What is a supply chain attack and how can you prepare your business?

These days it can seem like there are more ways for cybercriminals to attack your business than minutes in the day, but it’s true: there are a myriad ways that cybercriminals can cause disruption and financial loss.

More than direct attacks, cybercriminals who want to attack a specific business may even opt for other methods such as supply chain attacks. But what is a supply chain attack, who has fallen victim recently, and how do you protect your business from such an attack? Join us as we share everything you need to know.

What is a supply chain attack?

A supply chain attack is when cybercriminals target third-party companies that businesses deal with, rather than directly targeting the businesses they want to attack.

Let’s say your business has the highest level of cybersecurity, if the third-party companies you rely on do not you could still face major cybersecurity problems as a consequence.

There have been some high-profile cases where cyberattacks have targeted supply chains, and SolarWinds is one of the most significant attacks on record.

How was SolarWinds targeted?

SolarWinds is a company that provides Orion; a network and applications monitoring platform. Hackers were able to compromise the infrastructure, which distributed ‘trojanised’ updates to the users.

It was reported that 425 of the US Fortune 500 were customers of SolarWinds, including the US Military, Pentagon and State Department. Additionally, the top ten telecommunications companies and top five accounting firms were also listed as users.

The attack also enabled the hackers to access FireEye’s network, which is a US cybersecurity firm. This impacted companies and organisations around the world, including governments and telecoms.

One of the reasons supply chain attacks are becoming so prevalent is because they allow hackers to access many companies and organisations rather than just one, as demonstrated in the SolarWinds attack.

How to protect your business against supply chain attacks

Research has found that 55% of security professionals reported organisational breaches involving supply chain or third-party providers in the past 12 months.

With attacks on supply chains hotting up, it’s important to stay protected. There are a number of ways that businesses can boost their protection from attacks, including:

Implement a Zero Trust Architecture

A Zero Trust Architecture assumes that all network activity is malicious, so there are a number of strict policies that must be passed before access to intellectual property is granted.

Install anti-virus software

Installing and keeping your anti-virus software up to date will help to protect your systems in the event of a cyberattack.

Use honeytokens

Honeytokens are traps used to catch cybercriminals. They utilise fake resources to fool hackers into thinking they are accessing sensitive data. An alert will be triggered if a hacker attempts an attack, giving businesses advanced warning that an attempt is being made to access sensitive data.

Restrict access to sensitive data

Good access management can make a big difference to protecting businesses. Ensure that only the employees who absolutely must have access to sensitive data to perform their role have access. The more accounts with privileged access, the more accounts hackers can target.

Training employees

Hackers will often try to expose human errors such as poor password management or by tricking employees into clicking dangerous links. Having a high-quality cybersecurity training programme is key to creating a culture of cybersecurity awareness in employees.

raining solutions that are engaging and relate to the employee’s own role and tasks are more effective than the standard off-the-shelf training courses.

Bob’s Business provides cybersecurity training that not only helps employees recognise threats, but also understand what to do in the event of an attack to minimise the consequences.

Our unique Human Vulnerability Assessment tool can help you determine your business’ cybersecurity blind spots.

Join us in driving meaningful change around cybersecurity by discovering more about how our training solutions can protect you. Book a demo now.

How to stay cyber-safe this summer

It’s summer holiday time and for many, it means sun, relaxation and time with the kids.

With plenty of recreational time, many of us will purchase items online, book holidays or scroll through social media – leaving us vulnerable to our personal information being stolen.

Over 60% of the world’s population are internet users, and that scale brings more opportunities for cybercriminals to exploit an individual’s online security weaknesses and commit cyberattacks.

According to IBM data, over 90% of cyberattacks occur due to human error. The psychological, emotional, and financial impact cyberattacks can have on victims can be destructive, which is why you need to be so vigilant about your online safety.

Here are some top tips you can implement to improve your cybersecurity and cyber awareness to avoid becoming a victim of a cyberattack:

How to stay cyber-safe this summer

Use strong passwords

Whether you are using work systems or your social media accounts, make sure that you create strong and unique passwords to make them difficult for cybercriminals to decipher. Multi-factor authentication methods are one of the most effective ways to stay secure online, so activate it on every account that lets you use it.

