Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

What makes a ransomware attack eight times as costly? Compromised backups

blog-header-what-makes-a-ransomware-attack-eight-times-as-costly

Any organisation that has tried to recover from a ransomware attack knows that it can be time-consuming and costly. Companies hit by an attack must choose between paying a ransom or recovering encrypted data from a backup.

Unfortunately, ransomware gangs are too aware that they can leverage significantly higher ransoms from their corporate victims if they have also compromise the company's backups. For this reason, we are seeing more and more cyber attacks targeting backups because they know that organisations desperately need them to recover if they want to avoid paying a ransom to cybercriminals.

  101749 Hits

Offering clients the ultimate peace of mind – a new approach to security and remediation for legal firms

blog-header-legal-remediation-offering-clients-the-ultimate-peace-of-mind

Although the sector as a whole has traditionally been comparatively wary of the ever-increasing pace of technology, legal services are increasingly data driven, with an abundance of AI-related discussion emerging within legal technology circles. The core Document Management Systems (DMS) and Practice Management Systems (PMS) remain the centre of focus for how and where to deploy a variety of rapidly maturing SaaS platforms, or dedicated, highly customised suites.

  1018 Hits

Maintaining operational resilience in a changing Finance sector

blog-header-Maintaining-operational-resilience-in-a-changing-Finance-sector

The Finance sector has always been one of the most dynamic, rapidly evolving industries, and this shows no signs of changing any time soon. But while shifts in the landscape may well open new opportunities, they will also come with new challenges, and it is the organisations who are ready and able to face these head-on who will continue to thrive in the years ahead.

  1743 Hits

Cyber crime: ransomware attacks

Ransomware-banner

 Ransomware is malware that encrypts an individual's files so that they no longer have access to them, and subsequently demand payment for the files to be released. Usually the payment is asked to be made in an untraceable cryptocurrency form, such as Bitcoin. The most common way ransomware ends up on an individual's computers is through email spam, which individuals will click on and open.

Unfortunately, the files cannot be decrypted without a mathematical key which is only known by the cyber attacker, and the reason why many individuals tend to pay up. However, many find that despite paying the ransom, their files remain encrypted.

When looking at which countries were affected by ransomware attacks the most, the UK was found to have the highest percentage out of Europe:

  Figure 1: Cybercrime Tactics and Techniques: Ransomware Retrospective Report, Malwarebytes

Despite the NHS facing one of the worst ransomware attacks in May 2017 - the WannaCry ransomware attack - which cost the NHS £92m and caused more than 19,000 appointments to be cancelled (The Department of Health), this chart clearly highlights how organisations in the UK still need to invest more into their Cyber Security solutions to stay protected from ransomware attacks.

At Exponential-e, we help organisations that have been affected by ransomware attacks. Our Head of Cyber Consultancy, Mark Belgrove, discusses a real-life cyber attack in the video below, and shares how Exponential-ehelped mediate the situation. 

  4239 Hits

Playing your part - staying secure while remote working

Remote-Working-Checklist-Blog1-header

Now more than ever, digital security is a team effort, with staff at all levels of an organisation having an active part to play in keeping critical business data safe. With the outbreak of COVID-19, and an unprecedented volume of staff working from home, robust security policies and systems are no longer enough - each and every member of staff must consider security as a fundamental part of their developing remote working routines.

But what can each of us personally do to ensure our organisations maintain their usual standards of security for the duration of this crisis, without letting such measures detract from our day-to-day work? Here are a few starting points… 

Be prepared

If you're new to remote working, don't go in blind. Take the time to re-familiarise yourself with your company's security policies (particularly any new ones for home workers) and be sure to attend any training sessions that are on offer (as many organisations are rolling out remote training sessions for home workers, there are no excuses!). This will make the transition far smoother and allow you to stay focused on your work.


Secure your router

At Exponential-e, we always say that 'your Cloud is only as good as your network'. In the same way, your remote working solution is only as good as your router. As above, make sure its password is secure (especially if you've never changed its pre-set password!) and take any recommended security measures, both from your network provider and your IT team.

Check your passwords

This is a familiar refrain in the world of data security, but it always bears repeating. Familiarise yourself with current best practice regarding password creation (there are plenty of useful resources available online for this) and avoid reusing passwords. While memorising multiple passwords for each platform you use for work is certainly inconvenient, there are many excellent password manager tools available. Ask your IT team which one they would recommend, as your company may already require employees to use a specific one.


Enable updates

We all know how irritating requests to install updates on our personal devices can be, but in our current climate, it's more important than ever. More than just keeping your own devices secure, a single instance of malware could bring down your entire company network, so don't take any chances. Ensure you install all recommended updates, or – better yet – enable automatic updates. This will ensure your devices are always protected against the latest security threats. 

Ask!

As we've already mentioned several times in this post, if you are unsure about anything when it comes to data security, don't guess… ask the right person! In particular, your IT team will be more than happy to advise you about security best practice when home working, or alternatively, consider Exponential-e's Cyber Security Advisory service, which was created to provide a 'one stop shop' for any security-related concerns you may have.

In the meantime, download our Working from Home Checklist, which breaks down all the key elements of secure remote working.

  2198 Hits

Your launchpad - choosing the right tools for remote working

Remote-Working-Checklist-Blog2-header

In recent weeks, companies across the UK have found themselves transitioning to a remote workforce with little to no choice, despite the approach previously being treated as solely for limited or specific circumstances. There's no doubt that the rapid implementation of a whole new way of working presents considerable challenges, but as the Exponential-e teams who've partnered with organisations across a range of sectors to do so have demonstrated, it is very much achievable, provided you start with the right solutions in place.

In particular, consider the following…

A secure VPN

Virtual Private Networks have long been the benchmark solution for remote working, but with the spread of COVID-19, we are seeing companies moving from maintaining a few VPN licenses for specific instances to deploying them for their whole workforce. However, there's a good reason for this – if implemented correctly, it maximises security by encrypting all data you send through your company network. While you may require a cloud-based solution for specific applications, a quality VPN is an intelligent foundation for your day-to-day work.


A password manager

It's no secret that reusing passwords across different platforms presents a great risk of cyber criminals accessing corporate systems through guesswork. Nonetheless, it's still tempting for employees to do so due to the difficulty in keeping track of large numbers of unique passwords, especially when they need to be regularly updated, in line with internal security protocols. Fortunately, a password manager tool which integrates with your web browser makes it easy to keep your passwords secure, while still ensuring they are available when you need them. Ask your IT team if they recommend a specific one.


Automated backups

External backups are a key part of any effective business continuity and disaster recovery strategy, which should still be the case when you're working from home rather than the office. Your company is likely to have a system in place for this, particularly if you have already adopted a cloud-based strategy, so ensure you follow all guidelines when you begin remote working.

The right WFH solution

One of the biggest obstacles to remote working in the past has been the need to maintain continuity with existing business processes and systems, ensuring work can be conducted as normal, without compromising either security or efficiency. Fortunately, there are several ways of doing this, but it's important to be conscious of security when using such solutions, and always use the one recommended by your IT team. A proven, trusted platform like Exponential-e's Working from Home solution is ideal, allowing teams to continue using your company's preferred tools as normal, regardless of where they are logging on from. This will ensure a smooth transition to remote working for the entire workforce.


Two-factor or multi-factor authentication

Related to the above, two-factor or multi-factor authentication provides an extra level of peace of mind, by creating an extra obstacle for cyber criminals, even if one of your passwords is compromised. As password theft measures have become increasingly sophisticated over the years, this is no longer a 'nice to have' measure - it should be a standard part of your remote working systems and wider security policies.


Effective anti-virus protection

Viruses continue to evolve on a near-daily basis, and which means a robust anti-virus solution should still be your first line of defence and may even give you time to secure your infrastructure in the event of a password being compromised. Make sure an industry-standard solution is installed on all your devices and enable automatic updates.


The next steps...

Bear in mind that the technology and processes are only part of an effective remote working system. Establishing best practice amongst staff at all levels, ensuring chosen solutions are able to evolve with your organisation, and having the right partners to support your ongoing growth are all equally important. To find out more about how remote working can become a powerful tool for future business growth, download our Working from Home Checklist, which sets out our experts' proven strategies for making this a reality.
  1744 Hits

Three steps to more secure employee passwords on World Password Day

Three-steps-to-more-secure-employee-passwords-on-World-Password-Day

Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!

  2147 Hits

The finance sector rises to meet its latest cyber security challenges

The-finance-sector-rises-to-meet-its-latest-cyber-security-challenges-header

The finance sector is required to have one of the most sophisticated cyber security postures in the world, with bureaus, banks, finance companies and insurers working closely with their technology partners to ensure sensitive financial data is managed, stored and transferred, with a stringent range of international security standards that must be adhered to at all times. However, cyber criminals have demonstrated repeatedly that they are constantly working to breach even the most sophisticated security ecosystems, devising new ways to exploit both technological vulnerabilities and human error.

  2229 Hits

Why a new standard of operational resilience is required for the UK Finance sector

In a heightened cyber threat landscape - where ransomware attacks are increasing in frequency and sophistication - and having weathered the challenges of COVID-19 and the resulting move to hybrid working, the Finance sector is still continually challenged to demonstrate to its customers that critical services will remain available no matter what, and that sensitive financial data will remain fully secure at all times.

In a heightened cyber threat landscape - where ransomware attacks are increasing in frequency and sophistication - and having weathered the challenges of COVID-19 and the resulting move to hybrid working, the Finance sector is still continually challenged to demonstrate to its customers that critical services will remain available no matter what, and that sensitive financial data will remain fully secure at all times.

  2078 Hits

Why Legal firms are making SIEM systems a key element of their cyber security strategies

b2ap3_large_Why-Legal-firms-are-making-SIEM-systems-a-key-element-of-their-cyber-security-strategie_20220425-164703_1

The UK's Legal sector must contend with some of the most stringent compliance and data protection obligations in the current digital landscape. For many years, this has hindered the progress of digital transformation initiatives within firms, but in recent years, in order to meet the challenges of COVID-19, many firms have seized the opportunity to modernise cumbersome legacy systems and develop cutting-edge IT infrastructure that enables their staff to work more flexibly.

