top of page

Top tips to minimise cyber threats

Today, more than ever, we are seeing how technology, cyber and the whole digital sphere are accelerating at pace. This ever-evolving landscape has seen an increase not only in the number of cyber threats but also the severity of the attacks.


Whether you’re running a new start-up or have been established for longer than you can remember, every business is a target for cybercrime. It’s, therefore, crucial to understand how to protect yourself or your business by identifying any vulnerabilities.


With Wales’ hospitality industry to re-open its doors in a few days and the likes of gyms and leisure facilities to do the same a week ahead of the proposed schedule on 3 May, it is time to make sure your business isn’t affected by any other unexpected setbacks.


To establish what potential threats you could experience, knowledge is key, so we have created a list of the most common ones businesses face.


  • Social engineering – this is a unique type of cyber-attack that involves the criminal psychologically manipulating an individual in order to bypass security measures or gain sensitive information.

  • Outdated software – software that is not able to withstand hacking technologies and methods or is no longer fit for purpose.

  • Outdated hardware - as hardware becomes outdated it often cannot support updated security measures.

  • Cloud vulnerabilities - while cloud services are widely used and often deemed as essential to many, it can open up the possibility of a wide range of cyber-attacks.

  • Ransomware - attacks that infect a network and hold systems and data `hostage' until a ransom is paid.

  • Bring Your Own Device (BYOD) policies - personal devices are also easier to hack than company devices thus giving criminals an opening to breach networks.

  • Mobile security threats - encompasses everything from mobile spyware and malware - or malicious software - which encompasses viruses, worms and ransomware and is designed gain to unauthorised access to networks and devices (usually as a result of loss or theft

  • Internet of Things – meaning any device connected to the internet, from smartwatches to connected cars, criminals can exploit this connectivity.

  • Third-party exposure - many businesses utilise third-party services, however, this does not make you exempt from the repercussions of a data breach on the side of your supply chain.


Now that you’ve familiarised yourself with these threats, how do you minimise them? Watch the video below to learn some top tips.


Putting these measures mentioned in place is a great place to start planning or re-evaluating your current strategy. To gain further access to guidance on how to keep your business running as successfully as possible, please visit our membership page for options available and to sign up today.


Comments


The contents of this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of The Cyber Resilience Centre for Wales is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. The Cyber Resilience Centre for Wales provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us.

The Cyber Resilience Centre for Wales does not accept any responsibility for any loss which may arise from reliance on information or materials published on this document. The Cyber Resilience Centre for Wales is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page