“A matter of time before you get hacked or exposed to ransomeware!”

For some time, cyber researchers have been warning of a greatly increased number of cyber attacks on companies in the form of data breaches and ransomeware. During the pandemic, cyber attacks increased by a frightening 600%! In the past month, state-sponsored cyber activity has also increased markedly in connection with Russia's invasion of Ukraine, which has further exacerbated the situation. Moreover, these state-sponsored attacks do not leave ransom demands which makes it even worse.

For some time, cyber scientists have been warning of a digital Pearl Harbor. During the pandemic, cyber attacks increased by a frightening 600%!

The pandemic has affected cybercrime

Due to Covid-19 in the last two years, opportunities to work both at home and in the office, so-called “Hybrid workers” have increased greatly to keep operations running. Of course, with both advantages and disadvantages. If you look at the disadvantages, safety often comes second to you. Cybercriminals are unfortunately well aware of this and cyber attacks have risen sharply in recent years.

The best protection against cyber attacks is a ready-made security strategy

It is more timely than ever to make sure to take the steps necessary to have your business information and data safe, and the ability to recreate it.

Risks include, among others; Cryptoviruses, Identity Theft, Leaked Passwords, Phishing) and therefore we who work in IT security want to tell you and remind us that cybersecurity is more important and current than ever! For your sake.

Larger companies usually have more control over security but are still exposed. Smaller companies often assume they are not attractive prey but ransomeware changes everything. - Anderas Jönsson

This is what cybercriminals know about. So even if you are a small business, or a sole proprietor, you are a very attractive prey. Perhaps because smaller entrepreneurs concentrate more on their business and intend to grab “in it” on occasion? Or don't know how serious the situation is.

Security researchers have estimated that a large part of Swedish companies have already been or are hacked at this time. But you can still grab it and be prepared.

Hackers work smarter and more organized
Hackers have become so smart now that they look at your finances and based on that information they prioritize whether you are a worthwhile target or if you end up on the to-do list later.

Organized hackers are a company in themselves. Ransomware i.e. ransom that companies get exposed to is usually just so that the company survives though completely without profit. Many times the company needs to shut down large parts, sometimes the whole when the attack occurs.

How do they get hold of my information?

Through public services or e-commerce that have been compromised, criminals can access your account information. On the site https://haveibeenpwned.com/ You can check if services where your email address has been compromised.

Through access to your systems (Computers, websites, financial systems)
By hacking your computers, website, financial systems, printers, etc., cybercriminals can modify, sabotage, delete or encrypt your information. They can change your passwords and email addresses. This is one of the most common intrusions (Ransomware) that occurs today and costs companies a lot of money to both deal with and in many they have to pay to regain access to data.

You will also be obliged under the GDPR to inform all of your customers about the breach and that their information has been compromised and the consequences of this. For example, you may be fined for not protecting yourself well enough (up to SEK 200 million, or 4% of global turnover, whichever is higher).

What are my obligations to secure my IT environment and my customers' data?

Inventory, risk analysis and action plan and implementation
Knowing what equipment and information you have and where it is located is critical to being able to protect it. If you don't know exactly what's where, you can't protect it.

After inventory, the next step is a risk analysis followed by action plan and implementation. It may sound big, but depending on the size of the business, number of employees, etc., it can be done relatively quickly and efficiently.

At Compliq, we make sure you get the help you need, of course in relation to your need and size, and your existing IT. If you need help building your IT environment, we can of course help you with that.

We at Compliq give you solid tips on security

1. Securing passwords
A password of 8 randomly selected characters (upper+lower+numbers+special characters) takes a computer about 30 minutes to crack.

We have several effective ways to create and manage passwords, as well as tips on how to remember 30+ passwords without major problems.

2. Multifactor, Multifactor, Multifactor
Much more important than passwords is using multifactor authentication in all places that go. Today, it is even possible to use multifactor for enterprise VPN connections on some firewalls.

3. Restricted access
Does everyone need to have the same access to all information? There are many factors that can be forgotten. Examples include even if staff are working temporarily, or quitting.
Are there procedures for managing access even within the IT environment?

RECENTLY ADDED