Use secure networks and devices

When you use the internet remotely make sure you use a secure network. Public WiFi networks are convenient to use, but are also at high risk of cyberattacks due to their lower security. Installing antivirus software will also help to boost your cybersecurity and keep you safer online.

Use VPNs

Many businesses have started to use VPNs, the virtual private networks that create a more secure tunnel between your device and the internet. VPNs hide your IP address, which can help to stop cybercriminals from accessing your data.

Read more about using VPNs as part of your cybersecurity here.

Only use trusted websites

Make sure the websites you use are trusted and secure. As a minimum, legitimate websites should display that they have an SSL certificate – which the padlock will show at the side of the URL bar, and the website address should start with ‘https’.

Only use websites that you have used before and trust. Should you need to use a website you haven’t used before, try to find online reviews that will help confirm whether the website is genuine and not set up by a scammer.

Be careful what you post

Having more free time to spend online means more time to browse social media. It’s safe to say that social media is a massive part of people’s day-to-day lives and is unlikely to go away anytime soon.

Despite the massive strides and benefits of social media has created for many of us, it has also created more avenues of opportunity for cybercriminals to take advantage of.

Take, for example, your digital footprint – the sum total of all publicly available information about your online. It can give away your location, your passwords and much, much more.

Read our blog on the do’s and don’ts of social media to keep your information secure, or discover our dedicated Digital Footprint course.

Be wary of links in emails, texts, and social media messages

Before clicking on any links within emails, text messages, or social media messages, take some time to check whether you should trust the link.

Check the sender’s email address to ensure it is not from a scammer using a similar email address of a contact or organisation known to you. Cybercriminals often play on people’s curiosity, using statements like ‘look what I found’ or ‘is this you?’ to try to encourage the recipient to click on the link.

These sorts of attacks are known as phishing attacks, and a report by Intel found that an astonishing 97% of people were unable to correctly identify phishing emails.

Bob’s Phishing is designed to provide incredible simulated phishing training to ensure you and your team don’t get hooked.

Bob’s Business provides effective products that boost cybersecurity awareness to help people stay safe online at work, at home, or on holiday.

Find out more about how we can help you stay safe online by viewing our full range of courses.

What is ransomware and can you prevent it?

If you’re fortunate to have never encountered the term ‘ransomware’, you’re lucky to be in the minority.

Indeed, the reality of the cyber landscape is such that ransomware attacks have caused severe problems for businesses across nearly all industries, with 80% of organisations hit by a ransomware attack in 2021.

But what is ransomware, how can you prevent attacks, and what should you do in the event of a successful ransomware attack? Join us as we share everything you need to know.

What is ransomware?

Ransomware is malware designed to lock users out of their system or from accessing their files. After cybercriminals have activated their malware, they demand a ransom be paid to regain users’ access to their systems.

Cybercriminals frequently request payments be made using cryptocurrencies, making them almost impossible to trace. Indeed, 2019 research found that Bitcoin accounted for 98% of ransomware payments.

One of the most high-profile and severe ransomware attacks involved the Colonial Pipeline, a Texas-based gas pipeline. A ransomware attack caused six days of enormous disruption to the system. The attack was classed as a national security threat, with the President declaring a state of emergency. The malware infected the systems due to a compromised VPN password, and Colonial Pipeline Company ended up paying almost $5 million in Bitcoin.

While this example affected a large organisation, there are many cases where cybercriminals target smaller organisations, exploiting the fact that smaller businesses are unable to operate without access to their systems. Smaller businesses can often fall into the trap of neglecting their cybersecurity, believing an attack isn’t the sort of thing that would happen to them.

How to prevent ransomware attacks

For businesses, having an effective cybersecurity management strategy is critical to preventing and recovering from ransomware attacks. The strategy should include:

  • Delivering high-quality training and education for employees, including topics such as avoiding opening unverified emails or clicking links within suspicious emails.
  • Backing up important files on two different types of storage e.g. cloud and hard drive.
  • Performing regular software updates.
  • Access management to limit who can access network drives.
  • Good password creation practice.
  • Installation of anti-virus and anti-malware software

What to do in the event of a ransomware attack

There are several actions you should take to limit the damage caused by a ransomware attack, such as:
Report the incident to the authorities.

