7 min read

Cyber security for businesses in Birmingham and the West Midlands

Cyber security for businesses in Birmingham and the West Midlands

I speak to many SME business owners. For the Managing Directors, CEOs and senior leaders that run the 121,175 small and medium-sized businesses based in Birmingham and the West Midlands, they understand why they need cyber security, but are often looking for honest, straightforward and practical cyber security guidance. This is a simple yet effective, best practice framework that small and medium business owners or leaders can follow.

This article covers:

James Cash explains cyber security best practice for SMEs

 

What is cyber security best practice?

There are four elements to a business reaching security best practice. All four areas are covered in this article. Take a look at our cyber security glossary if any of the terminology is unfamiliar and get in touch with us if you need advice or clarification.

  1. Implement effective security controls

  2. Educate employees through cyber awareness training

  3. Limiting access

  4. Continuity planning

 
Looking to improve your cyber security?

Explore our cyber security packages for SMEs.

Cyber Security Packages

 

1. Implement effective security controls

Install anti-malware software on every computer

Anti-malware software scans computers system for all types of malicious software and protects from malware such as:

Spyware

Software unknowingly installed onto your computer, that gathers personal information and tracks what you do on the web. It violates your privacy and be used by hackers, advertisers and data firms.

Adware

Software that automatically displays banners or pop-ups when online – they’re more-so irritating than anything and can make computers/browsers run slowly.

Worms

Malware that spreads copies of itself from computer to computer, designed to spread across multiple devices whilst remaining active on each device.

Anti-malware allows you to browse the web safely, keeps your personal data and files secure from hackers.

 

Ensure computers and network equipment have the latest security updates

We all have pop-ups saying ‘software update is available'. It’s tempting to press ‘cancel’ or ‘remind me later’ – those few minutes waiting for the update or restarting your computer can feel like an eternity when you’re busy. And let’s be honest, not shutting down feels like time-saved at the end of a long day.

Do this at your peril!

Computers and networks need the latest security updates to maintain an SMEs cyber security defences. These essential updates will ultimately keep your private information safe. Even common applications, like operating systems and browsers, can make you systems vulnerable if you don’t accept updates. Consider the short-term inconvenience as a long-term gain – preventing the scary prospect of identity theft, loss of money, credit, and more.

 

Use firewalls to maintain network security

A firewall acts as a barrier between your computer and the internet. As incoming or outgoing traffic goes through the firewall, it checks against a predetermined set of rules. Websites, viruses or malicious attacks are blocked if they do not pass these tests.

SME businesses should implement both firewall software and hardware to maintain effective cyber security protection. Firewall software protects individual employee computers and firewall hardware protects group networks.

 

Web filtering to prevent access to malicious websites

Cyber attacks often require users to visit a webpage that initiates a malware download. In phishing attacks, fake websites that appear to be legitimate can trick users to give away their login credentials or personal details.

DNS filtering (blocking entire websites by blocking the domain) and URL filtering (blocking specific webpages from a website) can control the content accessed on the internet.

 

Email filtering to block spam and malicious emails

Email filtering, as the name suggests, filters email that go inbound into your mailbox and outbound from your server. It ensures that no spam, malicious content, or sensitive data makes it in or out of your server unauthorised.

Popular email platforms will have basic filtering capabilities, however, a dedicated filtering service will protect SMEs against ever-evolving, sophisticated cyber hackers. Email filtering detects:

  • Fake sender addresses

  • Technical properties and errors typically found in spam

  • Malicious links and attachments

Phishing emails, which could also include an attempt to blackmail victims, invite users to click a link or download an attachment can contain malware that spreads like a virus. If clicked, it can extract all the data from inside the hard drive. It can also enable the attacker to track sent emails. This type of cyber security attack can also allow hackers to create phishing scams; communications sent in the name of your SME organisation, appearing as you, a trustworthy source to your clients, customers, and a wider audience.

It may be that you may have already been a victim of a data breach. It is possible to check whether your email address has been pawned and fallen into the wrong hands.

 


2. Educate employees through cyber awareness training

It's unlikely that an employee knows what phishing or malware is. We would argue that it’s not important to know the precise definition or technical names. What is important is to have cyber awareness:

What does a scam email look like?
Understanding remote working best practice
Password basics
Using personal devices for work

The entry point of most cyber attacks is employees. Human error. 

All employees play a role in fulfilling a business’ SMEs cyber security strategy. To keep up to date with the latest scams and to gain a basic awareness, cyber awareness training  employees can be done in a few ways:

 

Automated training

Deploying automated user education and awareness training

We’ve found the simplest and easiest way to train SME employees about cyber security is through an automated education and awareness training tool. Employees are enrolled in personalised courses and sent automated email reminders to watch/complete short video tutorials. You’re also emailed scam alerts to inform of recent scams and what to do if you are targeted.

The video tutorials can be watched on demand, which is perfect for those working from home, removing the effort to check diaries and organise workshops. The videos are quite funny too, making what can be a ‘dry’ topic, engaging and easy to understand. As admin, you can check the progress of your employees and also send simulation phishing attacks to ‘test’ their awareness.

