SlideShare a Scribd company logo
Cyber Security Guide
Every business that uses technology is a
potential victim of cybercrime. Hacking
and malware are becoming weekly news
headlines with the likes of Talk Talk, Marks
and Spencer and British Gas all being
known victims. Businesses are at risk
because there are so many different kinds
of threats out there.
It is important that businesses are
making the effort to ensure that their
computers and networks are secure
because otherwise the business itself is
at risk, not just the piece of technology
sitting on a desk!
////////////
www.acutec.co.uk
Ransomware is a form of hostile takeover where an
individual or group take over your computer system
and encrypt data. The data is then held hostage and
will only be returned to you and decrypted if you pay a
ransom fee. Sometimes these can appear with a
countdown and when you run out of time the
encryption key is deleted causing your data to be lost
forever.
Ransomware plays on
psychology, the countdown
forces people to feel that they
have to pay the ransom
because they are under
pressure and time is running
out. It is important to be aware
that there is no guarantee that
paying up will solve your
problem.
////////////
www.acutec.co.uk
Between September 2013
and May 2014 it is believed
over half a million people
were targeted.
STATS
It was estimated in 2012 that one
group of hackers was making
$34,000 a day through
ransomware attacks.
It is believed that $5
million was stolen via
ransomware in 2012.
www.acutec.co.uk
Phishing is where an individual receives an email
from what is believed to be a trusted source.
You could receive an email from what appears to
be your bank asking you whether you spent
money in an unusual country. The email may
ask you to click a link and verify your personal
information. You click the link in the hope of
sorting it out and in doing so provide a
malicious entity with data that will enable
them to access your bank account.
////////////
This is not just limited to email! You
can also receive communication
similar to this by phone call or text
message. Be careful when ‘verifying’
your personal details over the phone.
www.acutec.co.uk
SPEAR PHISHING
Spear phishing is a more personal way of trying
to gain your information with an individual
pretending to be someone you actually know
and trust. For example, you could receive an
email from someone you work with asking you to
deposit money into an account. If this is part of
both of your jobs the likelihood is you wouldn’t
question it and would go ahead with the request.
////////////
Sometimes spear
phishing can be obvious.
Look out for irregularities
like shortening of
names, spelling
mistakes or a lack of
usual signatures.
www.acutec.co.uk
VIRUSES
The point of a virus is to damage or
destroy the files on your computer. A virus
has the ability to replicate itself and can
enter your computer through an email
attachment or as an Internet download.
There are many different types of viruses
which infect specific different types of data
on your computer.
You should know
that a virus cannot
be spread without
some form of
human interaction
and that is why it is
so important to
have end user
education. Your
employees should
be fully aware of
what is out there.
////////////
www.acutec.co.uk
Trojans come in the form of computer programs with
harmful code inside what appears to be harmless
programming. They will usually appear to be in a form
that is useful or interesting to persuade you to install it. A
Trojan can make its way to you as an attachment in an
email or as a drive-by download.
Trojans are a doorway to many
other different types of cybercrime.
For example they can enable
software that initiates ransomware
to be installed or allow for your
computer to be involved in other
illegal activity such as attacking
other computers.
////////////
www.acutec.co.uk
WHAT TO DO IF IT
HAPPENS TO YOU
Change your
passwords. All of
them.
www.acutec.co.uk
Disconnect from the
Internet so your system is
no longer being
interrogated.
Alert all staff and make
sure that they
disconnect too.
If you have a backup system
in place, open this and create
a restore point so that the
system reverts to where it
was, removing malware.
Advise any clients
to not open emails
from you.
If your data is sensitive you
should contact the
Information Commissioner's
Office to report a data
breach.
Check your insurance
to see if you are
covered for data loss
and disclosure.
Report the case
to Action Fraud.
IMPACT////////////
If you’re worried
about your business’s
security or this
happens to you then
call ACUTEC on
01675 469020
www.acutec.co.uk
If your IT system is not secure then your business
is not secure leaving all aspects of the business
vulnerable, including:
Client data
Financial data
Website
Social media
Internal and external communication
acutec.co.uk
01675 469020
marketing@acutec.co.uk
@acutec_uk

More Related Content

PDF
Irm 13-phishing
PDF
security procedures
PPSX
Protecting your pc in the new year
PDF
31 Internet Security Tips on CyberSecurity Month Ocotober
PPTX
How to remove trending upnow pop up
PPTX
Introduction to malvertising
PPT
Tips to uninstall Unisales
PPTX
Windows defender email scam
Irm 13-phishing
security procedures
Protecting your pc in the new year
31 Internet Security Tips on CyberSecurity Month Ocotober
How to remove trending upnow pop up
Introduction to malvertising
Tips to uninstall Unisales
Windows defender email scam