  • Isolate the infection by separating infected computers.
  • Identify which strain of malware was used in the attack.
  • Restore your backups.
  • Update employees to warn of a follow-up attack.
  • Investigate the root cause and develop an action plan to prevent future cyberattacks.

If a ransomware attack has not targeted your organisation, there is a possibility that it will happen in the future.

Any organisation that relies on using connected systems can be a victim of ransomware, not just the big companies with large profits. Many businesses think they are not large enough to be worth attacking, making them prime targets for cybercriminals.

Many cyberattacks target human vulnerabilities, as security software can only do so much to prevent these types of attacks. If an employee receives an email with a dangerous link, their training should have prepared them to spot the suspicious email and know what actions should be taken to help protect the business.

Bob’s Business is an industry-leading cybersecurity training provider that is helping businesses reduce the chances of being hit with ransomware attacks through engaging, relatable training courses and simulations.

Would you like to see a demo? Get in touch and we will show you all the benefits of incorporating our training solutions into your cybersecurity management strategy.

How to spot and prevent malicious emails

You might have heard that phishing attacks are the most common type of cybersecurity incident we face. Well, there’s a good reason for that.

Research shows that employees receive an average of 14 malicious emails annually, and new phishing scam tactics are frequently designed to catch people out.

However, identifying a malicious email is not always as easy as you think. With cybercriminals using more sophisticated techniques to trick email recipients into believing the email is genuine, these attacks are getting harder to stop.

The most common reason for data breaches is human error. As such, educating your employees on how to recognise cyberattacks is crucial for protecting your business from the consequences, ranging from financial loss to reputational damage.

When your team is given the proper training, your team become an essential part of your security.

Check out these top suggestions for identifying and preventing pesky phishing emails.

How to detect a malicious email

Double-check the sender’s email address

Your first port of call is to check and then double-check the sender’s email address to see whether it is from a company domain or public domain.

Malicious emails are more likely to be sent from a public domain email address – for example, one that ends with @gmail.com or yahoo.com. These email addresses are free to set up and are easier for criminals to utilise without getting traced, as they don’t have to provide payment details.

You should also look for any unusual email sender names, as a genuine one from a business will usually be from ‘customersupport@’ or similar. If there is an unknown person’s name, some extra characters or a misspelling, then this could be a sign that it is a malicious email. “l” can look a lot like “1” in an email address at a glance.

Look for mistakes in the content of the email

Another clue to look out for is whether there are any mistakes in the email, such as spelling errors or bad grammar. Genuine business emails are typically professional and error-free.

Flag requests for high-risk data

All employees should be trained to question any request for data. In some phishing scams, criminals will pretend to be a person of authority or someone known to the recipient. By appearing to be a colleague or senior manager, for example, attackers have a better chance to pressurise the victim into sharing personal data or login credentials.

Be careful with urgent messages

A common technique used in email scams is to apply urgency. ‘We have contacted you several times and not received a response’ or ‘take action immediately’ are common tactics. Attackers may also use red font or colouring within the email as this psychologically makes people perceive the request as urgent.

Employees should be very wary of any emails that try to panic them into a fast response, as this is to prevent them from having time to question the authenticity and make the relevant checks.

How to prevent falling victim to malicious emails

Arm your employees with the cybersecurity knowledge they need to spot and stop phishing attacks in your organisation. With Bob’s Phishing and Bob’s Culture, we deploy targeted and tailored phishing emails to your team that simulate real phishing attacks. Staff that click are automatically assigned training which helps to create positive new behaviours around phishing attempts.

Book a free consultation with one of our cybersecurity experts to discuss how to decrease the risk of phishing attacks in your organisation today.

What is the future of cybersecurity?

Despite being an integral part of modern life, there are still many people (and companies!) who don’t understand the value of cybersecurity. Indeed, even the US Government didn’t consider cybersecurity an issue worthy of a national strategy until around 2003.

