The Cyber Security Threat – 5 Areas of Risk for Business

IT Basics for Start-Up Business – Part 1 – Hardware
March 9, 2018
Facebook Social Media Data
Facebook Data Breach – What Actually Happened?
March 26, 2018
Show all
Cyber Security Hacker

Fighting cybercrime is a bit like fighting a many headed hydra! Chop off one threat, and another springs up rapidly in its place. But there are ways to mitigate the risks of a cyber attack. This week, we look at three areas of risk for small businesses, and how simple expediency  can reduce the likelihood of crippling cybercrime.

Cybercrime has been heavily on the radar for businesses in the last year. Cybercriminals are constantly looking for new ways exploit a businesses vulnerabilities. The many attacks over the last year show that, whilst security specialists can do their best – releasing new patches and protocols etc. – there are continuing problems with many small business IT systems that allow attacks to take place.


At Wood ITC we regularly come across the same cybersecurity issues that businesses are failing to address.


1. Old Operating Systems

We’ve talked before about the WannaCry attack in May last year. The main reason the attack was so dangerous was that many NHS systems were running Windows XP.

Microsoft stopped supporting Windows XP in April 2014. Any business still using an outdated and unsupported operating system is highly vulnerable to an attack, as there will be no new updates or patches to protect them.

It’s very much easier for hackers to find vulnerabilities in older operating systems that lack any support and protection. When a new threat is discovered, the large software companies, such as Microsoft, Apple, IBM, CISCO etc. release specific updates (known as patches) to counter the threats.  Which is why it is so important to update your software regularly with the latest versions to keep the hackers out.


2. Outdated Security Practices

Many businesses put together a cyber security protocol, but fail to review it for the next few years. With cyber threats moving at pace, it’s very easy to fall behind quickly.

Unfortunately, one of the most common causes of data breaches and cyber attacks is still the humble password. Passwords have been in use for protecting systems since computers first began. And some people haven’t changed their password since that time. Weak and vulnerable passwords, which are never changed are an easy target for experienced hackers and give cybercriminals easy access to our devices, data and networks.

Despite this, many people stick to easily discovered passwords, such as their name, the name of their child, or in several cases we have seen, simply – PASSWORD!

This might have seemed like a clever ploy in 1997, but it didn’t fool hackers then and certainly doesn’t now.

It’s important to make sure all staff keep up to date on the company cyber security policies, which should include the regular changing of passwords.

3. Bring Your Own Device

One workplace trend that is gaining considerable popularity is Bring Your Own Device (BYOD). The average employee now uses several devices to complete their work, including, smartphones, laptops, desktop computers etc. BYOD policies have help companies to reduce their costs and also help employees to work more flexibly.

However, each personal device an employee uses introduces a security threat if it’s not managed correctly. And small businesses have no BYOD policy at all.

The danger arises because smartphones and tablets tend to be less secure than desktop computers that have pre-installed security software.

Cybercriminals routinely target these devices, including using specific malware that is tailored for mobile devices. The answer is to have a clear and comprehensive BYOD policy in place and make sure that staff adhere to it.

4. Working From Home

Employees today appreciate the ability to work from home or to collaborate on documents during their commute. In addition, staff on the road want to have access to company files and systems, such as CRM etc.

The result is that businesses need the technology to enable this kind of working, such as mobile devices, collaboration tools and cloud computing infrastructure.

Problems arise with these new ways of working when businesses have no control over which networks their employees are accessing. Public networks, such as a coffee shop or hotel WiFi can be vulnerable and are often targeted by cyber criminals. Hackers can attempt to access a worker’s phone or laptop through the network, meaning that company data and systems are compromised.

5. Inaction

Small business owners are usually very busy and their main priorities are, making sales and paying staff.  Taking the necessary action to protect against cyber attacks is usually lower on the list, and often never gets completed, either because the responsible party thinks it can wait until later or because it doesn’t appear to be a pressing business priority. Unfortunately, the stats suggest otherwise, which makes inaction and complacency the biggest area of risk for cybercrime.

The Priority of Cyber Security

It’s vital that small businesses treat cyber security as a top priority. By taking the time to deal with cyber risks appropriately, businesses will not only protect an important asset – their data – but they will also be able to deliver better peace of mind for their customers, who can rest assured that their data is safe as well.

For a complete IT Security Audit of your business systems, contact Wood ITC today.


