott Hotels have hit the headlines because of eye-watering GDPR fines – £183 million for BA and £99 million for Marriott.

The fines show that the GDPR (General Data Protection Regulation), has given enforcers like the UK’s ICO (Information Commissioner’s Office), some serious tools to play with. BA’s fine is almost 400 times larger than the ICO’s previous record fine – a unworthy $645,000 penalty handed to Facebook for the Cambridge Analytica scandal.

With these new fines in play, we highly recommend you make sure you’ve minimised your risk of being next in the firing line.

GDPR is focused on protecting European Union citizens and it applies to anyone who holds personal data on an EU citizen, wherever in the world you are located. Marriott, a U.S. organisation, is a case in point.

Here are five best rules we recommend all organisations stick to, in order to minimise the risk of a GDPR data loss fine:

  1. Patch early, patch often. Minimise the risk of a cyber attack by fixing vulnerabilities that can be used to gain entry to your systems illegally. There is no perimeter, so everything matters: patch everything you can get hold of.
  2. Secure personal data that’s in the cloud. Treat the cloud like any other computer you own – close unwanted ports and services, encrypt data and ensure you have proper access controls in place. And do it on all your environments, including QA and development.
  3. Minimise access to personal data. Reduce your exposure by collecting and retaining only the information you need, and making sure the only people with access to it are the people who need it to do their jobs. Not everyone needs access to certain data.
  4. Educate your entire team. Ensure that everyone who might come in to contact with personal data knows how they need to handle it – this is a GDPR requirement. Whether they’re invovled with computers or not, everyone needs to know.
  5. Document and prove data protection activities. Be able to show that you have thought about data protection, and have taken sensible precautions to secure personally identifiable information.

We can help

Urban Network can perform tests on your systems to ensure they are protected, as well as information that your business is conforming to best practice, including penetration testing and intrusion testing, however the very basic elements of patching endpoints with vendor security patching, and ensuring antivirus is up to date is the often overlooked start point.

Our Sentinel monitoring software can cover these elements of your network, and coupled with one of our recommended Enterprise Firewalls, the basics are all covered.

To add extra layers of additional security, Urban Network can liaise with you to ensure that there are comprehensive policies in place for password control, access control and network housekeeping and importantly remote access and BYOD policies. We can look at the current implementations of any other facet of your network, and give advice on industry best practices to ensure your business is sufficiently covering your risk.

 

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

With the power of Firewall, you can prevent Ransomware.

With the power of Firewall, you can prevent Ransomware.

Ransomware has vaulted to the top of the news, again. With devastating attacks continuing to impact governments, education and business operations in multiple states, counties and countries, With the United States being the most recent under attack.

Capital One was a major firm recently caught under fire of Ransomware.

These attacks can start in a number of different ways – some start with a simple phishing email, others begin with hackers leveraging vulnerabilities in networking stacks to gain a foothold and move quickly to other systems on the network. One of the most devastating network vulnerability exploited in a ransomware attack was Capital One a couple of months ago.

Since then, new vulnerabilities have been discovered, but there are still many networks out there that are vulnerable.

Unfortunately, many of these un-managed networks stack vulnerabilities that are ‘wormable’ which means that hackers & malware can exploit these holes in an automated method with no user interaction, enabling the infection to spread quickly and easily to a wide group of systems.

Of course, deploying an industry leading protection product like Sophos SG Series, and maintaining a strict patch management strategy are top best practices. But there are also other best practices you should consider to help keep ransomware, hackers, and attacks off your network in the first place.

Your firewall provides essential protection against exploits by closing up or protecting vulnerable ports, as well as blocking attacks using an Intrusion Prevention System (IPS). IPS looks at network traffic for vulnerabilities, and exploits and blocks any attempt for attackers to get through your network perimeter or even cross boundaries or segments within your internal network.

