Cyber Attacks Are Increasing… According to the UK Government’s Cyber Security Breaches Survey, around 43% of UK businesses reported experiencing a cyber security breach or attack in the past 12 months. Would you know what to do if it happened to you? Having a clear incident response plan for a cyber attack is essential.
Common Cyber Threats
Knowing what to look out for helps you act quickly. Common threats include:
- Phishing Emails
Fake emails trick staff into clicking harmful links or giving away information. These are behind 90% of attacks. - Ransomware
Criminals lock or steal your data and demand payment. Some also leak stolen data. - Business Email Compromise (BEC)
Hackers use fake or hacked emails to trick finance teams into sending money. - Supply Chain Attacks
Attackers get in through suppliers or contractors. - Insider Threats
These can be accidental (e.g. clicking a bad link) or intentional.
How to Prevent Cyber Attacks
You can’t stop every attack, but these steps make you a harder target:
- Limit admin access to only those who need it.
- Back up data regularly and keep one copy offline.
- Train staff to spot suspicious emails and behaviour.
- Keep software updated to fix security gaps.
- Use multi-factor authentication (MFA) for extra protection.
- Use strong passphrases made of random words.
5 Key Steps to Handle a Cyber Attack
Based on the NIST Cybersecurity Framework, here’s what to do:
1. Identify
- Know your key systems, data, and suppliers.
- Have a response plan and assign roles.
- Keep a log of actions taken.
- Contact your insurer for support.
2. Protect
- Use strong passphrases and MFA.
- Update software and patch systems.
- Keep tested backups, including one offline.
- Train staff to spot threats.
3. Detect
- Watch for signs like renamed files or locked accounts.
- Turn on logging in email, firewall, and VPN tools.
- Encourage staff to report anything unusual.
4. Respond
- Declare the incident and appoint a lead.
- Isolate affected devices (unplug from Wi-Fi, don’t power off).
- Contact IT support or an approved response provider.
- Report to NCSC, Action Fraud, and the ICO if personal data is involved.
- Communicate clearly with staff, customers, and suppliers.
5. Recover
- Rebuild from clean systems and restore verified backups.
- Reset passwords and enforce MFA.
- Monitor for reinfection.
- Review the incident and update your plan.
- Consider Cyber Essentials certification.
Need Help Protecting Your Business?
The best time to prepare is before an attack happens. Whether it’s ransomware, phishing, or a supply chain breach, planning ahead makes all the difference.
Ae Insurance Brokers can help you:
- Build a tailored incident response plan
- Run penetration testing to find hidden risks
- Perform regular vulnerability scans
- Find an insurance solution that is tailored to your needs