FREQUENTLY ASKED QUESTIONS

If you aren’t concerned about Cyber Security then you don’t know enough…

 

Here at Wriggle Security we know cyber security can be a tricky topic so we have compiled some frequently asked questions you may have also been dying to ask…

What is Cyber security?

Cyber security is the practice by which protectionist measures are implemented to secure networks, services and devices, and the data on them from theft or damage. Technology has helped our world economy develop immensely due to its efficiency improving and cost saving qualities. However, we must be vigilant as these technologies are highly vulnerable to attack, therefore making cyber security a critical issue for all businesses globally.

Why is Cyber security important?

Cyber security threats are rapidly evolving, therefore it is essential you keep your business protected and insured against the potential risks. For the third year running of the UK Government Cyber Security Breaches Survey 2018, the survey has highlighted the importance of cyber security, with over two in five businesses (43%) identifying breaches in the last 12 months. This makes it clear just how important it is for businesses operating in the digital arena to address this threat head on. Surprisingly, the vast majority of organisations fail to protect themselves or put any countermeasures in place to prevent their systems being compromised, thus leaving the business exposed and corresponding insurance policies (if your business has one) invalid. It is essential to seek expert advice and ensure your systems are not compromised.

How do I become cyber secure?

Becoming cyber secure is not a quick fix are therefore it often involved appointing someone with expertise and resources to assist you. In order for them to do so it is crucial to undertake a cybersecurity risk assessment such as a web security audit to expose the weaknesses in your digital space. Once they have assisted you to suitably protect your site(s) you must ensure you retain an up-to-date policy on cybersecurity by working alongside the cyber specialist you have been in contact with.

How much will it cost to protect the cyber security of my business?

Protecting the cyber security of your business is ultimately priceless. Neglecting to implement cyber security protections will leaving yourself and your clients exposed to attack, therefore these measures cannot be ignored. Whatever the cost, implementing cyber security protection could save you thousands of pounds in the long run by mitigating against the security risks to your business. It is without a doubt that the cost of our cyber security services is a small price to pay than the possible cost and reputational damage a cybersecurity breach could cause. However, here at Wriggle Security we remain realistic and pride ourselves on honouring a fair and transparent pricing system. We guarantee that our services will have a positive impact on your business from the outset and will not come attached with unexpected hidden costs. For a more detailed cost analysis contact us today to get a quote.

What is the difference between a website security audit and security penetration testing?

Website security audits and security penetration testing fulfil a similar purpose in that they both locate a vulnerability in your network. However, these two processes also differ in many ways…

  • A Penetration Test or Pen Test checks and scans an application, system or website to identify any potential security vulnerabilities that could be exploited. A Pen Test is therefore attempting to attack vulnerabilities in your system much like a real life attacker would in order to see the penetration possibilities of these vulnerabilities. A Pen Test is typically conducted before a new site goes live, and also on a periodical basis when programes or pages of the sites are updated.

However, this differs to a website security audit or vulnerability assessment. This too exposes the identifiable gaps in a application, system or website, however, unlike a penetration test merely identifies these gaps without examining how they could be leveraged. Vulnerability assessments typically stop once a vulnerability is identified, however, these assessments are vital as the exploitation of a vulnerability could result in giving unauthorised access, escalation of privileges or denial of service to the asset.

What is Phishing?

Phishing is a very specific type of cybercrime designed to trick you into disclosing valuable information, such as your bank details, credit card information or passwords. In order to obtain this information cybercriminals will use an electronic form of communication (typically email or text message) to pose as a legitimate source and attempt to lure the individual into giving away sensitive information or to install malware onto the recipient’s device. Cybercriminals may also create a fake site that may mimic you bank’s official website for instance, again tricking you into entering confidential data onto the site. The information obtained through phishing can enable access to information accounts and documentation that can result in identity left and financial loss.

Lets CONNECT – Contact use for your free consultation today