Here are the essential firewall best practices to prevent ransomware attacks from getting into and moving laterally on your network:

 

  • Reduce the surface area of attack: Review and revisit all port-forwarding rules to eliminate any non-essential open ports. Where possible use VPN to access resources on the internal network from outside rather than port-forwarding. Specifically for RDP, ensure port 3389 is not open on your firewall.
  • Apply IPS protection: Apply suitable IPS protection to the rules governing traffic to/from any Windows hosts on your network.
  • Minimise the risk of lateral movement: Protect against threats moving laterally on your network and consider segmenting your LANs into smaller sub-nets, assigning those to separate zones that are secured by the firewall. Apply suitable IPS policies to rules governing the traffic traversing these zones to prevent worms and bots from spreading between LAN segments.

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Everything in Texas is huge, including the Cyber Attacks.

Everything in Texas is huge, including the Cyber Attacks.

Texas is a big state. Stupidly big. With up to 30 million residents it’s the second largest state in America, it has a land mass twice the size of Germany, and a GDP larger than Russia. Texans like to say, “Everything is bigger in Texas”, and usually that’s a good thing to brag about. However, this time bigger certainly isn’t better.

News hit a few weeks back that 22 government organisations in the Lone State were recently under attack by coordinated & intelligent ransomware attacks. It’s a bright reminder that as attacks continue to evolve, it’s crucial that your defences evolve even faster.

 

How do I make sure I’m not involved with an intelligent ransomware attack?

So how can you help ensure your organisation isn’t the next ransomware victim?

To hit the ground running, does your solution provide or have industry-leading technology to ensure attackers can’t use un-patched, vulnerable software programs to distribute and install ransomware into your systems?

Urban Network can perform tests on your systems to ensure that systems are secure, and your business is conforming to best practice, including penetration testing and intrusion testing, however the very basic elements of patching endpoints with vendor security patching, and ensuring antivirus is up to date is the often overlooked start point.

Should that not stop an attack – or should an exploit not be leveraged – how will your solution stop attacks it’s never seen before?

Our Sentinel monitoring software can cover these elements of the network, and coupled with one of our recommended Enterprise Firewalls, the basics are covered.

To add layers of additional security, Urban Network can liaise with you to ensure that there are comprehensive policies in place for password control, access control and network housekeeping and importantly remote access and BYOD policies. We can look at the current implementations of any other facet of your network, and give advice on industry best practices to ensure your business is sufficiently covering your risk

Keeping a continued eye on the security that is deployed in your systems.

 

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Lost one file, but you’ll have to recover the whole Business to recover it?

Lost one file, but you’ll have to recover the whole Business to recover it?

Ever used a sledgehammer to open a tiny nut?

Maybe not, but you get where we’re going with this.

If you’ve lost your complete system and need to recover everything at once, most backup tools have you protected. But if you need to recover one specific file or folder without having to restore your entire server, a lot of tools leave you disappointed.

Whether a solitary file has corrupted, or worst-case situation, you’ve been targeted by a cyber-attack; there is rarely an easy way to retrieve back just that one individual file (and quickly).

You end up spending ages restoring the entire Business system, needlessly rebooting all your data back to how it was a yesterday, or worse, a week beforehand. Resulting in a loss of all those new and updated files in the interim.

Meaning numerous copies need to be saved and moved for them to be re uploaded once the restoration has been complete.

Is there a feature for individual file restoration available?

Yes, it’s called Granular Recovery Technology. A service missed from several the leading backup vendors.

Granular Recovery is your easy answer in recovering those individual files you lost in unintentional deletion, corruption or via a cyber-attack; gone are the days you must complete a full system recovery.

The ability to search for significant files that lie somewhere in the corner of a backup set, mark them and get them recovered, while the rest of the backup data pile remains intact.

Quickly providing you access back to that one file in minutes, rather than hours or days.

 

Why must we use it?

There is a variation of reasons why you should consider a backup service that has Granular Recovery built in as standard.

However, the main and most significant advantage and why you should use Granular recovery, is the economy of time to restore only the objects needed, and a greater defence from mishaps and undesired data changes that can occur with a full restoration.

Consequently, a good granular restore feature saves your efforts and oodles of data!

The phrase “needle in a haystack” comes to mind, with the unavoidable disappointment when you begin a task with an almost impossible feeling.

With Granular Recovery, it makes finding that needle possible, not only possible but quite easily, along with a few others you didn’t know about also!

