Are you making these cyber security mistakes?
It feels like every day we’re being warned about a new threat to our cyber security, doesn’t it?
That’s for good reason. Last year, ransomware attacks alone affected 81% of US businesses. And the cost of cybercrime is estimated to hit $10.5 trillion by 2025, according to the ‘2022 Cybersecurity Almanac’. But we’re still seeing far too many businesses that aren’t taking this threat seriously.
It’s not only your data that you could lose if your company falls victim to a cyber-attack. The cost of remediation or mitigation can run into tens of thousands of $$$. And at the same time, you’ll suffer an average of 21 days of downtime after a cyber-attack. Imagine… 21 days without being able to use all your business technology as normal. It doesn’t bear thinking about. That’s not to mention the loss of trust your clients have in you, which could lead to you losing their customers.
It’s really important that your business is taking appropriate steps to keep your data safe and secure. That most likely means a layered approach to your security. This is where several solutions are used, which work together to give you a level of protection appropriate to your business. This reduces your risk of being attacked. And makes recovery easier should you fall victim.
It’s worth pointing out that you will never be able to keep your business 100% protected from cyber-attacks. Not without totally locking down every system, to the point where it would be very difficult to do business (and your staff would constantly be looking for ways around the enhanced security).
No, the key to excellent cyber security is striking the right balance between protection and usability.
There are three mistakes that are most commonly made by businesses – and they’re also some of the most dangerous mistakes to make. Is your business making any of these?
Mistake 1) Not restricting access
Different employees will have different needs when accessing company files and applications. If you allow everyone access to everything it opens up your entire network to criminals. You should also make sure to change access rights when someone changes roles, and revoke them when they leave.
Mistake 2) Allowing lateral movement
If cyber criminals gain access to a computer used by a member of your admin team, that in itself might not be a disaster. But what if they could move from your admin system to your invoicing system… and from there to your CRM… and then into someone’s email account? This is known as lateral movement. The criminals gain access to one system and work their way into more sensitive systems. If they can get into the email of someone who has admin rights to other systems or even the company bank account, they can start resetting passwords and locking out other people.
Scary stuff.
One strategy against this is called air gapping. It means that there’s no direct access from one part of your network to another.
Mistake 3) Not planning and protecting
Businesses that work closely with their IT partner to prepare and protect are less likely to be attacked in the first place. And will be back on their feet faster if the worst does happen. You should also have an up-to-date plan in place that details what to do, should an attack happen. This will significantly shorten the amount of time it takes to respond to an attack. That means you’ll limit your data loss and the cost of putting things right again.
If you know you’re making one (two, or even three) of these mistakes in your business, you need to act quickly. We can help.


No one likes passwords. Creating them. Remembering them. Typing them in.
We have all seen a LOT of change over the past couple of years. You’ve changed the way your business operates, including how we interact with others.

A new report has discovered that 67% of remote workers are using faulty tech when they are working remotely. Often that’s because they’ve accidentally damaged the tech themselves they don’t want to admit it to their boss in case they get into trouble.
Phishing (pronounced: fishing) is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information — such as credit card numbers, bank information, or passwords — on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.


Fake Malicious Dropbox Email:
After seeing a legit Dropbox email .. the above screams malicious. However, we get busy and often don’t take the time to actually look at the details. It is now imperative that you scrutinize ANY and ALL emails with attachments. No technology will prevent human overt-rides. I.E. you click on the link and open the PDF .. it is too late!