We all take time to protect our homes and workplaces from damage or loss by making sure windows are closed, locks are fitted, and the alarm is on.  The difficulty with technology is that points of access are unseen and the means at a thief’s disposal vary.

Greater consideration needs to be given to the increasing threat that faces us all when protecting our business. We find that the Data files held by a company, which are vital to its success, are not adequately protected as the risk is largely intangible and the vulnerability is not understood.

How can access be gained?

Access to computers by non-authorised person:

• How is your equipment physically protected?
• Who has access to the equipment?
• What equipment is taken offsite?
• Are there any rules?
• Use of equipment?

USB pen containing viruses:

• Instances of pen being left on the floor or desk. An authorised person then uses the pen to a) find out who owns it b) use it.

Phishing/Social Engineering:

• Emails purporting to be credible however contains either a virus / malware
• Targeting email asking for money to be transferred

Denial of Service:

• Bombarding the servers with traffic so the system collapses
• Virus which prevents access / slows everything down

Ransomware:

• Either steals files or blocks access
• Demands money to release

Key Logging:

• Device which can remotely see all key strokes

What can you do?

There is a little known Government initiative underway called Cyber Essentials.  Its intention is to get Companies to protect themselves against Cyber Risk.

Here are some basic security questions that you should ask yourself:

• Have you activated your firewalls on all computers and routers?
• Have you changed the default settings and passwords on these?
• Have you removed any software applications that you do not use on your PC’s?
• Do you delete user accounts from PC’s and mobile devices that are no longer needed?
• Are Users encouraged to change their passwords frequently?
• Do you run anti-malware on all your mobile devices that could connect to your system (including own and employee devices)?

Franklands Insurance can also provide access to experts in the field of cyber risk management as well as support this with a form of insurance and risk management solution.

For more information and to carry out your own assessment visit www.cyberstreetwise.com or speak to Kate Slater or Phil Walker at Franklands Insurance & Risk Management.

Latest Opportunities

Join the External Advisory Board – School of Life, Health & Chemical Sciences (The Open University)

The Open University are seeking professionals to join their External Advisory Board to help ensure…

Funding Now Open: £20M for Drug & Alcohol Addiction Healthcare Innovation

Innovate UK on behalf of the Office for Life Sciences Addiction Healthcare Goals programme are…

Calling Supply Chain Innovators: Grants of £100,000 Available!

Funding call for supply chain innovators for grants of up to £100,000 As a Research…

Latest News

UoN hosts the launch of programme to help East Midlands researchers commercialise life-changing treatments

The University of Nottingham has played host to the launch of a new programme to…

Upperton Advances Sterile Manufacturing Facility with MHRA Submission

Upperton has formally submitted its application to the UK Medicines and Healthcare products Regulatory Agency…

Advancing Neonatal Monitoring with MeTAP Support - Medilink Midlands Case Study

At a glance: Company: SurePulse Sector: MedTech / Neonatal Care MeTAP support accessed: Grant funding,…

Your innovation deserves recognition

The Medilink Midlands Awards are now open, celebrating outstanding innovation across the region’s medtech and life sciences sector.

With 10 categories to enter, now’s the time to showcase your achievements.
Extended Deadline Date: 16th January

Start your application today.

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​

Almost There! Just Tell Us a Bit About You​