 

We’re Urban Network, we can help backup your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Keeping the lights on, when all else fails.

Keeping the lights on, when all else fails.

Being able to recover from a tragedy is one thing…

An IT disaster, whether that’s the cost of a few files or the outage of your entire system following a cyber-attack, can be disastrous to the operation of your business. If you have a professional backup service in place, there’s a strong chance you’ll be able to recover and get back on your feet. But, have you ever considered the time that a full-sized recovery might take?

If you need to transfer backup files from the cloud, it can take hours, or even days, to get access back to your data. That’s before you start the recovery process of restoring the data & services to their correct place, and ensuring your users effectively regain access.

As the adage says, time is money. An IT outage, however large or small, can cost you a fortune.

How can you sustain the continuity of your business operations during that downtime?

Business Continuity is the often overlooked third sister to Backup & Disaster Recovery.

BC doesn’t have to be an exclusive enterprise-grade solution, it should be standard operating practice, (which will likely include an IT platform of some kind), that is both commercially & technically suitable to the way you work. Your industry, size, the types of software & data you process, and even your geography, all play a part in the style of Business Continuity process your business should accept.

Where IT is concerned, there are numerous BC puzzle pieces that can come together to complete an entire continuity solution, which is designed to meet several likely disaster outcomes.

At an inferior level; a local server failover can provide you with continuity in the event of losing the operation of your main server. At a higher level; your local server failover can be paired with a cloud-based service that offers failover to a cloud hosted platform in the event of a total loss of access to your office grounds.

If your business already functions mostly, or entirely, from cloud-based services you may be not likely to have a need for a recovery failover. Your BC plan might simply be centred around users having access to IT devices and internet connectivity from an off-site location.

 

Build a strategy.

All businesses regardless of their size or industry should have a Business Continuity plan that issues in any number of possible disaster outcomes, and how you will respond to ensure the continuity of operations are upheld.

Your IT partner should be best placed to understand the intricacies of your business operation, and of your IT services, to support you in mapping out a suitable BC plan.

Your IT may require investment as a part of this review to ensure you are truly protected, or, you may simply require documentation, training & support for your team to be able to access and function proficiently with the existing tools you have.

 

We’re Urban Network, we can help backup your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Wouldn’t a time machine be a handy asset?

Wouldn’t a time machine be a handy asset?

 Corrupt file or wish you could revert-back changes your colleague made?

Most backup services are acceptable… they’ll have a single, up-to-date copy of your files and folders from the last working day. So, in theory, should you suffer a data loss, you’ll be able to recuperate the most recent copy of your data to get back on your feet.

If you’ve only lost a solitary file here & there, having a backup service with Granular Recovery might come in handy; however, recovering back to a file at a precise point in history would be even more useful, and here’s where most backup services don’t have your back.

Sounds a bit mad at first, but, what if last night’s copy is ‘too recent’? We’ve all been there… a file gets worked, re-worked and re-worked again… but you want to return to version 2 and it’s now on version 6. Restoring last night’s version might get you back to version 5, but that’s not far back enough.

So, what can you do?

Rollback recovery for set points in time

Running with a backup service that comprises a feature called, Incremental Backup, covers this exact need. Define a custom schedule of points in time where you want to snap your file backup – as frequent or infrequent as you need.

If you set incremental recovery points for each day at 5pm; at any point in time in the future you’ll be able to reinstate all, some or one of your files from that specific date.

 

Sounds like a lot of Data? It is.

To enable recovery from an array of points in history, you’ll need your backup service to store a duplicate copy of all (or some) of your files & folders – for every recovery point.

Meaning the downside to the flexibility of incremental recovery is the pure volume of backup storage space required to keep all those multiple copies of your files.

 

How can that space be managed?

To get the most from your backup storage space, incremental restoration points can be combined.

For example, you can opt to retain a weekly restoration point on each Friday within a month – as your space depletes, those points will be cleared keeping only the last Friday within that month.

To keep a recovery point from the last Friday of each month going back in time, you’ll still need a fair capacity of storage. But when storage runs low, you can clear down those recovery points at any time.

