The Book-keepers Forum (BKF)

Post Info TOPIC: SMEs and cyber attacks.


Senior Member

Status: Offline
Posts: 219
Date:
SMEs and cyber attacks.
Permalink Closed


When I hear of cyber attacks, I tend to think of (I know this is stereotyping, but ...) Korean military technicians trying to intercept classified information, or high school kids showing NASA that their computer systems aren't all they're cracked up to be.

But it seems cyber attacks are a reality for SMEs too, these days.  I came across this during a few idle moments and thought this is something we should all be aware of:

https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/197177/bis-13-780-small-business-cyber-security-guidance.pdf

Anyone had any experiences they are prepared to share?

Iain



__________________


Expert

Status: Offline
Posts: 1716
Date:
Permalink Closed

Hi Iain,

Wonder if anyone else has noticed an increase in the past twelve months of contacts email addresses being hacked or perhaps cloned in some way. I will receive an email from an address I am familiar with, but the only content will be a link. Often, I'm not even expecting to hear from them, or it is someone with whom I no longer have any communications, so there is a slight consciousness before opening the email, that something fishy may be going on.

The numbers aren't overwhelming but this type of cyber attack seemed to be common around ten+ years ago. It also suggests to me that clients, friends and colleagues do not have all the internet security that they ought to have.

Simple to avoid.... don't click on the link and usually I will get round to telling the friend that I have received a spam email purporting to be from them.

Regards,
Tim



__________________


Senior Member

Status: Offline
Posts: 219
Date:
Permalink Closed

Don Tax wrote:

Hi Iain,

Wonder if anyone else has noticed an increase in the past twelve months of contacts email addresses being hacked or perhaps cloned in some way. I will receive an email from an address I am familiar with, but the only content will be a link. Often, I'm not even expecting to hear from them, or it is someone with whom I no longer have any communications, so there is a slight consciousness before opening the email, that something fishy may be going on.

The numbers aren't overwhelming but this type of cyber attack seemed to be common around ten+ years ago. It also suggests to me that clients, friends and colleagues do not have all the internet security that they ought to have.

Simple to avoid.... don't click on the link and usually I will get round to telling the friend that I have received a spam email purporting to be from them.

Regards,
Tim


Couldn't agree more, Tim. 



__________________


Senior Member

Status: Offline
Posts: 219
Date:
Permalink Closed

Here's a cyber-theft story from my own experience.

A while ago, I worked for a company that had moved from a big city to a nearby town. It had been forced to down-size because its entire salesforce had left en masse, taking secretarial staff with them, and set up a rival company in nearby offices. Shortly afterwards, it was noticed that the company's clients were steadily leaving. The new company is still operating successfully; my employer no longer exists.

After the mass exodus, an IT expert was called in who examined the computer data movements, and found evidence that the sales team had systematically copied all of the company's client details onto CD Roms before they left.

These days, with memory sticks, it would be even easier to copy files and smuggle them out.

Iain



__________________


Veteran Member

Status: Offline
Posts: 55
Date:
Permalink Closed

 

Employee data theft is a big issue and the first thing you are taught when working in IT security is that the biggest threat to a firms data is it's staff.  If you want to gain access to a competitiors data then you could spend weeks/months hacking their security, or you could simply apply for a job with them and get handed access to their data on a plate.

 

Lots of the bigger firms have endpoint controls which limit how much data users can copy onto USB sticks etc and all copying is logged to try and stop this kind of thing.

 

 


 



-- Edited by Paul on Tuesday 21st of May 2013 09:49:29 AM



-- Edited by Paul on Tuesday 21st of May 2013 09:49:51 AM

__________________


Veteran Member

Status: Offline
Posts: 55
Date:
Permalink Closed

Shamus wrote:

Hi Paul,

Also, bigger firms disable the USB ports... A determined criminal would be able to get around that (I'm not a criminal and I could).

Combined also with multi layered security and active external email scanning things are more secure than people appreciate but the only system that cannot be stolen from is a system that cannot be copied or if it is copied cannot be read (or at least not understood).

In the world that I come from even if you had an Hex dump of the data you would not be able to understand the content without the related copybook that defines each field.

Also things like names and addresses are kept on different databases (names are constants, addresses change. One name may have multiple addresses, or none).

I think that when it comes to comparing larger businesses (not Government projects!) with those that we mosty deal with it is really a matter of chalk and cheese when it comes to security measures in place to stop data being pilferred.

kind regards,

Shaun.

 


 Hi Shaun,

 

bigger firms are actually a bit smarter than that now and use controls for USB ports, so authorised devices can be used whilst everything else is blocked.   As with everything these controls can be bypassed but does take some time and a high level of IT knowledge.

As you say the easiest way to control data is to stop users from being able to copy it, but most smaller firms don't even do the basics like ensuring proper security on their network to stop access to sensitive data to users who don't need it.

When I used to work in IT support the number of small firms where everyone was setup as an administrator was shocking, but was that way as it was easier than having to get someone to do the admin for security and accounts.

There are steps small firms can take to help with data security, like using free encryption software, but unless they actually want to invest the time/resource they will continue to lose data.

 

Paul

 

 

 



-- Edited by Paul on Tuesday 21st of May 2013 12:21:28 PM

__________________


Expert

Status: Offline
Posts: 1991
Date:
Permalink Closed

Hi had an email about 2 weeks ago from an old colleague that I haven't had any contact with for 6 months. Well this old colleague has wife and 3 kids and normally holidays in UK. So when I got an email from him to say that he needed £1500 because they had been robbed whilst on holiday in the Phillipenes I became suspicious. Their robbery was being investigate by the police over there and they would have to wait 2 weeks, but their flights were due in the next couple of days, so they were asking for money to get home basically. Do they think we are stupid, I deleted the email and didn't bother as I know my colleague and he would not even ask for any money!

You just never know when it going to happen!

__________________

Amanda



Forum Moderator & Expert

Status: Offline
Posts: 11981
Date:
Permalink Closed

Hi Paul,

Also, bigger firms disable the USB ports... A determined criminal would be able to get around that (I'm not a criminal and I could).

Combined also with multi layered security and active external email scanning things are more secure than people appreciate but the only system that cannot be stolen from is a system that cannot be copied or if it is copied cannot be read (or at least not understood).

In the world that I come from even if you had an Hex dump of the data you would not be able to understand the content without the related copybook that defines each field.

Also things like names and addresses are kept on different databases (names are constants, addresses change. One name may have multiple addresses, or none).

I think that when it comes to comparing larger businesses (not Government projects!) with those that we mosty deal with it is really a matter of chalk and cheese when it comes to security measures in place to stop data being pilferred.

kind regards,

Shaun.



__________________

Shaun

Responses are not meant as a substitute for professional advice. Answers are intended as outline only the advice of a qualified professional with access to all relevant information should be sought before acting on any response given.

Page 1 of 1  sorted by
 
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us
Members Login
Username 
 
Password 
    Remember Me  
©2007-2024 The Book-keepers Forum (BKF). All Rights Reserved. The Book-keepers Forum (BKF) is a trading division of Bookcert Ltd. Registered in England Company Number 05782923. 2 Laurel House, 1 Station Rd, Worle, Weston-super-Mare, North Somerset, BS22 6AR, United Kingdom. The Book-keepers Forum and BKF are trademarks of Bookcert Ltd. This forum is a discussion forum only. There will usually be more than one opinion to any question and any posting should not be viewed as a definitive solution. No responsibility for loss occasioned to any person acting or refraining from action as a result of any posting on this site is accepted by the contributors or The Book-keepers Forum. In all cases, appropriate professional advice should be sought before making a decision. We reserve the right to remove any postings which are offensive, libellous, self-promoting or engaged in covert marketing. We will not notify users of removals. The views expressed in the forum posts are those of the individual and do not necessary reflect or agree with those of The Book-keepers Forum. Any offensive or unsuitable posts will be removed by the moderators. Any reader of this forum can request for a post to be looked into by sending an email to: bookcertltd@gmail.com.

Privacy & Cookie Policy  About