In recent years, due to lockdown restrictions, businesses have increased their reliance on technological and digital solutions faster than ever. They have allowed businesses to operate in new ways in order to not only survive but also to thrive. However, they have also created new avenues for attack.

Cybercriminals are adaptable and often ahead of the curve, in a rapidly changing world, they are constantly developing new methods of deception. Just last year, fake NHS emails and texts were sent out by scammers taking advantage of the COVID-19 pandemic.

Because criminals are constantly developing new scams and more sophisticated attacks, businesses must invest more heavily in cybersecurity solutions and processes. But, what does the future hold for cybersecurity?

The future of cybersecurity

Many of us are playing catch-up in the war against cybercrime. Take the increasing problem of ransomware and finding solutions to protect businesses from these attacks, for example, or closing the skills gap within the cybersecurity industry.

The International Data Corporation even estimated that worldwide cybersecurity spending will reach around $175 billion by 2024.

The future of ‘The Cloud’ and Artificial Intelligence

Cloud computing has provided numerous benefits, including cost savings, efficiency, and sustainability. However, because of the large amounts of data and personal information stored, it is another service that cybercriminals are targeting. As cybercrime evolves, it is a service that necessitates ongoing security training and awareness.

Artificial intelligence (AI) will greatly assist in cybersecurity; AI technology can identify threats and patterns much faster than traditional security processes. The downside of AI’s rise is that it is also being used by cybercriminals to help improve their strategies. As a result, as AI is used more in attacks, we can expect to face more severe and frequent cyber threats in the future.

Read our recent blog for more information on the impact of AI on cybersecurity.

But what does this mean for you?

As the world around us continues to advance technologically, we must also remain vigilant and aware of cybersecurity trends.

Human error is one of the top risks that criminals target, so businesses must continue to develop stronger cyber risk management frameworks; this means having highly effective cybersecurity training for all employees.

Regular updates should be included within training solutions to not only incorporate the most recent cyberattack trends but to also raise employees’ awareness of the most pressing cybersecurity concerns that are emerging.

At Bob’s Business, we provide tailored and innovative training products to make sure your employees are armed against the cybersecurity revolution.

Book a free consultation with one of our specialists to discuss your training needs today.

What are the cyber-threats to the technology sector?

It wouldn’t be inaccurate to say that, when it comes to cyber threats, the technology sector has seen more than its fair share.

In fact, research shows that an average of 150,000 threats per week were recorded against the sector in 2021. While it’s true that attacks affect every industry, the technology sector’s relentless innovation and large data pools are highly attractive to cybercriminals.

Whilst the technology sector is more likely to have a board member with a specific cyber or data security remit, its reliance on technological solutions can hamper its ability to mitigate attacks.

According to Verizon’s Data Breach Investigations Report, 85% of cyber-attacks have a human element to them, and no purely technological solution can reduce this risk.

But what are the top cyber threats faced by the technology industry? Join us as we take a look.

Ransomware

One of the biggest threats to any kind of business is disruption that prevents everyday operations. Taking systems offline is one way that a business can be disrupted and the longer the disruption, the more money it will cost.

Ransomware has grown to become one of the key threats facing companies. Put simply, ransomware attacks lock data and systems behind strong encryption and demand payment in turn for returning control of the data. Often, these attacks begin with a simple phishing email and a compromised file download.

Early adoption vulnerabilities

It stands to reason that companies that provide communications and technology solutions will be at the forefront of the adoption of cutting edge technologies. Whilst this can often make for a productive office environment, it can also make them an easier target than companies who do not adopt the very latest in digital tools.

Day-one vulnerabilities, unpatched software and even hardware vulnerabilities are not at all uncommon in new products and software, so being early adopters provides more opportunities for hackers to exploit vulnerabilities.

Distortion

Another emerging problem for the technology sector is the distortion of information, where social engineers alter documents or data for financial gain.

There are various techniques associated with distortion, such as editing documents so an accounts department pays an invoice into the hacker’s account rather than the genuine person who raised the invoice. Another way that distortion can be used is by altering information about the company which could damage brand reputation and lose consumer trust.

