Are you prepared, really prepared, for a cyber security attack?

"They came in the house, stole everything, then burned down the house. They destroyed servers, computers, wiped them clean of all the data and took all the data." Michael Lynton, chief executive, Sony Entertainment
Cyber attacks can cause utter devastation. But despite knowing there's a real danger, and even after increasing the budget spend, many firms are still ill-prepared to deal with them. Outmoded cybersecurity strategies - which a focus on prevention, rather detection - means they just can't win. Our approach is different, however.

New cybersecurity mindset

Inspiring and innovative companies are adopting a new mindset to cybersecurity which is risk-based and concentrates on protecting their most sensitive and valuable data. They've recognised: 1. Despite big budget investment, no perimeter is infallible (ask Talk Talk, Carphone Warehouse, Sony). 2. The attacks are relentless and quickly multiplying. 3. There's nothing to stop anyone from entering the hackers' firing line. There is no typical data breach victim 4. Everyone has valuable information and systems that they don't want to compromise or lose. 5. It's usually far more expensive to put things right than to stop it happening in the first place. Our recommended cybersecurity mindset accepts a perimeter breach is very likely to happen and compensates for it. In fact, it accepts it may already be done. On average, a company finds out they've had a data breach some 170 days after it's happened. Ignorance is not bliss in cybersecurity. Knowledge is power.

Clever technology, simple approach

Our approach takes the pressure off prevention and focuses on detection, protection, response and remediation instead (and tracking down who's responsible, and stopping it happening again).

Don't get us wrong. We're not saying people should give up on prevention all together. It's still an important part of any layered cybersecurity strategy, as recommended by the government cyber advisors GCHQ. But for our clients, it's no longer the most important part.

  • We use advanced cybersecurity technology to detect the threats that no-one yet knows exist and, consequently, get through the prevention layers
  • We use advanced detection threats to automate vast parts of activity current done by teams of people possible
  • We monitor for behaviours and patterns and reduce the number of suspect events that need to be reviewed by the expert human mind
  • We do more to protect the valuable things inside your perimeter to make them harder to corrupt or steal
  • We help people protect their valuable data even when it's outside their perimeter, with partners such as consultants, partners and suppliers - and we help them pull the plug remotely if things go wrong
  • We minimise the damage done by the criminals and thieves by catching the threats in minutes, not leaving them to run riot for months
  • We have a range of digital forensic tools which can track those responsible and do everything possible to stop it happening again

This is the Avatu mindset in operation. And it's the future for safer cybersecurity.

Get in touch to find out more.

How to achieve safer cyber security in 2016

2015 was a watershed for cyber security

  • In 2015, they came, they saw, they conquered. It's even been nicknamed 'The Year of the Hack'
  • In 2015, according to a security report by PwC, the number of information security incidents rose by 48 per cent to 42.8m, the equivalent of 117,339 attacks a day
  • The cyber criminal is becoming more determined and sophisticated. And with volumes like this, we cannot hope to stop every single one. In fact, we know - and Talk Talk, Sony, JP Morgan, Vodafone, Talk Talk and Bloomsburg can testify - we don't stop every one
  • In 2015, enterprises spent billions on firewalls and intrusion prevention systems. But despite this significant spending, many organisations - both public and private - still fell victim to successful cyber attacks causing significant financial and reputational damage
  • An annual cybersecurity study by HP Partners with Ponemon revealed that the average cost of cyber crime escalated by 96% to $12.7 million (£8.5m) per organisation
  • Smaller businesses are coming more and more into the firing line - the Federation of Small Businesses estimates its members lose around £785 million a year alone 
  • The UK charity British Pregnancy Advice Service was fined £200,000 for losing sensitive data through its website
 
2016 is the start of your cybersecurity fight back

To successfully fight back you should:

  • Accept everyone has something of value that a hacker could steal - even if it's only potentially embarrassing emails between executives or payroll information revealing inconsistencies between male and female salaries
  • Accept if a company continue to keep prevention as the cornerstone of their cyber strategy something will get through
  • Accept a breach may already have happened - you just may not know about it yet
  • Actively look for a breach, and then deal with it
  • Prepare for what happens when a breach happens again in the future (the odds say it will - the hackers aren't going away and the bombardment will continue)
  • Adopt technologies, which instead of focussing on prevention, reduce the time that a cyber threat has on your system, from many months to mere hours
  • Use extra layers of technology and IT security - such as sophisticated rights management systems - to make sure if they get in (using a cyber or insider route), it's difficult to steal your most valuable items
  • Have plans and use technologies to find out who is responsible for any breach

Call us on 01296 621121 or email us on cybersecurity@avatu.co.uk to find out how we can help.

 
Why call us?
  • We have more than 20 years of experience helping companies find the right answers to their challenges
  • The technologies we recommend are some of the best on the market and have been adopted by businesses and organisations all round the world
  • This includes those employed by some of the world's largest enterprises who use them to protect their systems and data from cyber and insider threats
  • The technologies can be purchased as stand alone products or as part of a wider IT or cybersecurity protection package. We can advise on how they fit with the other things you already use
  • You can find more about our cyber security partners and technologies here
  • Get in touch for advice or support
  • We can offer webinars, face-to-face demonstrations and no commitment quotes

Call us on 01296 621121 or email: cybersecurity@avatu.co.uk to talk through your challenges or to find out more


‹ Go Back

Who we work with

Your questions

Read all questions ›

Sign up to receive our updates

Protect your reputation with knowledge. Organisations can stay on the front foot with the latest news & developments. Sign up now to stay in touch & ahead of the game. You can find out more on Twitter & LinkedIn too.​

Please complete the letter in the box below (to help us filter out spam)

Captcha Image

Privacy and cookies | Conditions of use

© Avatu Ltd. The content on this website is owned by us and our licensors. Do not copy any content (including images) without our consent.