Our chief technical officer (Chris Ellis) has featured in an IT Supply Chain article exploring the importance of cybersecurity in our increasingly digitalised world.
In the article, Chris pointed out that we’d seen a 600% increase in cybercrime since the pandemic – including a slew of successful attacks against major players like Cisco, Samsung and Nato.
In the month after this article was published, an international ransomware group also made a successful attack on popular file sharing app MOVEit: exploiting a zero day vulnerability to access data belonging to organisations like PwC, Ofcom and the Irish Health Service.
And CyberEdge’s 2022 Cyberthreat defence report estimates that a staggering 81.4% of UK businesses experience at least one cyber attack per year. And that’s not accounting for successful attacks that go undetected.
In light of these statistics, it’s fair to say that cyber security has to be a major priority for most businesses operating today.
As Gallagher’s Tom Draper puts it, failure to maintain an adequate defence “exposes organisations of every size to the risk of financial and reputational damage” that can prove crippling in the long term – necessitating serious investment in preventative measures designed to minimise the likelihood of a successful attack.
Now, we know this will be beyond obvious if your business is a large, consumer facing organisation that handles a lot of sensitive information about members of the general public.
Ombudsmen, government departments, financial service providers, insurance brokers and the like will all be moving to establish robust processes in place to avoid a repeat of the MOVEit breach and safeguard the sensitive information they’re charged with protecting.
But smaller orgs also need to be very careful about safeguarding things like the employee personal data stored in their payroll or HR systems, which is why we’ve decided to publish this guide to stepping up your cybersecurity – and protecting your data from unauthorised access.
First things first, it’s important to establish where the responsibility for improving cybersecurity lies.
Most organisations will have a dedicated IT department that will spearhead coordinated efforts to protect sensitive data. But there are still things that other departments can do to reduce the likelihood of a successful attack.
Some of these precautions involve minor changes to internal policies; things like adopting two factor authentication, using a password management app or implementing a routine for ensuring that software is kept up to date.
But it’s equally important to ensure that all departments are vetting the security credentials of any vendors who’ll be handling or storing sensitive information. This includes the people who make your payroll and holiday booking software and your HR case management software.
It’s important to remember that when they’re made in conjunction, these changes can make a significant difference to your organisation’s overall resilience to all sorts of harmful cyber attacks.
Which is to say that there’s tangible value to making individual departments at least partially responsible for their own cybersecurity where possible. Even if your IT or dedicated cybersecurity team still has to take ownership of the whole piece.
According to our CTO Chris Ellis, there are a number of relatively simple steps you can take to improve resilience across your organisation, including:
Installing Anti-Virus Software. These programs are designed to detect and remove viruses and other malicious software from your computers or laptops. Without them, devices can be infected by inadvertent downloads of malware in an attachment linked to a dubious email, or hidden on a USB drive – enabling malicious actors to access sensitive information or launch attacks designed to disable your infrastructure.
When you partner with vendors that are going to store or process sensitive information for your organisation, it’s important to remember that you are increasing your overall attack surface.
In plain English, this simply means that you’re increasing the number of entry points potential bad actors can use to attack your organisation or obtain privileged data.
This is fine as long as vendors have sufficiently robust security practices and are actively taking steps to mitigate risk but if vendors fall short on this front, you open your organisation up to unauthorised access, data breaches or data leaks that can damage your reputation and disrupt business operations.
It’s also important to note that engaging or working with vendors that don’t meet basic security or data protection standards can put you in contravention of various industry-specific and general data protection regulations.
Were an attack to happen when you’d neglected to vet a bad vendor, you may open your organisation up to non-compliance fines or more serious legal penalties so it’s always worth taking the time to double-check that all vendors/suppliers meet the minimum standards for cybersecurity.
To help you do this, we’ve outlined a relatively-simple 8-step process that should allow you to establish a vendor’s security credentials and ensure full compliance with any relevant legislation:
These will often be vertical-specific and often depend on the regulations set by industry bodies or regulators, but they could include factors such as data protection, encryption, access controls, incident response, and compliance with relevant standards or regulations.
Generally speaking, good vendors will make any and all of this information readily available to you at any point. We list our own data security credentials on the privacy page of our website and also make detailed information about our data protection policies available to any prospective, past or current customer on request.
If you’d like more information about cybersecurity or enhancing your organisation’s overall resilience to bad actors, the ICO have a helpful document that walks through the basic precautions in more detail – including a breakdown of things like physical countermeasures and advanced vetting procedures.
A version of this story appeared in: