1200
627
Written by
Simon Jackson
Simon bring more than 20 years of experience in cloud architecture, networking, infrastructure design. He holds a BSC in Physics from Lancaster University and a postgraduate Master's programme in Cloud Computing from Caltech CMTE as well as holds the globally respected CISSP certification. His academic and professional background spans Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP), underpinned by a strong focus on AI, DevOps and Automation.
Everyone Has a Role in Keeping your Organisation Secure
Cyber attacks target people often as much as the technology we use.
Simple actions such as clicking on links, opening up attachments, or putting in your password in the wrong place could have disastrous consequences.
Awareness, caution, and prompt reporting of incidents is essential.
Common Cyber Attack Methods
Phishing
- Fake Emails, Messages, or websites that impersonate trusted people or companies
- Often with key words like ‘urgent’ or ‘unexpected’ or ‘priority’
- Used to steal credentials, or deliver Malware.
Vishing
Voice-based scans, via phone calls, often impersonating a trusted party.
- Use pressure tactics to convince you into quick-action, or disclosing information.
- Usually involves a demand for immediate payment.
Social Engineering
Stealing identity from online material, especially social media photos, or other details shared online.
- Often initially abused by obtaining a replacement passport; or access to your bank accounts as their first leveraged entries.
- Detrimental impact to the individual.
Randsomware
Malware that often encrypts data on disk, and demands payment to decrypt.
- Often delivered through email attachments, or unsafe website downloads.
Everyday Best Practices
Passwords and Authentication
- Use strong, unique passwords for every service
- Enable mult-factor authentication where available
- Never share passwords
Device Protections
- Keep everything up-to-date
- Lock your screen when unattended
- Encrypt sensitive data, especially on portable devices
Email and Messaging
- Do not open unexpected links, or attachments – EVER
- Verify suspicious messages from known contacts, using another method of communication (suspicious email > call them to confirm)
- Report all suspected phishing immediately
Internet and Downloads
- Only use trusted websites. Avoid unverifiable downloads.
- Do not use public Wi-Fi for any sensitive activity, unless you are guaranteed to be protected with a VPN.
If you suspect a Cyber Incident
- Disconnect from the internet, if safe to do so.
- Do not interact further with the suspicious content.
- Contact your IT/Security team immediately.
- Preserve all evidence, do not delete things and if you can take screenshots (print screen button)
Need help or advice? Contact support@alltimetech.co.uk or call +44 207 225 9119