{"id":5466,"date":"2019-07-18T08:27:09","date_gmt":"2019-07-18T08:27:09","guid":{"rendered":"https:\/\/www.register365.com\/blog\/?p=5466"},"modified":"2019-11-20T12:18:29","modified_gmt":"2019-11-20T12:18:29","slug":"cyber-atatcks-and-protecting-your-business","status":"publish","type":"post","link":"https:\/\/www.register365.com\/blog\/cyber-atatcks-and-protecting-your-business\/","title":{"rendered":"What is a cyber attack and how can I protect my business?"},"content":{"rendered":"\n<p>There are many types of cyber attack, some more serious and damaging than others. Whether it\u2019s phishing, malware, denial-of-service attacks or ransomware, all can target vulnerable systems and pose a considerable threat to your business. This article answers the question of what is a cyber attack, describes the common forms of attack that you might experience and offers advice on how you can protect against them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a cyber attack?<\/h2>\n\n\n\n<p>A cyber attack is a deliberate, malicious attempt to gain access to an information system belonging to another organisation or individual. There are multiple reasons for a cyber attack: the perpetrator usually wants to benefit from the disruption through theft of money or data, or compromising a company\u2019s network. Such attacks can lead, in turn, to crimes such as identity theft and fraud. Some cyber attacks are targeted at specific organisations; others cast a wide net with the aim of disrupting as many networks, services and people as they can.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What sort of attack could affect your business?<\/h2>\n\n\n\n<p>The most common external security threats to businesses are:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware<\/h2>\n\n\n\n<p>Malicious software such as viruses, worms, ransomware and spyware that targets vulnerabilities in a network. It usually gains access through a user clicking a risky link or opening an attachment in an email. Once installed, it can infect the system with harmful programs, steal sensitive data or take down the whole network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing<\/h2>\n\n\n\n<p>The sending of fraudulent communications, usually email, that appear to originate from a trusted source. The intention is to compromise the victim\u2019s device with malware, or to gain personal data such as passwords or financial details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Denial-of-service<\/h2>\n\n\n\n<p>Excessive network traffic that floods a system with the aim of tying up bandwidth and resources to ensure that the system cannot operate as normal. An extension of this is the distributed denial-of-service (DDoS) attack, where the attack is launched by multiple compromised devices.<\/p>\n\n\n\n<p>Not all threats are external, however. Beware of security issues caused by human error, such as accidentally distributing sensitive data outside the organisation, or employees being careless about security policies. There is also a risk from dissatisfied employees or ex-employees wishing to harm your company.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can you protect your systems?<\/h2>\n\n\n\n<p>The most important thing is to have an effective web, email, and data security solution in place. This will protect both your organisation and your employees from accidental or malicious breaches that could cause damage to your systems. A vital component of this is up-to-date virus protection: cyber attacks evolve constantly and keeping pace with antivirus updates is a simple way to guard against them. Also, make sure you monitor the software on your network: unpatched and out-of-date programs can contain vulnerabilities for attackers to exploit.<\/p>\n\n\n\n<p>Finally, have a solid security incident response plan in place. If an attack is successful, this will serve to reduce its impact and enable you to fix the issue and get back to normal service as soon as possible.<\/p>\n\n\n\n<p>All organisations, regardless as to size or type, are potentially vulnerable to cyber attack because every company has assets that might be worth exploiting. In order to minimise any financial, reputational or legal impact on your business, constant awareness of possible attacks and robust measures to protect against them are crucial best practices to follow.<\/p>\n\n\n\n<p>With the frequency of cyber attacks taking place online, security is at the forefront of every mind &#8211; grab an <a href=\"https:\/\/www.register365.com\/ssl\">SSL Certificate<\/a> if you run a business website and take the first steps to keeping your site secure. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many types of cyber attack, some more serious and damaging than others. Whether it\u2019s phishing, malware, denial-of-service attacks or ransomware, all can target vulnerable systems and pose a&#8230; <a class=\"more-link\" href=\"https:\/\/www.register365.com\/blog\/cyber-atatcks-and-protecting-your-business\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":22,"featured_media":5181,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-5466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why is a cyber attack and how can I protect my business?<\/title>\n<meta name=\"description\" content=\"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why is a cyber attack and how can I protect my business?\" \/>\n<meta property=\"og:description\" content=\"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Register365 Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/register365\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-18T08:27:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-20T12:18:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.register365.com\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/\",\"url\":\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/\",\"name\":\"Why is a cyber attack and how can I protect my business?