A wide range of organisations across the world relies on digital technologies to perform and function effectively. Strong Cybersecurity is in place to protect that ability to function whilst ensuring a business can exploit and utilise the opportunities that technological advances can bring. Cybersecurity, therefore, plays an integral part in Printlogik Ltd’s overall business health and resilience against cyber attacks.
Regulations such as the General Data Protection Regulations (GPPR) and high profile media coverage of cyber incidents and the impacts caused by them have raised the bar for expectations for our clients and business partners, and the wider public. To put it bluntly, Printlogik Ltd must ensure it has strong cybersecurity regulations in place.
So what is Cybersecurity?
Cybersecurity is the protection of services, networks, and devices. It’s there to protect the information stored on them from theft or damage by electronic means.
What should I know about Cybersecurity?
There are three common myths relating to Cybersecurity. Understanding these myths and why they are incorrect will help you understand any cybersecurity policy’s essential aspects.
- Myth 1: Cyber is complex, and I don't think I will ever understand it
You don’t need to have a technical understanding to make an informed decision in the interest of Cybersecurity. We all make security decisions every day without necessarily understanding how it works – for example, setting the alarm.
- Myth 2: Cyber attacks are sophisticated, and I can't stop them.
In reality, making just a few small changes and taking a systematic approach to Cybersecurity can be all it takes to reduce the risk of an attack significantly. The majority of attacks are based upon well-known techniques such as phishing emails. You can easily defend against these. Only a small portion of sophisticated attacks use methods to break into exceptionally well-secured networks, but we wouldn’t usually see that kind of attack take place. Most attackers will start with the simplest and cheapest option when launching a cyber-attack; this is so not to expose their more technologically advanced methods. Spotting and reporting these simple methods is the first step that you can take to defend your organisation.
- Myth 3: Cyber attacks are targeted - I'm not going to be at risk.
This isn’t true. The majority of cyber-attacks are unsophisticated and are opportunistic in their approach. Untargeted attacks could impact any organisation or individual at any time. Attackers hope to take advantage of a weakness or vulnerability within a system without regard for whom that system belongs. Any time you are connected to the internet, you are exposed to that risk. This type of attack is unlikely to change as once an attacker gains access; they are likely to hold you against ransomware attacks to which you are likely to pay the attacker to end the attack.
How does a Cyber-attack work?
In general, a cyber-attack has four stages:
- Survey: this stage includes analysing and investigating information about the target to target any potential vulnerabilities.
- Delivery: This is where the attacker gets to a point in a system where they have an initial foothold.
- Breach: They are now in the system and will exploit any vulnerabilities to gain unauthorised access
- Affect: The attacker’s goal was to carry out activities within your network to affect you as an individual or your business.
Defending against Cyberattacks
Printlogik Ltd’s security defences are layered in their construction. This makes it a lot more difficult for a Cyberattack to take place. For the purpose of security, we are not obliged to list our security measures. These will remain confidential in the interest of protecting Printlogik Ltd and its clients.
If you have any questions about how we process your personal information, please contact our GDPR officer at email@example.com. Please do be aware that you will be unable to access information about our security defences.
Version Control: v.1.0