Download your free Cyber security email campaign template for employees

 

Policies and responsibilities

Developing policies that define your cyber security posture and inform your team on their responsibilities

An SME business should have GDPR documentation and processes, as well as a security or cyber security policy. You’re probably wondering what an SME cyber security policy should include. Below is a basic framework:

 

Cyber security policy framework

Aim and Scope

Responsibilities

Legislation

Personnel Security

Contracts of Employment
Information Security Awareness and Training
Intellectual Property Rights

Access Management

Physical Access
Identity and Passwords 
User Access
Administrator-level Access
Application Access
Hardware Access
System Perimeter Access (Firewalls)
Monitoring System
Access and Use

Asset Management

Asset Ownership
Asset Records and Management
Asset Handling
Removable media 
     Users breaching these requirements may be subject to disciplinary action
Mobile working 
Personal devices / Bring Your Own Device (BYOD)
Social Media (see 38-57 for social cyber tips)

Computer and Network Management

Operations Management
System Change Control
Accreditation
Software Management 
Local Data Storage 
External Cloud Services
Protection from Malicious Software
Vulnerability scanning

Response

Information security incidents
Business Continuity and Disaster Recovery Plans
Reporting

 


3. Limiting access

 

Removable media

Controlling access to removable media such as USB drives

SMEs should create very clear guidance and cyber security policy around removable media. Their capability to hold large amounts of data and be transported or lost makes them a huge vulnerability to any SME business’ security. It can lead to loss of information and introduction of malware.

In normal circumstances, information should be stored in corporate systems. To limit their use, only allow certain media ports and users access to portable devices. Also, formally issue and keep a log of who has removable media.

Users should encrypt information held on the media. Take appropriate steps, when the media is reused or destroyed, to ensure that all previously saved information cannot be accessed. Removable media should also be automatically scanned for malware when introduced to any system.

 

Zero trust network

Only provide staff with the access levels they require to carry out their roles

Provide reasonable, yet minimal, system privileges or data access. What access is required for an employee’s job? Continually review access, particularly when granting highly privileged administrative accounts. This minimises risk if an account is misused or compromised. This is particularly recommended if team members are remote working due to the heightened security risks.

 


4. Cyber security continuity planning for SMEs

 

Data Backup

Have a robust backup and SME business continuity plan to help recover from a potential cyber security breach

At some point, your SME business will experience some kind of cyber security incident. Incident management or continuity planning is really important to reduce the impact of a cyber attack on your company. The supporting policy, processes and plans should be risk based and cover any legal or regulatory reporting requirements. Having the right skill-set, defined roles and responsibilities (whether in-house or outsourced) is crucial to having an adequate response.

Incident management or continuity plans should be tested and continually evolve to improve the way in which you respond.

Have a systematic approach to the backup of essential data to avoid data loss. We would advise SMEs to have automated backup, which gives complete peace of mind. If you use physical media to back-up data, ensure it is secured and offsite. And it is really important to test your backup! Test retrieving data that has been archived regularly just to be sure!


How cyber security best practice benefits SMEs

  • Automating many of the cyber security practices, described above, require minimal maintenance once they’ve been set up.

  • Have confidence that your data and systems are protected and knowing that you have a good level of protection against common threats. In addition, it’s good to know that you can recover data if your defences are breached.

  • It gives your clients confidence that you are protecting their data and systems.

  • Confidently complete self-assessment security assessment when you tender for new work. 

  • Avoid GDPR compliance failure and damage to your brand reputation. You don’t really want to be notifying or being fined by the Information Commissioner’s Office (ICO) or having to inform your clients and customers of any breaches.


Challenges when adopting cyber security best practice

  • There’s a lot of misinformation from cyber security vendors and it can be difficult to select what you really need.

  • People are busy and stick to their habits, so it can be a slow process getting them to change to better security habits. People are the biggest threat to security, so this is crucial to get this piece right.

  • Even for people who are tech-savvy, it can be difficult to decipher cyber security and compliance standards.


What next?

This article encapsulates the core and broad areas of cyber security. Each business' cyber security will differ depending on your industry (e.g. accountancy), the technology, systems and devices you use and your supply chain.

Your cyber security will also need to incorporate more granular elements, relevant to your business; such as your website may need CAPTCHA.

If you have smart or Internet of Things (IoT) elements to your business, for example, sensors to your manufacturing or engineering factory, then the security of this element will need to be addressed and covered.

Make your business cyber safe

If you’re looking to make your business cyber safe, remember to lean on an expert and ask lots of questions. Hopefully we have answered many of your questions in this article today. We have created two cyber security packages to address all fundamental SMEs cyber security needs.

Speak to an expert

If you still have questions about your business' cyber security, then why not schedule some time with one of our experts.

 

 

Sign up to our newsletter

If you want to keep up to date with the latest cyber security tips, then subscribe to our newsletter:
Sign up to our newsletter

 

Next steps

We help small and medium-sized business implement a proportionate level of security to their business, which is affordable and effective. See our cyber security packages for more information about the cyber controls included and contact us to speak to one of our cyber experts.


Cyber Security Packages

Get in Touch

 

 
Looking to improve your cyber security?

Explore our cyber security packages for SMEs.

Cyber Security Packages

 

Advantages of data backup and recovery

Advantages of data backup and recovery

Data backup and recovery is a necessary safety net for businesses today. In this article, we detail the main advantages of data backup and recovery....

Read More
Cyber security remote working guide

Cyber security remote working guide

remote working cyber security Remote working is a standard practice amongst businesses today. The accelerated transition to hybrid working during the...

Read More
Cyber Security Glossary

Cyber Security Glossary

Cyber Security is a new business discipline. Many cyber terms and phrases sound alien as they have only been in existence for a short number of...

Read More