Get Redstor FREE for 30 days
Are companies targeted because of commonalities? Do they fit a particular profile to hackers? Size of company, amount of staff, industry sector etc?
If systems are not patched to fix a security hole, they will remain vulnerable to that weakness. If you activate remote access, ensure these are set up and configured securely. Realistically once you connect to the internet, that’s the commonality.
What is involved in developing a CS policy?
Look at the risk register and conduct an asset audit within your organisation. Start by reviewing against Cyber Essentials, an independently verified, government-backed self-assessment that will help protect your organisation from the most common cyber attacks.
Do you find that small businesses don’t have as much CS in place?
Small business always need protection and may not set up their systems correctly as they don’t always have access to the necessary expertise. Read the business guide from the NCSC which can assist in bridging that gap: https://www.ncsc.gov.uk/collection/small-business-guide
What about the role of password managers?
Password managers are a positive thing, and yes, they should be installed. The benefit outweighs the risk as people generally won’t use security best practices when choosing passwords. Password managers tend to reduce the obstacles some people have with using strong passwords.
Would you say offsite/cloud backup is the final fail-safe to protect your data?
On-premise systems may have vulnerabilities at the hardware layer, which may be extremely difficult to patch if at all. Good examples are meltdown and spectre, but there are many more. On-premise backup systems usually require a substantial investment, and this could result in risks related to hardware vulnerabilities being overlooked due to cost. This risk can only be mitigated by cloud backups with a proactive approach to securing data. At Redstor, we believe in cloud-first backup, which gives you the most confidence in your backups. Local copies can be used to speed up recovery, but your data is always safe once backed up.
Do you think there is a high percentage of companies who are breached but don’t report it?
Yes. Only around 33% of organisations report it when they are a victim of cyber crime.
Do you support businesses using accreditations such as CyberEssentials to verify that their IT teams are taking the necessary steps to secure and monitor systems?
UK Gov recommends cyber essentials
We are just in the process of moving some critical data from tape to Redstor cloud backup. Is archive included in this or is it an additional cost?
Backup and recovery, DR, archiving and search and insight are all included for a single cost per GB. This package includes Office 365 and will soon include G Suite protection.
Is it possible for Chris to recommend the best company to select when taking the cyber essentials and essentials plus program?
Are schools particularly vulnerable?
Schools might not be targeted directly, but due to the number of students, they can have high exposure to devices spreading malware. Good security measures must be in place to protect sensitive data in such an environment.
Can Redstor help us identify an uncorrupted version in a backup or is that something we have to do ourselves?
You can use the backup summary to identify which backup had a large number of changed files, and this would likely show up in a backup after an attack. It is, however, more likely that you just got hit and you will have a pretty good idea when that occurred. With Redstor, you can recover your critical data or recover into a sandbox to retrieve data and analyse the system without exposing your network to latent ransomware. Using Redstor’s InstantData, you can quickly determine if the data you’re interested in has been corrupted without needing to recover a whole machine image.
Any training software recommended for staff to identify Phishing emails?
There is free training available from the NCSC found here, there is also advice and guidance, with a free phishing simulation here
In terms of reporting cyber attacks and support from police and action fraud, it’s very difficult. We are forced to make decisions quickly, and get into the recovery phase as much as we can. We recently had an attack, but were well into the recovery when we thought to report. Would you recommend reporting and waiting for help? Or would we report and get on with recovery pending any additional support?
If you are a business, charity or other organisation which is currently suffering a live cyber-attack (in progress), please call 0300 123 2040 immediately. This service is available 24 hours a day, seven days a week.
Please note, if you are a member of the public, you must call to report through our core opening hours below. If you have received an email which you’re not quite sure about, forward it to the Suspicious Email Reporting Service (SERS): [email protected]
You can report spam texts directly to your mobile phone provider. All operators now use 7726 as the shortcode to report spam via text, which is free of charge.
Would it be useful if Action Fraud and ICO both signposted each other for reporting. In the thick of our incidents we are then trying to remember which people to notify?
Both agencies are closely aligned with regards to responsibilities. A basic cyber incident response plan should cover these as an aide-memoire and highlight who reports the event/incident.
Is £300 the normal price for the cyber essentials and do you have an approx cost of the plus program?
Quotes are different and can be obtained here: https://iasme.co.uk/cyber-essentials/cyber-essentials-plus-get-a-quote/
* Offer limited to the first 100 sign-ups
* Only valid for new customers of Redstor
* Redstor reserves the right to change T&Cs