The key to reducing the efficacy of distortion attacks is training your team on the techniques employed by social engineers.

Phishing attacks

Phishing attacks are by far the most common root cause behind cybersecurity breaches, including ransomware, malware and spyware attacks.

They’re also increasingly sophisticated, utilising proven psychological principles to bypass scepticism. Indeed, a study of our simulated phishing emails found the two elements which combine to create a 94% phishing success rate.

At Bob’s Business, we have a range of solutions designed specifically to reduce your risk of a breach. Our human-focused training is engaging, effective and proven to reduce your risk of a successful attack and increase policy adhesion.

Book a free consultation with one of our cybersecurity training solution experts to boost employee awareness, keeping your business protected from the full range of cyber threats.

The growing cybersecurity risks in digital banking

Digital banking has seen meteoric growth since its introduction in 2007, growing year on year to reach its current peak – where 80% of bank account holders access their accounts at least partially online.

Indeed, it’s predicted that living with the COVID-19 pandemic will have further accelerated online banking adoption for many consumers.

The reasons for its widespread adoption are clear – digital banking has always offered convenience when it comes to checking balances, making transfers and managing accounts whilst on the go.

However, a large proportion of consumers have previously been reluctant to use digital banking, for reasons such as lacking the appropriate technology, skills, or simply preferring to stick with what they know and trust.

The pandemic not only increased the urgency to use digital banking on the consumer end, but also forced banks to look closely at their investment levels in those digital solutions in order to provide consumers with amazing experiences.

Where there are financial transactions, however, there are criminals looking to profit, and that’s certainly true when it comes to digital banking.

What are the cybersecurity risks in digital banking?

Although there are so many benefits to digital banking, for both the bank and the consumer, there is one major negative: the increased cybersecurity risks. The finance industry is a top target for cyberattacks due to the information they process, not to mention financial systems that can be illegitimately accessed to steal money.

As account holders are using mobile devices, websites, apps and public internet connections to access their online bank account, these entrypoints provide weaknesses for hackers to exploit.

Which? recently analysed 15 banks and building societies’ online banking and mobile app banking platforms, and found “worrying security flaws”. These included insufficient password policies and the lack of two-factor authentication for critical actions. Some of the banks also lacked adequate software that was able to block dangerous emails.

The financial sector has been investing heavily in cybersecurity, with developments for enhanced cybersecurity tools being introduced on a regular basis to protect systems from hackers.

As well as making changes to improve their online security processes and tools, another important aspect of protecting the digital banking sector from cyberattacks is to implement a stronger cybersecurity training programme.

Many companies in the financial sector roll out “off-the-shelf” compliance training courses. Unfortunately, these courses fail to deliver the key outcomes that are required to develop a culture of cyber awareness among employees

Traditional compliance training is typically dull and disengaging, with employees not developing the required behaviours that will help protect the bank from attacks such as phishing emails in the future.

Bob’s Business provides a unique approach to online training by providing engaging courses and interactive phishing simulations. Our training helps to change employee behaviour, rather than simply providing generic information and tick-box questions. Our courses can also be tailored to suit the specific organisation, in order to target any weaknesses that the organisation has.

Find out more about Bob’s Business cybersecurity awareness training and boost your digital banking cybersecurity today.

Cyber risks: what are the impacts on the insurance industry?

To fail to plan is to plan to fail, and so every organisation is in a constant state of planning for both the best and worst-case scenarios.

Increasingly, cyberattacks are a significant risk to businesses across all industries but particularly the finance sector, including insurance providers. The COVID-19 pandemic has accelerated digital transformation projects for many companies, who have relied more on digital solutions during this time than ever before.

However, the insurance sector has seen heightened threat levels. So why is this the case, and what is the impact on the industry? Join us as we break down the facts and figures.

Why finance and insurance are high risk for cyber attacks

Finance companies are at a higher risk of being targeted with cyberattacks owing to the large amount of personal data, including financial data, that they process. Insurance companies will gather substantial information from policyholders to calculate the risks and premium prices.

