search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Cyber Crime Poses Real Threat


rival Adept CTS Ltd merging the businesses ensured they continued to go from strength to strength. Michelle was keen to stress that key to success has been the quality and professionalism of the employees, such as Operations Manager, Paul Reynolds, a former government cyber security expert who explained more about the threats from cyber attacks. “As more and more of our everyday activity, both


commercial and social, is becoming technology based, so does the need to ensure that technology is protected from cyber crime. Just as the level of IT technology improves and advances, so does the quality and sophistication of computer virus and malware. Indeed, the latest attack was seemingly the result of hackers releasing a US cyber weapon and in the case of BA poor back up and a lack of a robust disaster recovery plan.”


Michelle Pugh of Adept CTS Ltd and Richard Lloyd of NC


Insurance T


HE RECENT cyber-attacks that caused disruption and chaos to many businesses and organisations, including the NHS,


demonstrated just how destructive a computer virus or ransomware can be to unprotected or out-of-date IT systems. At a recent business networking event, Ability Needs


met up with Michelle Pugh of Adept CTS Ltd, a communications and technology business. Readers may be familiar with Michelle’s husband, Phil Pugh, who is the managing director of Adventure Mobility Ltd makers and suppliers a range of off-road wheelchairs. Michelle was giving a presentation on IT security in


the wake of the recent high profile cases of British Airways (BA) computer failure and the cyber ransomware attacks. The presentation was extremely eye opening and laid bare just how vulnerable businesses and organisations are to the crippling effects of modern cyber threats. Michelle Pugh set up her first IT communications and


technology business, Way-2-Communicate, in 2010. Speaking of the decision to set up the business Michelle said “For quite some time, almost every organisation relies on some form of IT in the day-to-day running of their commercial activities and we saw a gap in the market for businesses, large and small, to access a range of IT solutions including: connectivity, secure document storage and of course cyber security and disaster recovery planning.” The company grew rapidly and in 2013 they acquired


48 Ability Needs Magazine


Adding, “Many people mistakenly think that cyber crooks,


viruses and hackers tend to focus on attacking large organisations such as banks and big corporations. This is a common misconception as small businesses, often with nothing more than a PC and smart-phone, are just as much at risk, if not more so. Many small businesses will often just use the free versions of the many anti- virus protection products available, the trouble with these are they only scan and protect about 10% of a computers operating system, leaving them vulnerable to more sophisticated cyber attacks. Cyber crime is a real problem and it is only going to


get worse. Last year alone it was estimated cyber crime cost UK businesses £29 billion. It’s not just about protecting the impact on a company’s IT system either, insufficient protection against a computer virus or malware attack could render a business in breach of the General Data Protection Regulation (GDPR). If a


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60