Cyber Security Awareness
ASL understand how important it is to be cyber savvy.
Cyber criminals are becoming increasingly sophisticated. Our solutions encourage user awareness through education and the use of best-in-class technology which is capable of protecting your business.
Key threats
Businesses are targeted every day by cyber criminals looking for financial gain, which can lead to data disclosure, sabotage, and loss of key systems and data. Our aim is to educate and mitigate through technology and secure policies.
Threats can include:
Phishing
Social
Engineering
Malware
Viruses
Theft
Accidental
Disclosure
Insecure
Networks
What is phishing?
NOT JUST SPAM. There has been a considerable increase in phishing attacks in recent years each increasingly more sophisticated and target-driven. Their aim is to deceive, by masquerading as someone trusted, be they a common website, a senior manager or a key partner, they make an urgent request – intending the user to click, download, or share information. These phishing scams can be delivered by email and SMS.
Two of the most used methods are forged (or spoofed) email addresses or domain names that on first glance look genuine.
Examples of phishing attacks: It is key to educate users to NOT click on links or open attachments within emails from unknown senders and to look out for emails that could contain:
We need you to make an urgent payment
Your password had been compromised
Our payment details have changed
Click to see your doc!
Your mailbox is full!
What is ransomware?
Ransomware is one of the most significant threats facing UK businesses.
- A type of malware which encrypts data so users cannot access their devices or data
- A criminal group requesting payment in exchange for decrypting data
- Attackers may threaten to leak stolen data
How is ransomware deployed?
- Attackers gain access to a victims’ network through underlying vulnerabilities such as end-of-life technology, or downloads via a phishing attack
- The malware spreads to other network devices, damaging systems and causing downtime.
What is the best protection?
Prevention is the best form of protection, you should:
- Maintain an offsite backup of all key systems and data, including on-premise servers and data held in public cloud services
- Deploy AV to all devices – ESET
- Deploy MFA to all devices – Duo
- Educate staff to recognise the signs of a phishing or ransomware attack through a product such as KnowBe4
- Have a Cyber Health Check and Vulnerability Scan – understand where you are now and plan to remediate identified risks.
ASL products and services
We can help you stay ahead of the criminals, by using secure IT systems that are characterised by:
- Cyber Health Checks, IT Roadmaps, and Vulnerability Scanning Services
- Security Awareness Training and Phishing Simulation
- Best of breed Anti-Virus and Anti-Spam
- Multi-Factor Authentication (MFA) - for PCs / Laptops, servers and Microsoft 365
- Next gen fire wall appliance
- Remote Backup for servers, files and Microsoft 365 data
- Mobile Device Management (MDM)
- Cyber Essentials Certification - ASL can help you certify and build secure policies and processes
How can you protect your business now?
Our team can help you understand your business’ vulnerabilities and provide practical solutions to help protect your business. You can make a start now by:
- Encouraging a security-conscious culture and using strong, complex passwords
- Prioritising staff training to better understand cyber threats
- Securing systems with MFA and AV
- Having an excellent backup position
How much does this service cost?
Each business is different, we will tailor a plan to suit your business’ unique requirements. Ask a member of our IT support team for a costed solution.
Cyber Security Insights
Cyber-attack – why having no backup and continuity plan could be terminal for your business
Your small business is now the preferred target of the cyber-criminal UK businesses still have a lot to do regarding effective backup and continuity planning in the event of a...
Read MoreReducing cyber-risk through External Penetration Testing
Without PEN Testing, hackers can exploit unidentified weaknesses in your network security Today, maintaining network security is increasingly complex, with more organisations than ever being heavily reliant on a varied...
Read MoreThe importance of a comprehensive email security solution
Why you shouldn’t rely on generic cloud-based email security to protect your organisation An increasing number of internet-based threats are being deployed via email, which is why it is imperative...
Read MoreWhy should your Business have a proxy URL filtering service?
Using filtering technology to enhance security Employing a Web proxy URL filtering service can deliver many positive benefits for both organisations and end-users that go far beyond the basic implementation...
Read More