search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
business does not have adequate protection and a cyber attack results in theft of company or client data, they could be liable for fines of up to 4% of turnover, which for some businesses could be hundreds of thousands of pounds. Many people also underestimate the cyber risk their


smart-phones and tablets pose. Phones and tablets are increasingly becoming more connected and synchronised to the Internet and other IT systems and can contain a large amount of sensitive data that can be easily attacked or stolen. For example, most mobile devices are fitted with Near Field Communication, a technology that allows devices to exchange information simply by placing them next to one another. Crooks will often walk slowly past a queue of people scanning mobile phones in pockets and hand bags stealing data. Sadly, too much of our work is in helping people restructure their IT security and back up planning after the event rather than preventing it in the first place. Believe me, it is a far more economical to allocate a proportion of any IT budget to providing a robust and appropriate computer disaster recovery plan than not. Had BA and the NHS done this, then it is highly likely the problems they encountered would have been much quicker and easier to remedy”. Given that cyber crime is netting crooks literally


billions of pounds a year we can be assured that it will continue to pose a threat for the foreseeable future. So what can individuals, companies and organisations do to help reduce the impact of cyber crime? Richard Lloyd of NC Insurance has some helpful advice for anyone concerned. “Ask yourself this; what would be the impact upon


your business and trading position if your entire IT system was hacked, erased, held to ransom or just crashed? For many businesses it could be catastrophic


Ability Needs Magazine


and extremely commercially damaging. Just look at what happened to BA and the NHS. However, there are a number of things a business


can do to minimise the threats posed by cyber crime. The first is to undertake a review of the IT system and identify any areas of weakness and ensure these are adequately addressed. You won’t get this from an online comparison site, it’s far better to get an expert to do it properly. Specialist IT communications and security companies, such as Adept, will generally provide a free comprehensive appraisal of the IT equipment and how it is used, they can then offer an appropriate level of protection based upon the overall operational needs of the business. Other things to consider is to understand the way in


which cyber crime works and ensure all staff are aware of any potential threats and how to avoid succumbing to them. It may also be worth considering investing in a cyber insurance policy too; cyber insurance is becoming more and more popular as most standard business insurance policies don’t cover any losses resulting from cyber crime. Cyber crime is probably one of the greatest threats to businesses today and it makes economic sense to be protected. NC Insurance has a range of polices to ensure that, in the event of being the victim of cyber crime, cover is available to compensate a business or help get it back on track”.


Adept CTS Ltd. and NC Insurance have pub- lished a free guide on how to reduce the risk of cyber crime. To get the free guide or request a free IT security appraisal simply contact Adept on Tel: 0191 341 0123 or email: info@adeptcts.co.uk


49


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60