What's hot (18)

PDF
obtain additional security
PPT
Introduction to phishing
PPTX
Phishing
PPTX
Cyber Security for REALTORS®
PDF
obtain additional security
PPTX
How to Stop Spam Emails in Yahoo Mail +1-877-618-6887
PDF
Session hijacking by rahul tyagi
PDF
RSA Monthly Online Fraud Report -- August 2013
 
PDF
Top Cyber Threats of 2009
PPTX
Internet Phishing
PPT
How to Remove binkiland.com Hijacker
PDF
Null mumbai Session on ransomware by_Aditya Jamkhande
PPTX
PortaldoSites
PPSX
What Are My Risks
PPT
Digital safety[1]
PDF
Spring Cleaning for Your Smartphone
PDF
Spam and hackers
PPT
Internet for everyone
obtain additional security
Introduction to phishing
Phishing
Cyber Security for REALTORS®
obtain additional security
How to Stop Spam Emails in Yahoo Mail +1-877-618-6887
Session hijacking by rahul tyagi
RSA Monthly Online Fraud Report -- August 2013
 
Top Cyber Threats of 2009
Internet Phishing
How to Remove binkiland.com Hijacker
Null mumbai Session on ransomware by_Aditya Jamkhande
PortaldoSites
What Are My Risks
Digital safety[1]
Spring Cleaning for Your Smartphone
Spam and hackers
Internet for everyone
Ad

Similar to Cyber Security Guide (20)

PDF
Cybercrime - An essential guide from Thawte
PPTX
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
PPTX
Cybersecurity Awareness Training for Employees.pptx
PPTX
Cyber security threats and its solutions
PPTX
Introduction to intelligence cybersecurity_3
PPTX
TheCyberThreatAndYou2_deck.pptx
PPSX
csa2014 IBC
PPTX
Impact on IT system breaches
PDF
ComputerSecurity-Brochure
PPTX
One of 2 protect your business
PDF
Data security best practices for risk awareness and mitigation
PPTX
Can your company survive a modern day cyber attack?
PPTX
Cybersecurity awareness session.pptx
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PDF
Week3-CyberSecurity 8th Semester important.pdf
PPTX
Cyber security
PPT
091005 Internet Security
PPT
Cyber Security-Foundation.ppt
PPT
L N Yadav Cyber SECURITY2.ppt
PPT
L N Yadav Cyber SECURITY.ppt
Cybercrime - An essential guide from Thawte
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
Cybersecurity Awareness Training for Employees.pptx
Cyber security threats and its solutions
Introduction to intelligence cybersecurity_3
TheCyberThreatAndYou2_deck.pptx
csa2014 IBC
Impact on IT system breaches
ComputerSecurity-Brochure
One of 2 protect your business
Data security best practices for risk awareness and mitigation
Can your company survive a modern day cyber attack?
Cybersecurity awareness session.pptx
Cyber Security Awareness Session for Executives and Non-IT professionals
Week3-CyberSecurity 8th Semester important.pdf
Cyber security
091005 Internet Security
Cyber Security-Foundation.ppt
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY.ppt
Ad

More from Chris Roche (20)

PPTX
The 7 Essentials for Cyber Security
PPTX
How to Introduce Yammer to Your Business
PPTX
5 Ways Office 365 Will Transform Your Team
PPTX
5 Tips to Spot a Phishing Email
PPTX
5 Reasons to Move to Office 365 Today
PPTX
5 Myths About Moving to the Cloud
PPTX
4 Highlights of Enterprise Mobility + Security
PPTX
What to Consider Before Migrating to the Cloud
PPTX
What are the Business Benefits of Microsoft Azure
PPTX
6 Ways to Save Your iphone Battery
PPTX
4 Tips to Make Life Easier with Onedrive
PPTX
What to look for in an IT Support Partner
PPTX
What Charities Need to Be Aware of with GDPR
PPTX
Getting the most out of Skype for Business
PPTX
5 things in office 365 that will help you to achieve more every day
PPTX
4 things to do in Microsoft Azure
PPTX
What are the Business Benefits of Microsoft Azure
PDF
Bronx-Engineering
PDF
heart-of-england-mencap
PDF
Purnell's Restaurant
The 7 Essentials for Cyber Security
How to Introduce Yammer to Your Business
5 Ways Office 365 Will Transform Your Team
5 Tips to Spot a Phishing Email
5 Reasons to Move to Office 365 Today
5 Myths About Moving to the Cloud
4 Highlights of Enterprise Mobility + Security
What to Consider Before Migrating to the Cloud
What are the Business Benefits of Microsoft Azure
6 Ways to Save Your iphone Battery
4 Tips to Make Life Easier with Onedrive
What to look for in an IT Support Partner
What Charities Need to Be Aware of with GDPR
Getting the most out of Skype for Business
5 things in office 365 that will help you to achieve more every day
4 things to do in Microsoft Azure
What are the Business Benefits of Microsoft Azure
Bronx-Engineering
heart-of-england-mencap
Purnell's Restaurant