  1. […] than ever before. As such, they are serious target for criminals and hackers, making them more susceptible to attack than ever before as […]

  2. HenryCem says:

    No need to worry about the future if your use this financial robot.
    Link – –

  3. HenryCem says:

    Trust your dollar to the Robot and see how it grows to $100.
    Link – –

  4. HenryCem says:

    Need money? The financial robot is your solution.
    Link – –

  5. HenryCem says:

    Make yourself rich in future using this financial robot.
    Link –

  6. HenryCem says:

    Financial robot is your success formula is found. Learn more about it.
    Link –

  7. HenryCem says:

    There is no need to look for a job anymore. Work online.
    Link –

  8. HenryCem says:

    Make money in the internet using this Bot. It really works!
    Link –

  9. HenryCem says:

    Just one click can turn you dollar into $1000.
    Link – –

  10. HenryCem says:

    Your money keep grow 24/7 if you use the financial Robot.
    Link –

  11. JonaBem says:

    Препараты качественные,купили на сайте
    Доставили из Москвы за 3 дня

    SOFHEET and DACHEET (СОФОСБУВИР 400 МГ И ДАКЛАТАСВИР 60 МГ) – Софхит и Дакхит (sofosbuvir и daclatasvir) стоимость

  12. HenryCem says:

    Money, money! Make more money with financial robot!
    Link – –

  13. HenryCem says:

    Invest $1 today to make $1000 tomorrow.
    Link –

  14. Incredible update of captcha regignizing software “XRumer 19.0 + XEvil”:

    Captchas breaking of Google (ReCaptcha-2 and ReCaptcha-3), Facebook, BitFinex, Bing, Hotmail, SolveMedia, Yandex,
    and more than 12000 another categories of captchas,
    with highest precision (80..100%) and highest speed (100 img per second).
    You can use XEvil 5.0 with any most popular SEO/SMM software: iMacros, XRumer, SERP Parser, GSA SER, RankerX, ZennoPoster, Scrapebox, Senuke, FaucetCollector and more than 100 of other programms.

    Interested? You can find a lot of introducing videos about XEvil in YouTube.


    See you later 😉

  15. SamuelCerry says:

    гидра сайт

    по запросу ссылка на гидру через tor вы найдете настоящий гидра сайт

  16. qbiydgchi says:

    ничего такого

  17. StephenSug says:

    Особенности входа на сайт Hydra 24

    У многих пользователей, особенно у новичков, может возникнуть вопрос о том, что необходимо использовать для покупок на Гидра. Однако перед этим может возникнуть проблема с тем, как зайти на сайт Hydra. Чтобы решить данную проблему, лучше всего воспользоваться Тор-браузером или интернет-шлюзом.

    Что нужно для регистрации на сайте Hydraruzxpnew4af.onion

    При регистрации никаких личных данных указывать не надо. Достаточно заполнить небольшую форму, придумайте логин и пароль, также понадобится работающий адрес электронной почты. Регистрация необходима для того, чтобы система идентифицировала клиента. К тому же вы получаете удобный личный кабинет с виртуальной корзиной.

  18. lesafw69 says:

    Hot new pictures each day

    outdated porn pics what is squirter porn porn star movie listing matues porn free fat bbw mobile porn

  19. HenryCem says:

    Turn $1 into $100 instantly. Use the financial Robot.
    Link –

  20. edgarws1 says:

    Nude Sex Pics, Sexy Naked Women, Hot Girls Porn

    porn vid download free no membership ero porn hub illegal porn in usa lesbian porn free my lesbian babes ipod touch porn videos

  21. HenryCem says:

    Buy everything you want earning money online.
    Link –

  22. HenryCem says:

    Check out the newest way to make a fantastic profit.
    Link –

  23. glendawq3 says:

    Daily updated super sexy photo galleries

    couples soft porn movie teww porn vids free chinese home porn free amature secret porn free tenticle porn

  24. Charlesadath says:

    сколько выход из запоя – 12 шагов от зависимости, снятие героиновой ломки

  25. Stevenruibe says:

    подготовка огэ 9 – курсы егэ, подготовка к огэ физика

  26. HenryCem says:

    Trust the financial Bot to become rich.
    Link – –

  27. HenryCem says:

    The success formula is found. Learn more about it.
    Link –

  28. HenryCem says:

    Online Bot will bring you wealth and satisfaction.
    Link –

  29. Всем привет. Так много не честных компаний развелось выдающих займы онлайн, что невозможно встречать бесплатный сервис подбора займов без регистрации и списывания денег после подбора. Недавно наткнулся на правильный сайте где дают круглосуточные займы.
    Беру займы на карту онлайн только здесь в микрокредитной компании Екапуста
    екапуста вход в личный кабинет

  30. HenryCem says:

    The best online investment tool is found. Learn more!
    Link –

  31. JonaBem says:

    Препараты качественные,купили на сайте
    Доставили из Москвы за 3 дня

    софосбувир +и даклатасвир индия +и египет

  32. JonaBem says:

    Препараты качественные,купили на сайте
    Доставили из Москвы за 3 дня

    после лечения софосбувиром +и даклатасвиром

Leave a Reply

Your email address will not be published. Required fields are marked *