All a balance of the practicality & saving in time and money being able to recover incrementally vs. the cost of the backup storage space.

 

We’re Urban Network, we can help secure your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

It’s illegal to have no Professional-Grade Backup.

It’s illegal to have no Professional-Grade Backup.

 You possibly didn’t know this…

Backup and disaster recovery solutions are critical under the GDPR.

With any Business liable or accountable for the ownership of important data, they must have the capability to recover any lost private information that they hold in a timely manner.

In order to remain compliant, you must have the obligatory backup and disaster recovery strategies in place and actively take the time to frequently test the integrity and the efficiency of the solution.

This is only the start, as you’ll find out there are lot more implications to it, you’re going to need to obey with all of them.

How do we abide with the GDPR ruling?

By following each distinct implication and making sure your Business is in line!

With GDPR fines placed on British Airways, you shouldn’t be expecting a smack on the wrists, we recommend you get your Business in order and shadow all the rules.

Covering the first of many critical points involved; Having a backup recovery point is crucial, irrespective if you want one or not.

Whether you’re outsourcing or have other approaches, you need a secure recovery point in which you can restore important data from, fast.

You’re also going to need a process in place, for regular testing, judging and assessing the effectiveness of the measures involved for guaranteeing the security.

Do you feel 100% self-assured that you could tackle inbound or concealed cyber-attacks? If not, then you should be looking for ways to reinforce your defence as you now must report any breaches within 72 hours of them occurring.

An effective way to certify yourselves of Cyber protection, is to become Cyber Security Essentials accredited.

Data compliance is for every affiliate of the team, whether you’re involved within IT or the legal side of the Business or not, everybody needs to be GDPR conscious.

Lastly, for now, Regular Data backups are vital, as well as consistent Backup testing, you need to check regularly and backup your data often in order to comply, don’t get caught out at the closing stage.

 

What options are accessible to us as a Business?

At this certain time, there are many variations of services and options available to you.

Whether you wish to Backup by hand yourself, (Given the extensive implications this would be un-recommended), making sure you’re secure with multiple copies in multiple locations, ideally following our 3-2-1 backup rule.

Or shadow a secure route through an outsourced Backup provider, like us. In which we will deliver a secure data Backup solution. A devoted cloud backup, our online backup service is a secure and automated way of ensuring that your critical data is protected offsite.

Whether you’re in a susceptible position, or just unsure of what position you are, you need to get ahead & up to date with GDPR and Data compliance, contact us for all knowledge regarding backups and conforming security.

 

We’re Urban Network, we can help secure your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

The 3-2-1 Backup Rule

The 3-2-1 Backup Rule

 Why you should follow this rule…

Backing up your private Data isn’t something you should neglect; you need to ensure that your critical information will survive any volatile situation.

Too many Businesses & individuals have suffered from data loss following system failure, file corruption, accidental deletion, or even by a natural catastrophe! Although most common of all in today’s world, will be loss through you becoming a victim to a random cyber-attack.

You may well take a duplicate of your files and save them to an external disk or dump a copy in the Cloud, but is that a secure enough backup to protect your business from total loss?

Which rule is the best to apply?

Welcome the 3-2-1 Backup rule; a rigorous practice to cover almost all contingencies of data loss and requirement for recovery.

A straightforward structure for keeping all your private details & company data defended & recoverable should the worst occur.

At all times, keep at least THREE duplicates of your up-to-date data.

You cannot envisage data loss, or worse, a random cyber-attack. Having at least three independent backup copies of your data helps to best mitigate the risk of loss. One copy being your original file data (on your server/s or cloud storage), with a further two duplicate copies being stowed in alternate locations as your backup sources.

Keep TWO backup copies on unique devices or storage media.

Nothing lasts a lifetime, (asides plastic). We must all remember that storage devices will suffer a failure at some point, or if they are connected to your network at the point of a cyber-attack striking, may well become disease-ridden and suffer a loss too.

Consequently, to capitalise on peace of mind, you should always have multiple copies on exclusive devices, and they shouldn’t be the same product, with slim odds of corrupting at the same time.

Keep at least ONE backup copy off-site.

