Ransomware attacks demonstrate the security imperative

Last month, Lincolnshire County Council’s computer systems were shut down following a malicious ransomware attack. This naturally caused a great deal of public concern, and certainly demonstrated the need for businesses to consistently review their security practices.

[easy-tweet tweet=”#Ransomware can attack any business, at any time, are your staff prepared? ” user=”comparethecloud” hashtags=”infosec”]

Lincolnshire County Council’s computer systems, now back online, were closed for four days following a severe ransomware infection. The software encrypted the council’s data and requested a £350 ransom payment in order to access the files once again. This is clear evidence that, no matter which sector or region your business operates in, leaders have a duty to ensure that employees are well versed in cyber security practices.

the rate of high profile attacks is growing exponentially

Indeed, the last six months in particular have seen an incredible number of cyber attacks on businesses in both the private and public sector, from ransomware to targeted hacks. From TalkTalk, Sony, Ashley Madison and Wetherspoons in 2015, to HSBC and Lincolnshire County Council this year – the rate of high profile attacks is growing exponentially. Unless enterprises undertake company-wide initiatives to improve their internal security practices, hackers will continue to decimate business’ computing systems on an increasing scale.

There are some basic steps that can be taken when it comes to ransomware. These include:

Keep up to date with security news and updates 

Knowing what to look out for is half the battle. Keep up to date with the latest developments in malware and ensure to download the latest antivirus software updates and patches, as this can help to protect against many threats.

Back up your business-critical data offsite

If you’re ever caught out by ransomware, this could be your lifeline. Be careful though, as if you don’t catch the malicious software in time you might unintentionally back up encrypted files and lose your clean, unencrypted data. Partnering with a specialist helps ensure fast recovery and peace of mind.

Communicate risks with your staff regularly

All it takes is one uninformed employee to open an infected attachment for your whole business to be affected. Make sure your team is clear about the recommended procedures to follow in the case of a breach – as well as helping to prevent attack in the first place, this can help to get incidents under control quickly, reducing the amount of damage caused.

[easy-tweet tweet=”All it takes is one uninformed employee to open an infected attachment for your whole business to be affected”]

Additionally, they can also take advantage of pre-existing initiatives such as the government’s Cyber Essentials Scheme (CES). For SMEs, which might not have the dedicated in-house IT staff to address cyber security challenges, the CES provides advice and guidance for those looking to take their first steps into cyber security or simply improving existing processes. In the current environment it is imperative these resources are utilised.

+ posts

Peter Groucutt, Managing Director, Databarracks 

Prior to forming Databarracks with his co-directors Peter spent several years in various operational and financial risk management roles within the banking sector latterly developing applications to monitor V.A.R (Value Added Risk) across banks’ treasury and hedged products.

In 2000 Peter combined his passion for sailing with his skills in application development to set up his own company building ship monitoring and harbour management software including the integration of S.A.R. (search and rescue) using GPS and Radar. This proprietary platform is still in use by some major harbours today.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

Driving the Future of Connectivity with Data Centres

As an astonishing matter of fact, there are 5.3 billion people...

Willow’s Breakthroughs in Quantum Stability

The Start of a New Era Have you heard the...

Cloud Computing Demands Robust Security Solutions

Modern organisations are increasingly reliant on cloud computing to...

Unlocking the future of manufacturing; AIOps network optimisation

Global manufacturing activity has failed to show signs of...

Why is the hybrid cloud the future of computing?

Have you ever wondered how companies can benefit from...