  1513 Hits

You cannot afford to risk human error compromising your cyber security

you-cannot-afford-to-risk-human-error-compromising-your-cyber-security

In spite of the ongoing evolution of cyber security processes and technology, human error is still responsible for 95% of data breaches1. Phishing attacks alone represent a particularly insidious risk, with 91% of organisations experiencing a successful attack in 2021 alone2.

  1902 Hits

Be prepared: optimising cyber security in an increased threat landscape

Achieving-airtight-cyber-security-in-an-increased-threat-landscape-blog-header

In light of recent geopolitical events, and the increased threat to corporate infrastructure, organisations across the UK must assume that they will be forced to contend with a cyber-attack in the near future and prepare accordingly. Indeed, the NCSC has already set out its own guidance to help organisations bolster their defences, which we strongly advise you to read and implement.

  2325 Hits

The Finance sector’s relationship with its Cloud providers is evolving

The-Finance-sectors-relationship-with-its-Cloud-providers-is-evolving

For some years now, Cloud adoption has been steadily on the rise across the UK's Finance sector, with organisations including banks, insurers, and investment firms phasing out increasingly cumbersome legacy systems in favour of more scalable, agile, and cost-effective infrastructure. Indeed, more than 48% of UK banking services are now built on Cloud infrastructure.

  1736 Hits

The Retail sector is fundamentally changing, and technology has a critical role to play

The-Retail-sector-is-fundamentally-changing-and-technology-has-a-critical-role-to-play
The past decade has been a challenging one for the Retail sector, to say the least. Much has already been written about the impact of online shopping and streaming services on the high street, and the rise of COVID-19 and recent supply chain disruptions have only compounded the challenges facing even the most established brick-and-mortar retailers.
  1517 Hits

HMPPS’ Telemedicine programme and the power of technology as a force for social change

HMPPS-Telemedicine-programme-and-the-power-of-technology-as-a-force-for-social-change
The public sector's relationship with technology is evolving at an unprecedented rate, as familiar legacy systems are increasingly phased out in favour of leading-edge digital infrastructure that offers levels of scalability, sustainability, and operational resilience that would previously have been dismissed as impossible.
  3665 Hits

Cultivating a new breed of cyber security for the new shopping experience

Cultivating-a-new-breed-of-cyber-security-for-the-new-shopping-experience_2

Retailers - be they small local shops, online sellers, or top global brands - generate, transfer, and store more data than ever before, ranging from customer data (both online and in-store, as we have considered in previous articles), to supply chain and asset tracking data. Whether it's shopping online or utilising in-store apps to access the latest savings and special offers, the way customers shop has fundamentally changed forever, with the data they generate online and in person allowing retailers to build up unique personas that drive truly bespoke experiences.

  2301 Hits

Data-driven manufacturing - laying the foundation for tomorrow’s interconnected workflows

blog-header-datadriven-manufacturin_20230615-143318_1

Manufacturing workflows are evolving at an unprecedented rate, and the trend shows no signs of slowing down. The increasing effectiveness and affordability of 'smart' technologies and the Internet of Things means IT and OT are increasingly interconnected, with increasing volumes of data flowing between sites and devices on an ongoing basis.

  1664 Hits

The pub of the future: the data-driven transformation of a great British institution

The pub of the future: the data-driven transformation of a great British institution

Like many fixtures of our lives, Britain's pubs were heavily impacted by COVID-19, with their familiar patrons unable to come in for a post-work drink, or meet with friends at the weekend. But while it was undoubtedly a difficult period for the industry as a whole, this great British institution did as it has always done, and adapted to suit its patrons' evolving requirements.

  2145 Hits

Embracing the pop-up: how to ensure you are ready to meet your ideal customers anywhere

blog-header-how-to-ensure-you-are-ready-to-meet-your-ideal-customers-anywher_20221214-152702_1

The Retail sector is more diverse, dynamic, and rapidly changing than any other time in its history. This not only encompasses the way customers make their purchases – with online shopping, click-and-collect, and in-person shopping all converging to offer true, end-to-end experiences – but also the way retailers open and operate new sites. Whether this means trendy pop-up shops, kiosks at other brands' locations, or booths at events, retailers from up-and-coming start-ups to global leaders are no longer relying on fixed high-street locations to welcome their customers and put their wares on display, instead making sure they are present wherever their ideal customers are, and fully prepared to offer a world-class experience that builds brand recognition and loyalty.

  1916 Hits

Retail 4.0: How technology is driving the move from products to experiences

Retail-4.0-How-Technology-is-driving-the-move-from-prodcuts-to-experiences
For a number of years now, the evolution of the Retail sector has typically been positioned as brick-and-mortar shops - including many longstanding fixtures of UK highstreets - fighting a losing battle against online retailers, such as the seemingly monolithic Amazon. However, the reality of the situation is not quite so clear cut…
  1644 Hits