Cyber Security

The risks of a data breech are growing and becoming more costly to businesses

At a time when the use and manipulation of data is mushrooming, the threats from cyber breaches and fraud is similarly exploding leading to more stringent obligations from regulators on the use and protection of personal data.

Small businesses and charities are at real risk of an information security breach

  • 98% of UK businesses rely on some form of digital communication or services, and ..
  • 47% of small businesses identified at least one cyber security breach or attack in the last 12 months; and
  • Businesses that hold customers’ personal data are more likely to have experienced a breach than others

How well is your business prepared?

  • Only 26% of micro/small businesses have formal cyber security policies
  • Only 19% of micro/small businesses have cyber security training
  • Only 18% of small businesses have cyber security incident response plans
  • Only 37% of businesses have rules and controls around encryption – although this is recommended in the GDPR
  • Only 26% of small business had staff attend cyber security training in the last 12 months
  • 65 % of small businesses don’t know the source of the most disruptive breach or attack

The information above is from the Cyber Security Breaches Survey, April 2018 by Department for Digital, Culture, Media and Sport.

Where are the biggest threats?

The threats of data security breeches and fraud come three principal sources:

  • Phishing emails;
  • computer malware (viruses etc),
  • fraudsters and
  • your own staff.

So protection from these threats need to be addressed across policy, process, people and technology with the lead and direction coming from senior management.

Read on to learn how we can help bolster your security

  • An holistic approach to Security

    At PAAC IT we have a comprehensive approach to securing your business that we describe in a "Cyber Security Wheel".

    You may pick and choose the elements that are important to you and progress around the wheel at a time that suits you.

    Even fully protected organisations may still suffer a cyber security breech, and so increasingly organisations are developing incident recovery plans to minimise the impact of attacks. Our "Wheel" has this capability of one of its attributes.

    Cyber Security
  • Security Software

    We use, recommend, sell and support ESET’s range of security and encryption software

    We are advocates of ESET as we have seen for ourselves on our customers’ computers that:

    * It works – it detects computer malware that other anti-virus programmes have missed
    * It has a low impact on system performance and memory usage which means you can get on with your work with little impact from the security software
    * And we are impressed with the awards and accolades that ESET products receive.

    ESET offers an integrated security portfolio across the IT estate with continuous monitoring and automatic alerts for discovered issues.

    ESET security software is available for PCs and Macs, tablets and smartphones, servers and file servers.

    ESET Security Software
  • Encryption Software

    Encryption is now specifically called out in the GDPR as a security technology that organisations should implement.

    ESET Endpoint Ecryption software is a simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails.

    It can manage devices anywhere in the world without requiring VPNs nor any firewall exceptions. Management is handled by utilising HTTPS internet connectivity making it extremely simple for businesses of any size to install and setup.

    The implementation of encryption is completely transparent for your users and requires no action on their part. There is no extra overhead for IT departments and no need for user training.

    Deslock Encryption
  • Perimeter Protection - Firewalls

    Firewalls are network security devices that monitor incoming and outgoing traffic and decide whether to allow or block specific traffic based on a set of security rules.

    They establish a barrier between secured internal networks that can be trusted and untrusted outside networks, such as the Internet. Filters need to be configured that determine which packet are allowed to go where.

    Firewalls can be hardware, software, or both and are often built into other products.

    We use firewalls from Dreytek and TP Link included with their routers.

    ESET endpoint security software also includes a firewall capability enabling indiviual devices to be protected.

    Firewalls from PAAC IT
  • Password Management

    Did you know:

    * On average, UK citizens have 22 passwords each;
    * The number of websites for which users have the same password is 4;
    * Only 44% of users change their passwords each year;
    * 35% of users forget their passwords each week.

    So how do you keep all your business applications secure, ensure your users apply sensible passwords and change them regularly?

    Welcome to password managers.
    Software that helps you set and remember passwords and keep them secure. With a password manager you only have to remember one secure password and the password manager stores and remembers the rest.

    LastPass:
    *Works across devices – PCs, Macs, Smartphone and Tablets
    * Works across teams – allowing teams to share information
    * Stores passwords in a secure vault
    * Autofills every password
    * Generates random passwords
    Audits your passwords

    We use LastPass at PAAC IT to secure access to our systems.

"PAAC IT provide a managed service for our PCs on a fixed monthly charge. Really great, they are there when we need them"
Julia Macquisten - OwnerLucas Field Media
"PAAC-IT provide and maintain our Apple Macs and Macbook Pros. Richard and his team at PAAC IT are very prompt and responsive when we need help, and a pleasure to work with"
David Alden - DirectorAlden Holmes
"Our business is highly dependent on computer technology – all the way from design and creative software platforms to administration processes. PAAC-IT set up and configured our mix of PC and Apple computers, file servers and security software and now keep it running. The team at PAAC-IT is very competent and keep our IT running smoothly"
Edward Green - DirectorMilly Green
"I was having trouble making Skype calls to my son. Both Darren and Connor were extremely helpful and patient. They were so kind to get the computer in and out of the car for me - i couldn't have done this on my own as i am disabled"
Jane Nightingale
"On moving house we required help of PAAC to coordinate a tablet, PC and laptop with new security and email addresses and to ensure transfer of old contact details etc. Some of this work was undertaken by Darren in the Midhurst shop and some at our new address. Darren was professional and helpful with successful results. PAAC also followed up with care to ensure that all was well. "
A satisfied customer
"I have been dealing with PAAC IT, mostly in their Midhurst Office, but also in Haslemere, for the past three or four years. They clearly understand Macs and have given me good advice, and sorted out various issues for me. Things did go wrong with the network wireless adapters I had bought from them, but they were quick to ensure they were checked and replaced without a problem, and they followed up with me a month later to ensure all was OK. That’s good customer service!"
James Tree
"Dynamite, goes the extra yard every time, reliable and essential support to my business."
Lawrence MullenThe Talking Trade
"Good, dependable, brilliant, local"
Anneke Clegg
"I have been using the services of PAAC IT for over two years. During this time I have found the staff to be courteous, understanding, and very efficient. I have received first class service on each and every occasion – from keeping my ancient computer running, to advising and supplying a suitable replacement when it eventually crashed. All my transactions have been with the team in the Haslemere shop where Richard, Mark, Darren and Oliver have addressed my computer difficulties with great patience and kindness. To them I am eternally grateful."
Derek Smyth