A simple, yet very significant rule. If you follow the first two rules, you’re on the right track, but if you don’t have an offsite backup, you’re not completely protected.

You’ve undoubtedly predicted why, if your external hard drives, disks or cloud storage are all connected to your system, whilst it corrupts, or gets attacked, it’s all infected & your several points of recovery are lost in one fell pounce.

However, if you’ve got a copy offsite, you will still have a recovery point to reinstate your critical systems and recover all your information should all else flop.

 

Why follow the 3-2-1 Backup rule?

Given the upsurge in Cyber-attacks, with Ransomware hitting businesses left, right and centre, I can’t see any reason you wouldn’t want to defend your vital data.

With individuals often misjudging the likelihood of having a natural disaster, suffering from accidental deletion or corruption, or even the victim of a hacker. The risk factor has never been so high, with your business on the line, backup is essential to protect livelihoods.

When applying the 3-2-1 rule, don’t forget to use a full-bodied and trusted solution, which is where we come in.

 

We’re Urban Network, we can help secure your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Don’t let the storm of GDPR catch you out, BA face £183m in fines.

Don’t let the storm of GDPR catch you out, BA face £183m in fines.

In recent news, British Airways has been given notice of a record-breaking £183 million fine, followed a day after by Marriott Hotels at £99.2 million.

The reason? Breaching data protection laws. This should be enough to unnerve anyone responsible for cyber security and handling personal data, whether they are a large corporate, or a small business.

Don’t fall into the same pit, it certainly won’t be easy to get out of…

What happened to British Airways and Marriott Hotels?

British Airways’ fine of £183 million represented 1.5% of its turnover in 2017, which was only achieved as a reduction to the maximum penalty through cooperation with the ICO investigation. If the ICO had sought the maximum fine of 4% of BA’s total revenue, the bill could’ve been £489m.

For Marriott Hotels, Information Commissioners Office are proposing a £99.2m fine.

It’s said that about 30 million of the hacked guest records related to residents of 31 countries in the European Economic Area. Seven million related to UK residents.

The General Data Protection Regulation (GDPR)?

The GDPR came into force in May 2018 and is the biggest transformation to data protection and privacy in the past 20 years. The GDPR gives data regulators the power to fine up to £18m, or 4% of annual global turnover, whichever is greater. In a new attempt by European policymakers to incentivise security practices and stop large-scale data breaches.

Last year Facebook was fined £500,000 by the ICO, which involved the data of up to 87 million users improperly being shared with third-party developers without sufficient consent. Given Facebook’s worldwide revenue was £31.5bn in 2017, they could have received a fine of up to £1.26bn had the case had been eligible under GDPR.

 

Small & Medium sized business are not immune.

It is a common mistake to think that your business will not be targeted. Most hackers are conducting their attacks at random – with businesses often falling victim to malicious software breaching their network, at the fault of a staff member inadvertently clicking on a suspect link in an otherwise unassuming email.

 

How can I protect our business from a Data breach?

If you’re unsure at this point, we’d recommend giving us a call; we’d be more than happy to advise your next steps.

This is not the best time to be worrying whether your security is up to date or not.

Which brings us onto the first point, cyber security best practice.

Making sure you’ve got the most appropriate security for your business, whilst also applying updates frequently to solidify its performance and protection. You don’t want to be left vulnerable simply because you’ve delayed the patch by a week or two.

Another major point; it is a legal requirement of GDPR to ensure you back-up your data, and ensure it is encrypted.

Whether this data resides on personal laptops, or stored away in remote data facilities via the internet, every business regardless of size should employ a 3-2-1 backup rule to best mitigate data loss & minimise the impact of an outage.

 

 Lastly, but very much still incredibly important, is to ensure that your team are trained and aware of their susceptibility to cyber-attack.

As discussed in a previous blog, phishing takes its aim directly at your team; firing emails left, right and centre, embedded malicious attachments and links to fraudulent websites, from which software to steal or corrupt your data can manifest itself into your network. Staff awareness is key to data protection, if your front-line team understand this level of importance, you’ll have few issues keeping out of its path.

 

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.