\",\"isPartOf\":{\"@id\":\"https:\/\/www.register365.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#primaryimage\"},\"image\":{\"@id\":\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"datePublished\":\"2019-07-18T08:27:09+00:00\",\"dateModified\":\"2019-11-20T12:18:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748\"},\"description\":\"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.\",\"breadcrumb\":{\"@id\":\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#primaryimage\",\"url\":\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"contentUrl\":\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"width\":945,\"height\":425,\"caption\":\"secure website\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Register365\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.register365.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.register365.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is a cyber attack and how can I protect my business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.register365.com\/blog\/#website\",\"url\":\"https:\/\/www.register365.com\/blog\/\",\"name\":\"Register365 Blog\",\"description\":\"Welcome to the Register365 blog! Keep up to date with our latest news and product updates, find out more about our Free Online Business Training, and share your comments with us!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.register365.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748\",\"name\":\"Nathan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.register365.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g\",\"caption\":\"Nathan\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time you'll find him on a train travelling through some beautiful countryside, or curled up on a sofa with his head in a book.\",\"url\":\"https:\/\/www.register365.com\/blog\/author\/nathan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why is a cyber attack and how can I protect my business?","description":"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/","og_locale":"en_GB","og_type":"article","og_title":"Why is a cyber attack and how can I protect my business?","og_description":"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.","og_url":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/","og_site_name":"Register365 Blog","article_publisher":"https:\/\/www.facebook.com\/register365","article_published_time":"2019-07-18T08:27:09+00:00","article_modified_time":"2019-11-20T12:18:29+00:00","og_image":[{"width":945,"height":425,"url":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","type":"image\/png"}],"author":"Nathan","twitter_misc":{"Written by":"Nathan","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.register365.com\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/","url":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/","name":"Why is a cyber attack and how can I protect my business?","isPartOf":{"@id":"https:\/\/www.register365.com\/blog\/#website"},"primaryImageOfPage":{"@id":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#primaryimage"},"image":{"@id":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","datePublished":"2019-07-18T08:27:09+00:00","dateModified":"2019-11-20T12:18:29+00:00","author":{"@id":"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748"},"description":"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.","breadcrumb":{"@id":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#primaryimage","url":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","contentUrl":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","width":945,"height":425,"caption":"secure website"},{"@type":"BreadcrumbList","@id":"\/blog\/2019\/07\/cyber-atatcks-and-protecting-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Register365","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.register365.com\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.register365.com\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"What is a cyber attack and how can I protect my business?"}]},{"@type":"WebSite","@id":"https:\/\/www.register365.com\/blog\/#website","url":"https:\/\/www.register365.com\/blog\/","name":"Register365 Blog","description":"Welcome to the Register365 blog! Keep up to date with our latest news and product updates, find out more about our Free Online Business Training, and share your comments with us!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.register365.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748","name":"Nathan","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.register365.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g","caption":"Nathan"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time you'll find him on a train travelling through some beautiful countryside, or curled up on a sofa with his head in a book.","url":"https:\/\/www.register365.com\/blog\/author\/nathan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts\/5466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/comments?post=5466"}],"version-history":[{"count":2,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts\/5466\/revisions"}],"predecessor-version":[{"id":5532,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts\/5466\/revisions\/5532"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/media\/5181"}],"wp:attachment":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/media?parent=5466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/categories?post=5466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/tags?post=5466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}