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PPTX
A Presentation on Artificial Intelligence
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
A Presentation on Artificial Intelligence
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Cyber Security Guide

  • 2. Every business that uses technology is a potential victim of cybercrime. Hacking and malware are becoming weekly news headlines with the likes of Talk Talk, Marks and Spencer and British Gas all being known victims. Businesses are at risk because there are so many different kinds of threats out there. It is important that businesses are making the effort to ensure that their computers and networks are secure because otherwise the business itself is at risk, not just the piece of technology sitting on a desk! //////////// www.acutec.co.uk
  • 3. Ransomware is a form of hostile takeover where an individual or group take over your computer system and encrypt data. The data is then held hostage and will only be returned to you and decrypted if you pay a ransom fee. Sometimes these can appear with a countdown and when you run out of time the encryption key is deleted causing your data to be lost forever. Ransomware plays on psychology, the countdown forces people to feel that they have to pay the ransom because they are under pressure and time is running out. It is important to be aware that there is no guarantee that paying up will solve your problem. //////////// www.acutec.co.uk
  • 4. Between September 2013 and May 2014 it is believed over half a million people were targeted. STATS It was estimated in 2012 that one group of hackers was making $34,000 a day through ransomware attacks. It is believed that $5 million was stolen via ransomware in 2012. www.acutec.co.uk
  • 5. Phishing is where an individual receives an email from what is believed to be a trusted source. You could receive an email from what appears to be your bank asking you whether you spent money in an unusual country. The email may ask you to click a link and verify your personal information. You click the link in the hope of sorting it out and in doing so provide a malicious entity with data that will enable them to access your bank account. //////////// This is not just limited to email! You can also receive communication similar to this by phone call or text message. Be careful when ‘verifying’ your personal details over the phone. www.acutec.co.uk
  • 6. SPEAR PHISHING Spear phishing is a more personal way of trying to gain your information with an individual pretending to be someone you actually know and trust. For example, you could receive an email from someone you work with asking you to deposit money into an account. If this is part of both of your jobs the likelihood is you wouldn’t question it and would go ahead with the request. //////////// Sometimes spear phishing can be obvious. Look out for irregularities like shortening of names, spelling mistakes or a lack of usual signatures. www.acutec.co.uk
  • 7. VIRUSES The point of a virus is to damage or destroy the files on your computer. A virus has the ability to replicate itself and can enter your computer through an email attachment or as an Internet download. There are many different types of viruses which infect specific different types of data on your computer. You should know that a virus cannot be spread without some form of human interaction and that is why it is so important to have end user education. Your employees should be fully aware of what is out there. //////////// www.acutec.co.uk
  • 8. Trojans come in the form of computer programs with harmful code inside what appears to be harmless programming. They will usually appear to be in a form that is useful or interesting to persuade you to install it. A Trojan can make its way to you as an attachment in an email or as a drive-by download. Trojans are a doorway to many other different types of cybercrime. For example they can enable software that initiates ransomware to be installed or allow for your computer to be involved in other illegal activity such as attacking other computers. //////////// www.acutec.co.uk
  • 9. WHAT TO DO IF IT HAPPENS TO YOU Change your passwords. All of them. www.acutec.co.uk Disconnect from the Internet so your system is no longer being interrogated. Alert all staff and make sure that they disconnect too. If you have a backup system in place, open this and create a restore point so that the system reverts to where it was, removing malware. Advise any clients to not open emails from you. If your data is sensitive you should contact the Information Commissioner's Office to report a data breach. Check your insurance to see if you are covered for data loss and disclosure. Report the case to Action Fraud.
  • 10. IMPACT//////////// If you’re worried about your business’s security or this happens to you then call ACUTEC on 01675 469020 www.acutec.co.uk If your IT system is not secure then your business is not secure leaving all aspects of the business vulnerable, including: Client data Financial data Website Social media Internal and external communication