In addition to collecting name, address, date of birth and bank details, insurance companies hold data such as car registration and value, property, and possession details.

This data is collected so that the insurance underwriters can assess the level of risk and set the premiums at the right price, to try to ensure that the company makes a profit. Where there’s sensitive data, however, there are criminals looking to steal it.

With most insurance companies now offering online services, some companies are even operating completely online, the opportunities for hackers have significantly increased from when the majority of transactions happened in a branch or over the telephone.

The same connectivity that allows employees to access company systems from home, or from different locations around the world, has increased the potential for a data breach.

Ransomware attacks have become a growing concern for insurance companies. Last year, an incident in the US forced CNA Financial Corp. to pay $40 million to regain control of its network. Hackers locked the company out of its system for two weeks, causing massive disruption before finally deciding to pay the ransom money.

Another high profile cyber-attack took place in 2015 targeting Anthem Insurance Companies, which exposed the records of almost 80 million customers. Not only did the organisation have to pay $260 million for security improvements and remediations, they also had to pay out $115 million in lawsuits from customers.

What can insurance companies do to protect their business and policyholders?

When a cyberattack targets an insurance company, there are a number of negative consequences. Policyholders can become identity theft victims. In the case of ransomware disruption, the insurance services that policyholders have paid for are not available when they need them – as the company cannot access the necessary policy data to resolve claims.

When the systems are unavailable, the cost to the business is profound. They may end up paying a ransomware release amount in the millions, just to gain control of their systems again. Add this to the compensation that will have to be paid to customers, and you can see how the cost quickly mounts up.

In addition to these costs, data breaches are a significant threat to the reputation of your business. An astonishing 70% of people would stop doing business with a company that experienced a data breach.

As a result, it’s crucial that businesses in the insurance sector and beyond must invest in their cybersecurity strategy to keep their systems as well protected as possible.

The key to a successful cybersecurity strategy is the understanding that the risk of cyberattacks must be owned across the business. For cybersecurity experts cyberattacks are not considered to be an issue simply for IT, but the responsibility of every employee. Developing a culture of cyber awareness within our employees is by far the best protection for any organisation and should be developed through regular, engaging training.

At Bob’s Business, we build innovative, engaging cybersecurity awareness training solutions with industry high engagement rates. Make sure your employees are getting tailored cybersecurity training fit for your insurance organisation, book your free consultation with a Bob’s Business expert to find out more about our highly effective training solutions.

How Bob’s Culture changes cybersecurity behaviours

Changing behaviours isn’t easy – just ask anyone with a kid – but when it comes to cybersecurity, it’s often essential. Research suggests that 90% of breaches start with human error, and so no matter how sophisticated your hardware and software cybersecurity solutions are, they can’t account for a member of your team making a simple mistake.

That’s why our training solutions are designed to reduce those behaviours that put organisations at risk.

To measure exactly how behaviours and knowledge levels are changing within businesses, we utilise our bespoke Human Vulnerability Assessment. It shows you exactly how your organisation is progressing in reducing human error in a simple, easy to understand format.

Now, with a full year of data from organisations of all sizes, we’ve anonymised and collated our data to show the effects that just one year with Bob’s Culture has on businesses just like yours. Here’s what we have found:

Behaviour

  • 7.8% of users admitted to sharing passwords, down from 12.7% in the opening baseline – a 39% decrease
  • 62.3% of users claimed to follow their organisation’s cybersecurity procedures, up from 43.1% – a 45% increase
  • 14.4% of users admit to storing company data on personal devices, down from 20.0% – a 28% increase
  • 15.8% of users admitted to downloading material without verifying its authenticity, down from 25.5% – a 38% decrease
  • Users reporting having sent emails to the wrong recipient was reduced from 34.1% to 25.1% – a 26% decrease
  • Users admitting to clicking on links in emails from unknown sources were reduced from 13.8% to 10.9% – a 21% decrease
  • 58.2% of users admit to reusing passwords, down from 66.7% – a 13% decrease

