You may have been warned about the dangers of ‘phone phreaking‘ and how to prevent it, but how much do you know about Cyber Security?
Let’s start with the basics…
What is Cyber Security?
Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage and unauthorized access.
Whenever the term cyber security or cyber secure comes up, there are always some very large and scary numbers (worldwide) close by:
There has been a 91 per cent increase in targeted attacks from 2013.
The number of security breaches increased by 62 per cent in 2013.
Over 552 million identities were exposed by breaches in 2013.
38 per cent of mobile users have experienced some form of mobile crime in the last year
Who is at risk from Cyber-Attacks?
In today’s interconnected world, cyber-attacks are a threat to all businesses, but law and accountancy firms are particularly attractive sources of information for criminals.
Commercial data, IP information and sensitive client data may all be targeted.
Law firms often benefit from a long, trusted relationship with their clients. They have privileged access to sensitive, high value information.
They may also be considered targets for cyber-attacks due to their client base and connection to public interest or high profile cases.
If any of this information were to fall into the wrong hands it could affect not only client relations but also cause irreparable damage to the firm’s reputation.
Law firms are increasingly targeted because they are seen as a weak link in the security chain and as an easy way to access a client’s information.
It’s important for law firms to start adapting their security to respond to these threats and companies are now recognising the risk posed by third party security breaches and are starting to take action.
It’s important to ensure that systems are appropriately protected to retain the trust of the clients and the competitive advantage.
What has this got to do with a cloud telephony and connectivity provider?
A successful cyber-attack on a telecommunications operator could disrupt services for thousands of phone customers, sever internet services for millions of customers, cripple businesses and shut down government operations.
Telecoms operators are adept at protecting their networks. It is also true that cyber adversaries employ the telecom infrastructure as their primary transport for most attacks.
Combined, mobility and cloud computing create new frontiers of risks for operators that will expose them to many of the same security risks that tech companies must dodge.
How to protect yourself from Cyber Attacks…
The North West Cyber Security Cluster (NWCSC) might just be the answer.
The North West Cyber Security Cluster is one of only a few initiatives of its type in the UK. The group is based on the model for the highly successful Worcestershire based Malvern Cyber Security Cluster, which was launched in 2011 and now consists of more than 50 SMEs.
The Cluster will enable businesses and organisations in the North West, and beyond, to benefit from a pool of exerts with skills that can put in place protective measures to reduce the risks posed by cyber security threats.
The NWCSC is an accreditation body for the Cyber Essentials Scheme – a scheme developed by the Government.
What the Cyber Security Scheme does is define a focused set of controls, which will provide cost effective, basic cyber security for organisations of all sizes.
Cyber essentials concentrate on five key controls:
Boundary firewalls and internet gateways.
Implementation of these controls can significantly reduce the risk of prevalent but unskilled cyber-attacks.
The North West Cyber Security Cluster is a good place for legal firms to understand whether they are exposed to any risk and help the with the mitigation plan.
Undertake Cyber Security under the North West Cluster and you will get a free of charge Network Audit and Telephony Audit, as member of the Cluster.
Technical Hardware Assessment
Physical and Environmental Security of Technical hardware
Private MPLS Data Networks.
WAN Router and IP security Configurations.
Home based and Remote Communication Security.
Mobile and Wireless Data and Voice Networks.
Take Cyber Security seriously, someone might have stole your client’s information while you’re reading this, therefore contact us straight away.
Avoid telephone fraud by downloading our guide: