<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Clarity</title>
	<atom:link href="https://findclarity.uk/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://findclarity.uk/tag/cybersecurity/</link>
	<description>Customer Insights for Hackney SMEs</description>
	<lastBuildDate>Tue, 14 Apr 2026 23:13:29 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://findclarity.uk/wp-content/uploads/2025/07/cropped-LinkedIn-Logo-2-1-32x32.webp</url>
	<title>Cybersecurity Archives - Clarity</title>
	<link>https://findclarity.uk/tag/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Threats: Spring Cleaning For SMEs</title>
		<link>https://findclarity.uk/cyber-security/</link>
					<comments>https://findclarity.uk/cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 23:09:52 +0000</pubDate>
				<category><![CDATA[Business Growth Hub]]></category>
		<category><![CDATA[customer insight partnership]]></category>
		<category><![CDATA[customer insights]]></category>
		<category><![CDATA[Cyber threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[find clarity]]></category>
		<category><![CDATA[hackney]]></category>
		<category><![CDATA[hackney business growth]]></category>
		<category><![CDATA[small business]]></category>
		<category><![CDATA[SME]]></category>
		<guid isPermaLink="false">https://findclarity.uk/?p=67532</guid>

					<description><![CDATA[<p>Cyber threats are everywhere. Criminals are looking for whoever has the weakest security. Being small is not a protection. It's time for a spring clean ...</p>
<p>The post <a href="https://findclarity.uk/cyber-security/">Cyber Threats: Spring Cleaning For SMEs</a> appeared first on <a href="https://findclarity.uk">Clarity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Is cybercrime a problem for only the biggest businesses? Are SMEs really in the cross-hairs for cyber criminals? </p>



<p>Criminals and bad actors are actively probing the smallest end of the business market and looking for whoever has the weakest security. Being small is not a protection. </p>



<p>The UK government’s <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025/cyber-security-breaches-survey-2025" type="link" id="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025/cyber-security-breaches-survey-2025">Cyber Security Breaches Survey 2025</a> found that 35% of micro businesses and 42% of small businesses identified phishing attacks in the last year. Let’s look at some other stats that came out of the survey, check in on the most common issues SMEs face and then I’ll outline my simple 4-week Spring Cleaning plan. </p>



<h2 class="wp-block-heading">July 19th, 2024</h2>



<p>Do you remember seeing pictures of airports with huge banks of monitors, all of them displaying the ‘blue screen of death’ (see intro image)? </p>



<p>This wasn’t a cyberattack. It was a relatively insignificant &#8216;rapid response&#8217; update. It&#8217;s the kind of update you&#8217;re encouraged to install as soon as it&#8217;s available. And it was from a trusted and respectable vendor, CrowdStrike. </p>



<p>After installing, a minor logic error meant that every time the computer tried to wake up, the error was seen as a threat, and the computer refused to load. Because the code was installed into the kernel, or operating heart, of the system, even the tools you would use to fix a problem refused to open. </p>



<p>Estimates say that across the world, on that one day, <a href="https://www.reuters.com/technology/fortune-500-firms-see-54-bln-crowdstrike-losses-says-insurer-parametrix-2024-07-24/">$5 – 10 billion</a> was lost. Did CrowdStrike have to pay any of that back? One report says, due to the service agreement, they were liable for as low as <a href="https://thecoylegroup.com/the-crowdstrike-debacle-and-cyber-insurance/#:~:text=Contingent%20coverage%20is%20essential%3A%20Standard,1%20reason%20for%20claim%20denials">$500 million</a>. So virtually none of the lost money. For most small businesses, because Crowdstrike issued a fix within 24 hours, the agreement said that any losses had to be borne by the vendor. </p>



<h2 class="wp-block-heading">Shooting Themselves in the Foot</h2>



<p>What makes this so awful was that It was self-inflicted. CrowdStrike made the initial mistake in the rollout and company after company obediently accepted the update. </p>



<p>Often for a small business, decisions are a trade off between convenience and security. The fastest way to get things done is not always the safest. Multiple internet-connected devices, off-the-shelf products with default configurations, and a network that you might not own or don&#8217;t understand. </p>



<p>Shared passwords, missing multi-factor authentication (MFA), poor backups, old systems, or nobody clearly responsible for updates and recovery. The IT strategy could become, &#8216;We&#8217;ll sort it out later&#8217;. </p>



<h2 class="wp-block-heading">&#8216;Later&#8217; Or &#8216;Too Late&#8217;?</h2>



<p>Attacks can be direct:</p>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color wp-elements-7c6fbb1fd6520b3947adce5c49bb46cd">A single weak password practically destroyed  <a href="https://www.bbc.co.uk/news/articles/cx2gx28815wo">KNP</a>, a transport company in Northamptonshire. They lost all their data when they couldn&#8217;t afford to pay the ransom demand. 700 people lost their jobs. </p>



<p>Or hit you from your supply chain: </p>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color wp-elements-f2646d2fdf3a2e880c551f31265757c2">In Easter of 2025, M&amp;S’s online store closed for 7 weeks due to an attack. It cost them an estimated £300m in lost profits. The Co-op had a similar attack around the same time. But, the attack also affected M&amp;S&#8217;s suppliers. The <a href="https://www.emcrc.co.uk/post/bbc-s-panorama-takes-a-look-at-the-threat-of-ransomware-on-businesses" type="link" id="https://www.emcrc.co.uk/post/bbc-s-panorama-takes-a-look-at-the-threat-of-ransomware-on-businesses">Black Farmer</a> in Brixton supplied both of the supermarket giants. The result? The attack wasn&#8217;t aimed at them but they lost thousands of pounds of revenue.</p>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<h2 class="wp-block-heading">Insider Risk</h2>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color wp-elements-9bb81cf2538a9c133dfaeb2243ffa550">STAT 1: </p>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color wp-elements-2e6b0fc3fcfb2555430993bcb7d0529d">Overall, 19% of businesses reported having staff training and awareness raising activities for cyber security.</p>



<p>In many SMEs, the real danger is normal people doing normal things. Just going about your daily work contains a number of touchpoints with the outside world that could hide a threat:</p>



<ul class="wp-block-list">
<li>Sending information</li>



<li>Clicking on links</li>



<li>Downloading something useful</li>



<li>Plugging in a device</li>



<li>Trusting an external request </li>
</ul>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<h2 class="wp-block-heading">We&#8217;re All Vulnerable</h2>



<p>We started this blog with the CrowdStrike issue. You may not be using CrowdStrike but you are likely using Microsoft Defender, Bitdefender or relying on your Mac to keep you secure.</p>



<p>Anthropic (an AI industry giant) recently announced <a href="https://www.anthropic.com/glasswing">Project Glasswing</a>. They have developed a new AI model called Mythos which is extremely good at finding security vulnerabilities in existing, widely-used software. Project Glasswing is Anthropic’s offer to provide this model to major, widely used software providers in advance to help them fix their issues. How many of the major players had issues in their software code?</p>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-c61522f05389890491d64738a59a2094">Mythos Preview has already found thousands of high-severity vulnerabilities, including some in <em>every major operating system and web browser</em>.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69e14ed364963&quot;}" data-wp-interactive="core/image" data-wp-key="69e14ed364963" class="wp-block-image size-large wp-lightbox-container"><img data-dominant-color="7f836d" data-has-transparency="false" style="--dominant-color: #7f836d;" fetchpriority="high" decoding="async" width="1280" height="698" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_95atil95atil95at-1280x698.png" alt="A pop art style image of common cybersecurity threats. A number of devices are being shown with urgent messaging, fishing hooks and comic strip action words such as 'ZAP!' and 'CLICK!' " class="wp-image-67534 not-transparent" srcset="https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_95atil95atil95at-1280x698.png 1280w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_95atil95atil95at-640x349.png 640w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_95atil95atil95at-768x419.png 768w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_95atil95atil95at.png 1408w" sizes="(max-width: 1280px) 100vw, 1280px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption">Image generated with AI</figcaption></figure>



<h2 class="wp-block-heading has-large-font-size">Phishing Scams:</h2>



<p>These are still the most common and effective method that bad actors use to compromise your business. They want access to your passwords, your customer data and your cash. They sell on your valuable personal data. This risks your customers and your company reputation. </p>



<p><a href="https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat">AI</a> is making scams are even more sophisticated as research about you and your business is faster and easier. Emails sound like people you do business with wrote them. Calls sound like voices you know. Urgent requests for information might include the names and contacts of your clients. Criminals who infiltrate your network can encrypt your data remotely and demand a ransom to return it to you.</p>



<h2 class="wp-block-heading has-large-font-size">USB Drives, USB Devices and Charging Cables:</h2>



<p>Any USB device could auto play and begin to copy your data, memorise your key strokes, take screenshots of your activity and silently transmit them to the Internet. They can implant software into your computer that continues to run after you have taken the device out. Once connected successfully to one computer, they can infiltrate other devices on your network.</p>



<h2 class="wp-block-heading has-large-font-size">Downloads and Malware:</h2>



<p>Free, useful software may be open-source (available without charge and come from a reputable source. Some websites are marketplaces for tested and virus free software. This software may have limited functionality until you buy a more advanced version.</p>



<p>But, if something is free, re-consider why. &#8216;Free&#8217; may mean the software includes something more dangerous.</p>



<h2 class="wp-block-heading">Zero to Cyber Hero: Simple Steps</h2>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color wp-elements-c8ab695129730f841b127c548fa3224a">STAT 2: </p>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color wp-elements-a69bb26e4e045950796a6d6c9f3fe921">Only 4 out of 10 businesses have adopted more advanced controls like multi-factor authentication (MFA).</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69e14ed364fe7&quot;}" data-wp-interactive="core/image" data-wp-key="69e14ed364fe7" class="wp-block-image size-large wp-lightbox-container"><img data-dominant-color="7d826b" data-has-transparency="false" style="--dominant-color: #7d826b;" decoding="async" width="1280" height="698" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_h69ltch69ltch69l-1280x698.png" alt="A similar pop art style image to the previous image. A number of devices are shown with various tools being used to prevent the scams." class="wp-image-67535 not-transparent" srcset="https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_h69ltch69ltch69l-1280x698.png 1280w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_h69ltch69ltch69l-640x349.png 640w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_h69ltch69ltch69l-768x419.png 768w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_h69ltch69ltch69l.png 1408w" sizes="(max-width: 1280px) 100vw, 1280px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption">Image generated with AI</figcaption></figure>



<h2 class="wp-block-heading has-large-font-size">Passwords:</h2>



<p>Don’t use the same password, or slight variations, across multiple accounts. Ban password reuse for business accounts.</p>



<p>Why? Now that everything is digital and your username is likely to be your email address, as soon as criminals gain your password, they can almost immediately try all your other accounts. Any similarity makes their job much easier and quicker.</p>



<h2 class="wp-block-heading has-large-font-size">Password Managers: </h2>



<p>Long, complex passwords can be stored in an encrypted folder that is locked by one memorable Master Password.</p>



<p>Why? Only the Master Password is at risk. Make it easy enough to remember so that you don’t have to write it down anywhere. All your other passwords are now much safer because you don’t need to remember them. When prompted for a new password, your browser or device will give you a pop up asking you if you want it to create a password on your behalf.</p>



<h2 class="wp-block-heading has-large-font-size">Passphrases:</h2>



<p>Make your Master Password a passphrase. Length is more important than complexity. It’s longer but still relatively easy to remember. Personally, I like to think of a cartoon or television show catchphrase e.g. It’sAnAce!HigherOrLower? That’s 24 characters long but it’s something you can remember (at least if you’re familiar with Get Your Cards Right).</p>



<h2 class="wp-block-heading has-large-font-size">Multi-Factor Authentication:</h2>



<p>Your account prompts you for a number. An app on your phone has to be opened to provide you with a unique personal number which updates every 30 seconds. Download an authenticator app.</p>



<h2 class="wp-block-heading has-large-font-size">Hardware Security Keys:</h2>



<p>For your most important accounts, this looks like a thumb drive. You either plug it into a USB port or, for a smart phone, place it against the NFC sensor on the back of the phone. This means your account can only be unlocked when you are physically present.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69e14ed365501&quot;}" data-wp-interactive="core/image" data-wp-key="69e14ed365501" class="wp-block-image aligncenter size-thumbnail wp-lightbox-container"><img data-dominant-color="999794" data-has-transparency="false" style="--dominant-color: #999794;" decoding="async" width="300" height="300" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://findclarity.uk/wp-content/uploads/2026/04/Yubikey-yubico.com_-300x300.jpg" alt="A serires of Harware Security Key products from Yubisoft. They look like thumb drives of various sizes with Yubisoft branding. " class="wp-image-67552 not-transparent" srcset="https://findclarity.uk/wp-content/uploads/2026/04/Yubikey-yubico.com_-300x300.jpg 300w, https://findclarity.uk/wp-content/uploads/2026/04/Yubikey-yubico.com_-100x100.jpg 100w, https://findclarity.uk/wp-content/uploads/2026/04/Yubikey-yubico.com_-200x200.jpg 200w" sizes="(max-width: 300px) 100vw, 300px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption">Image taken from Yubisoft.com</figcaption></figure>



<p>Why? These are the current gold standard. They are almost impossible to replicate or intercept. Buy two keys and set them with the same PIN in case one gets lost. No passwords are stored. Instead, a Private and a Public key are set up for each account you wish to use it for. Once set up, when you sign in, you’ll be prompted to press a button on the key, or place it against your phone, and the key will use its Private key to complete a challenge and send back the answer (‘sign the challenge’). The website will then use the previously shared Public key to verify it’s you.</p>



<h2 class="wp-block-heading"><strong>Zero to Cyber Hero: Your Set Up</strong></h2>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color wp-elements-7492ea7bfb08672dc8969124bdc7d000">STAT 3: </p>



<p class="has-background-color has-tertiary-background-color has-text-color has-background has-link-color wp-elements-d788f76ed0d1a34793960d3a4270365d">Less than a third of businesses (31%) had set up a virtual private network for remote staff. Almost the same number (30%) had active user monitoring</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69e14ed36592a&quot;}" data-wp-interactive="core/image" data-wp-key="69e14ed36592a" class="wp-block-image size-large wp-lightbox-container"><img data-dominant-color="85958f" data-has-transparency="false" style="--dominant-color: #85958f;" decoding="async" width="1280" height="698" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_dofn1idofn1idofn-1280x698.png" alt="A small business owner sitting at a desk with a workshop behind her. She is calm and has pop art messages of completed cybersecurity tasks. " class="wp-image-67566 not-transparent" srcset="https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_dofn1idofn1idofn-1280x698.png 1280w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_dofn1idofn1idofn-640x349.png 640w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_dofn1idofn1idofn-768x419.png 768w, https://findclarity.uk/wp-content/uploads/2026/04/Gemini_Generated_Image_dofn1idofn1idofn.png 1380w" sizes="(max-width: 1280px) 100vw, 1280px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption">Image generated with AI</figcaption></figure>



<h2 class="wp-block-heading has-large-font-size">Restart, Don’t Just Close the Lid:</h2>



<p>If you’re using a Windows computer, the system memory only fully clears if you Restart your computer. Shutting it down saves the current state and then re-awakens it back to where it was. Shutting the lid is like interrupting your computer mid-flow. All your software will still be running.</p>



<p>This is counter-intuitive but your computer will be healthier if you Restart it more regularly. The drivers get a fresh start so there’s less chance they are corrupted. And when you Restart, your software gets a reset and any updates that have been waiting to kick into gear are all applied.</p>



<h2 class="wp-block-heading has-large-font-size">Updates:</h2>



<p>Don’t updates just add more code to my computer’s memory and slow it down? After a big update, your system is crunching away in the background making all the changes and your device may well be slower for a few hours. However, updates are intended to remove code which is leaking RAM memory (using up memory space but not releasing it when it’s finished). Replacement code is more efficient and should get you running faster. But, the real reason to keep updating is safety. Patches fix potential weaknesses. This includes your router which can take a bit of effort to update if you’re not controlling it via an app. Connect using an Ethernet cable for security, log in to your router through your browser, and find Firmware Updates or Router Upgrades.</p>



<h2 class="wp-block-heading has-large-font-size">USB And Other Plug-in Devices:</h2>



<p>Only use USB, thumb drives and cables that you bought yourself and you know no one else has used. Switch off Autoplay settings so that any foreign device that identifies itself as a USB drive. This prevents your computer automatically recognising and activating it. </p>



<h2 class="wp-block-heading has-large-font-size">Firewalls: </h2>



<p>Change any default passwords. Your firewall may be set up to open a hole (or port) to allow an area or system inside your network to be accessible from the wider internet. Run an external port scan using reputable scanning software to test if there are open ports that you did not authorise.</p>



<p>Check your router’s firewall too. If the network isn’t yours, you may need to configure an additional firewall on whatever software that network is using. Turn off Universal Plug and Play (UpnP), disable remote admin (unless you absolutely need it) and any Wi-Fi Protected Set Up.</p>



<h2 class="wp-block-heading has-large-font-size">Staged Rollouts:</h2>



<p>Larger companies with a range of devices and connections to their network should consider this. Give a small percentage of your workforce permission to download a new update. Allow enough time to test for any immediate issues. After, broaden the rollout to a larger number of staff and finally the whole company. If something like the CrowdStrike issue happened again, this process would limit the damage it could cause.</p>



<h2 class="wp-block-heading has-large-font-size">Back Ups: </h2>



<p>Keep one backup separate from your day-to-day network. If you leave the place you save your back up is a separate drive, disconnect it between back ups. Otherwise, bad actors that infiltrate your network can encrypt it remotely just like all your other data.</p>



<h2 class="wp-block-heading has-large-font-size">Verifying Payments:</h2>



<p>Finally, implement a callback rule whenever someone contacts your company regarding a payment or bank information changes. Ensure your staff know that they must disconnect the call, find a phone number they already trust and call the individual back before making payment.</p>



<h2 class="wp-block-heading">Government Assistance: Cyber Essentials</h2>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69e14ed365eb3&quot;}" data-wp-interactive="core/image" data-wp-key="69e14ed365eb3" class="wp-block-image aligncenter size-full wp-lightbox-container"><img data-dominant-color="d2e1e5" data-has-transparency="false" style="--dominant-color: #d2e1e5;" decoding="async" width="504" height="250" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://findclarity.uk/wp-content/uploads/2026/04/Cyber-Essentials-icon.jpg" alt="The Cyber Essentials logo with the most recent badges of certification that can be awarded to businesses. " class="wp-image-67553 not-transparent"/><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button></figure>



<p>The <strong><a href="https://www.ncsc.gov.uk/cyberessentials/overview">Cyber Essentials</a></strong> scheme is a UK government-backed programme that provides companies of all sizes with a <strong>checklist</strong> of practical steps to take to protect themselves against online threats. Good news is that, just last year, organizations with Cyber Essentials in place made <strong>92% fewer insurance claims</strong>. The programme includes access to <strong>free cyber insurance</strong>, including a 24/7 emergency helpline. To sign up, u<strong>se the </strong>free online self-assessment as well as a <strong>free 30-minute consultation</strong> to help you complete certification. From there, you can move on to <strong>IASME Cyber Assurance</strong>. Separately, you can sign up for free <a href="https://www.ncsc.gov.uk/section/active-cyber-defence/early-warning">NCSC Early Warning</a> notifications.</p>



<p>Now, time for that Spring Clean I promised:</p>



<h2 class="wp-block-heading">One Month Spring Clean Plan</h2>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-9eac354c11922a7b748f5661b32f45b7">Week 1: Switch on MFA</p>



<p class="has-foreground-color has-background-background-color has-text-color has-background has-link-color wp-elements-e92b06b07b3ad30f474ce8c7271af9cc">Across your set up, add an MFA account using an Authenticator app to all your most important website accounts.</p>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-b0a319d5c27d97f5e231bdef269e3f42">Week 2: Fix Passwords and Logins</p>



<p class="has-foreground-color has-background-background-color has-text-color has-background has-link-color wp-elements-a2e6534844f5f86e9fb3ef7ad97559fe">Ensure staff only have access to their personal accounts and are using a Password Manager with a memorised Master Passphrase.</p>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-959a1db2e808ae9f0c84a1446f84d448">Week 3: Test your Back Ups</p>



<p class="has-foreground-color has-background-background-color has-text-color has-background has-link-color wp-elements-ecc11fc53f1cb3dd1450c3faa7f6e6d3">Set up a backup on a secure device and test you know how to restore that backup</p>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-029ef278edd7f8e8eb92951ab39222af">Week 4: Raise Awareness</p>



<p class="has-foreground-color has-background-background-color has-text-color has-background has-link-color wp-elements-8e0ca93f31da0724ac3348d284754c08">Conduct staff training to explain phishing scams and how to avoid them. Ensure all know, when they recieve a payment request, to call the company back using a number you either have on record or source yourselves.</p>



<p>After that, spend one hour a month:</p>



<ul class="wp-block-list">
<li>15 mins checking who has access to your network</li>



<li>15 mins confirming the backup process is working</li>



<li>15 mins installing pending updates</li>



<li>15 mins reminding staff about security and checks you have put in place.</li>
</ul>



<div style="height:16px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-background-color has-foreground-background-color has-text-color has-background has-link-color wp-elements-bec5ea8d4f0743310316affae13e12c7"><strong>If you want to <a href="https://www.findclarity.uk/"><strong>find Clarity</strong></a> and enjoy research-based customer insights, Clarity offers in person customer interviews for SMEs in Hackney. We offer a package of 5 half hour interviews per month and promise 5 actionable insights from each interview, providing you with authentic, independent customer feedback and a suite of marketing materials to build your reputation and word of mouth referrals.</strong></p>
<p>The post <a href="https://findclarity.uk/cyber-security/">Cyber Threats: Spring Cleaning For SMEs</a> appeared first on <a href="https://findclarity.uk">Clarity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://findclarity.uk/cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