Confidence

  • 6.6% of users felt unconfident in their ability to recognise phishing emails down from the initial 13.2% – a 50% decrease
  • 5.1% of users were not confident in their ability to browse the web safely, down from 10.3% – a 50% decrease
  • 6.9% of users lacked confidence in their ability to manage passwords, down from 11.0% – a 38% decrease
  • 5.9% of users were not confident in handling sensitive information online, down from 11.3% – a 48% decrease

Attitudes

  • 16.8% of users believed they did not have to worry about cyber security risks on work networks, down from 18.1% – a 7% decrease
  • 40.3% of users believed it’s the IT team’s responsibility to protect their organisation from cyberattacks down from 46.3% – a 13% decrease

Phishing

  • Baseline phishing email open rates were reduced from 14.8% to 10.4% – a 29% decrease

Results after one year with Bob’s Culture and based on a randomised selection of 4053 respondents across 39 organisations.

Ready to start your journey with Bob’s Business? Book a chat with a member of our team and learn how we can help reduce your risk in an engaging, effective and affordable way.

What are the top cybersecurity myths in the workplace?

Cybersecurity has become a top priority for businesses in all sectors,. As you can imagine, raising awareness about cybersecurity and the different types of threats is crucial to protecting your data and systems.

As part of the education process, separating the facts from the fiction can help employees to form a better understanding of not just their responsibilities, but the actions they should take when faced with a potential cyber threat.

As cyber education specialists, we work with companies every day to make the most of their training and we encounter no shortage of cybersecurity myths. Join us as we share some of the biggest myths about cybersecurity in the workplace we encounter:

“Only dodgy websites can give you viruses”

While visiting unsecured and “dodgy” websites will certainly increase the chances of being infected by a virus, legitimate sites can also be a risk.

Hackers can compromise genuine sites and infect them with malicious code that can infect the devices of website visitors. The key to risk reduction, in this case, is ensuring that employees know the telltale signs of a compromised website or emotionally manipulative web copy.

“Our business has already been attacked, it won’t happen again”

This is one of the biggest myths of all and, unfortunately, businesses who take this approach to their cybersecurity are likely to be targeted again and again until adequate cybersecurity solutions are implemented.

Therefore, once one attack has occurred, employees should receive immediate communications and training to not only help them recognise what the different types of attacks look like, but to also understand what to do if there is a repeat attack.

“Cybercriminals only target large businesses”

Another big (and costly!) myth is that small and medium-sized businesses aren’t a target for cybercriminals. After all, why go after a smaller company when the likes of Apple, Amazon and Facebook are out there with billions of pounds on the line?

The truth is that SMEs are often more at risk of an attack; this isn’t simply because they have lower budgets to spend on cybersecurity, there is often a lack of focus on the issue at board level too.

In comparison, larger businesses and organisations will usually have heavily invested in their cyber resilience, making the process of breaching their defenses significantly harder.

“Investing in cybersecurity technology keeps us completely protected”

Unfortunately, even if you have anti-virus and anti-malware software installed, your business is still highly vulnerable to cyberattacks. Analysis of the Government’s own data on cybersecurity breaches indicates that 90% of recorded breaches had their roots in human error, highlighting just how important the human element actually is.

“Cybersecurity is the responsibility of the IT department”

Another misconception we see among many staff members is that cybersecurity is solely the responsibility of the IT department. While the IT department are responsible for setting up the right IT infrastructure to protect your business from cyber threats, every single employee also has a responsibility to protect the business from cyberattacks.

Additionally, HR, Internal Communications alongside Learning and Development teams should be involved in creating a culture of employees who know how to protect the company from cyberattacks. Having a strong cybersecurity framework is a collaborative effort across the business.

How to protect your business from cyberattacks

In addition to investing in cybersecurity solutions such as anti-virus, anti-malware and firewalls, your organisation must have a comprehensive cybersecurity awareness training strategy that puts your teams at the heart of your cyber resilience.

Bob’s Culture is our flagship online training solution. It includes our unique Human Vulnerability Assessment to assign training where it’s needed, our award-winning phishing simulations, full access to an engaging and effective course library – even your own organisational LMS.

Curious to learn more? Book a consultation with a member of our team to find out how we can help your organisation reduce its risk, and put an end to the myths.