It seems as if the Covid lockdown has given hackers and scammers plenty of time to hone their skills, if they are to be judged by the number of successful security breaches we’ve been made aware of during the past couple of months.

So it seems like a good time to talk about how many businesses are adding an extra layer of security to their online systems and processes to protect themselves from the ever-increasing breadth and sophistication of the threat.

What are the consequences of being hacked?

When your security is breached, you could suffer a range of problems, from mild inconvenience to complete shutdown. The issues could be:

  • Finding that you no longer have access to files, folders or servers,
    making it difficult or impossible to continue operating your business;
  • Being held to ransom to retrieve your data for significant sums of money, with no guarantee that you’ll ever see the data again, or that you won’t suffer the same issue again;
  • Your clients, suppliers, associates and even family members could be contacted by the hackers with content that could adversely affect – or ruin – your reputation;

The list goes on.

So how can you tell if you’re being attacked?

Worryingly, the honest answer is that in many cases you can’t tell when you’re being attacked, until it’s too late.

And Covid has only exacerbated the problem.

Since lockdown began, more and more people are working from home, often on their own devices, most of which will not have the same standards of security that would apply to their office-based devices.

The good news is that there are some simple steps you can take
to protect yourself and your organisation…

Along with Microsoft and many other major industry players, the team here at Minerva is actively encouraging clients to consider using two factor authentication – also known as 2FA, dual authentication or two step verification.

So as well as your usual login, which would typically be a username or email address plus a password, the user is asked to provide another type of identification which could be:

  • Responding to an email, call or text message
  • Answering a previously logged security question
  • Responding to a security token
  • Providing a biometric scan such as an iris scan, facial scan or fingerprint.

What are the costs? And isn’t it just an extra inconvenience?

Yes, there’s a cost, but compared to the potential cost of replacing the data (and even your software), we think it’s well worth thinking about.

And yes, it does take a little longer. But not as long as replacing all your data. (You’re getting the picture here, aren’t you?!)

OK, so I can see that it makes sense. What’s the next step?

The easiest and quickest way to find out whether you’re vulnerable, and what might be the most cost-effective solution is to speak to your account manager on 01707 607100 or email and we’ll arrange a FREE audit.

Within a day or two, you’ll have a comprehensive report on the security level you already have, and the likeliest threats. And one way or another, you’ll be able to sleep a little easier, knowing that your organisation is better protected, and that you took all the right steps.

Further reading

You may also find the following blog articles from our website useful to share with your colleagues, with security tips: