Cyber Security

What is Cyber Security?

Cyber security sometimes referred to as information technology security or IT security, is the general term for technologies, processes and controls that are designed to protect systems, networks, devices, programs and data from cyber attacks.

What is a cyber attack?

A Cyber Attack is an attack initiated from a computer against a website, computer system or individual computer that compromises the confidentiality, integrity or availability of the computer or information stored on it.

What are the consequences of a cyber attack?

Cyber attacks are on the increase, they are designed to cause damage both financially and to your reputation. The consequences of a cyber attack can include loss of assets, reputation and business, and you may face regulatory fines and litigation – as well as the costs of recovery. Under GDPR you have 72 hours to report a breach after it has happened or face a fine of up to a quarter of your turnover.

What are the average costs of a cyber attack?

The UK government’s Cyber Security Breaches Survey 2017 found that the average cost of a cyber security breach for a large business is £19,600 and for a small to medium-sized business is £1,570. This is in addition to the fines imposed under GDPR.

Cyber Security consists of the following:

  • Network security – This consists of policies and practices designed to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
  • Application security – These are the measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities.
  • Endpoint security – Sometimes called endpoint protection refers to the protection of computer networks that are remotely accessed by client devices such as laptops, tablets, mobile phones and other wireless devices. A good example of this is anti-virus software.
  • Data security – Sometimes called information security, refers to the protection of digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorised users, such as a cyberattack or a data breach.
  • Identity management – Also known as identity and access management (IAM) ensures that the right individuals have access to the right resources at the right times and for the right reasons.
  • Database and infrastructure security – Refers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks.
  • Cloud security – Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
  • Mobile security – Mobile security, or more specifically mobile device security, refers to the security of personal and business information now stored on mobile devices. Often modern anti-virus software will include Mobile Device Management (MDM) software to help with this.
  • Email security – Email security refers to the measures taken to improve the security of your email server or individual emails. This includes anti-spam software, email encryption and digital signing. It is increasingly common for a cyber attack to happen via attachments in email so dedicated email security services are becoming as essential as anti-virus software.
  • Disaster recovery/business continuity planning – Refers to the ability to recover from a disaster and/or unexpected event and resume operations. Organisations often have a plan in place (usually referred to as a “Disaster Recovery Plan” or “Business Continuity Plan”) that outlines how a recovery will be accomplished. It’s incredibly important to make sure that when a disaster or failure happens you can recover quickly, good backups and DR are essential for this.
  • End-user education – Refers to the training and education of employees and on proper digital safeguards. This aspect helps with all of the above, proper training and awareness stops most attacks from succeeding.

Invicta Linux use and recommend Webroot Antivirus

Traditional security relies on outdated signatures and can’t keep up with zero-day attacks. Webroot SecureAnywhere Antivirus is more than antivirus software. It is antimalware. It stops the viruses and worms that exist in order to infect other computers, but it also protects you during web surfing sessions by blocking harmful websites.

Nearly half of all consumers worldwide have been victims of cybercrime. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to compromise your personal data. Even established threats like ransomware are continuously evolving, and new threats like cryptojacking are being added to an already diverse threat landscape. Webroot offers complete protection from viruses and identity theft for all your devices, without slowing you down.

Webroot won’t interrupt you.

And it’s quick: Webroot takes 20 seconds to check your computer – 60 times faster than the average scan time of tested competitor products.

Invicta Linux use and recommend Keiro Control UTM

Conventional firewalls only defend against threats from outside. This doesn’t protect your network from internal threats. Malware and viruses are still able to attack your network unless you invest in proper security measures.

We have worked with many firewalls brands over the years, Sonicwall, Juniper, Cisco, Netgear and Draytek to name a few. These units all have their place, of course; but as far as security, ease of management, cost and capability Kerio Control is hard to beat. Control is a unified threat management solution, features comprehensive network protection and intelligence and protects your network from viruses, malware and malicious activity.

The user-friendly Unified Threat Management system includes firewall, intrusion detection, antivirus, VPN and content filtering.

Kerio Control is available with GFI Unlimited

Case study: High-end Hi-Fi design and manufacturing company safely rides through the pandemic with Kerio Control

Case study: Leading plastics solutions company relies on Kerio Control for cyberthreat protection and secure remote work

Invicta Linux use and recommend Vipre Email Security

Vipre’s Email Security with always-on email continuity. Spam accounts for 90% of all emails worldwide, threatening employee productivity, network security and your company’s bottom line. A single email virus can cost your organisation an enormous amount in damages, lost productivity and compromise your systems and data integrity. It is important to have a plan that ensures protection from email viruses, spam, phishing, email flooding, directory harvest attacks and denial of service attacks.

Vipre Email Security offers simple, secure administration that is entirely web-based, with no software to install. Users can define settings that allow/deny senders, domains, and IPs for any email to the domain; and our advanced policy options allow for sophisticated rule management, including support for regular expressions.

Email Security includes always-on email continuity. Email outages of even a short duration can create numerous issues for individual email users, as well as the business processes they rely on. Whether your downtime is planned or unplanned, Email Security means that your workforce always has access to email. They can use the web interface to send, receive and forward email while the server is down.

Invicta Linux use and recommend Barracuda Backup

Barracuda Backup appliance is available as a hardware solution or cloud backup solution ensuring the best backup solution for your business.

Backup does not have to be difficult and expensive. The award-winning Barracuda Backup was designed to simplify the backup and recovery of data in hybrid, multi-location environments.

Barracuda Backup lets you quickly recover files encrypted by ransomware. Simply eliminate the malware, delete the bad files, and restore them from a recent backup. Recovery can take as little as an hour—and the bad guys go home empty-handed.

Barracuda Backup’s hardened Linux OS is less vulnerable to threats than Windows-based backup solutions. Data is protected in transit and at rest in the remote location by 256-bit AES encryption.

Simple to configure and manage, Barracuda Backup is truly a “set it and forget it” solution for total peace of mind.

Contact us today to find out more about cybersecurity solutions

We’re always happy to help.

Contact Us