{"id":14802,"date":"2019-07-18T09:04:28","date_gmt":"2019-07-18T08:04:28","guid":{"rendered":"https:\/\/www.names.co.uk\/blog\/?p=14802"},"modified":"2019-07-18T09:08:11","modified_gmt":"2019-07-18T08:08:11","slug":"what-is-a-cyber-attack-and-how-can-i-protect-my-business","status":"publish","type":"post","link":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/","title":{"rendered":"What is a cyber attack and how can I protect my business?"},"content":{"rendered":"\n<p>There are\nmany types of cyber attack, some more serious and damaging than others. Whether\nit&#8217;s phishing, malware, denial-of-service attacks or ransomware, all can target\nvulnerable systems and pose a considerable threat to your business. This\narticle answers the question of what is a cyber attack, describes the common\nforms of attack that you might experience and offers advice on how you can\nprotect against them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a\ncyber attack?<\/h2>\n\n\n\n<p>A cyber\nattack is a deliberate, malicious attempt to gain access to an information\nsystem belonging to another organisation or individual. There are multiple\nreasons for a cyber attack: the perpetrator usually wants to benefit from the\ndisruption through theft of money or data, or compromising a company&#8217;s network.\nSuch attacks can lead, in turn, to crimes such as identity theft and fraud.\nSome cyber attacks are targeted at specific organisations; others cast a wide\nnet with the aim of disrupting as many networks, services and people as they\ncan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What sort\nof attack could affect your business?<\/h2>\n\n\n\n<p>The most\ncommon external security threats to businesses are:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware<\/h2>\n\n\n\n<p>Malicious software such as viruses, worms, ransomware and spyware that targets vulnerabilities in a network. It usually gains access through a user clicking a risky link or opening an attachment in an email. Once installed, it can infect the system with harmful programs, steal sensitive data or take down the whole network. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing<\/h2>\n\n\n\n<p>The sending of fraudulent communications, usually email, that appear to originate from a trusted source. The intention is to compromise the victim&#8217;s device with malware, or to gain personal data such as passwords or financial details. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Denial-of-service<\/h2>\n\n\n\n<p>Excessive network traffic that floods a system with the aim of tying up bandwidth and resources to ensure that the system cannot operate as normal. An extension of this is the distributed denial-of-service (DDoS) attack, where the attack is launched by multiple compromised devices.<\/p>\n\n\n\n<p>Not all\nthreats are external, however. Beware of security issues caused by human error,\nsuch as accidentally distributing sensitive data outside the organisation, or\nemployees being careless about security policies. There is also a risk from\ndissatisfied employees or ex-employees wishing to harm your company.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can you\nprotect your systems?<\/h2>\n\n\n\n<p>The most\nimportant thing is to have an effective web, email, and data security solution\nin place. This will protect both your organisation and your employees from\naccidental or malicious breaches that could cause damage to your systems. A\nvital component of this is up-to-date virus protection: cyber attacks evolve\nconstantly and keeping pace with antivirus updates is a simple way to guard\nagainst them. Also, make sure you monitor the software on your network:\nunpatched and out-of-date programs can contain vulnerabilities for attackers to\nexploit. <\/p>\n\n\n\n<p>Finally,\nhave a solid security incident response plan in place. If an attack is\nsuccessful, this will serve to reduce its impact and enable you to fix the\nissue and get back to normal service as soon as possible.<\/p>\n\n\n\n<p>All\norganisations, regardless as to size or type, are potentially vulnerable to\ncyber attack because every company has assets that might be worth exploiting.\nIn order to minimise any financial, reputational or legal impact on your\nbusiness, constant awareness of possible attacks and robust measures to protect\nagainst them are crucial best practices to follow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many types of cyber attack, some more serious and damaging than others. Whether it&#8217;s phishing, malware, denial-of-service attacks or ransomware, all can target vulnerable systems and pose a&#8230; <a class=\"more-link\" href=\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":17,"featured_media":14803,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176],"tags":[],"class_list":["post-14802","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a cyber attack and how can I protect my business?<\/title>\n<meta name=\"description\" content=\"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a cyber attack and how can I protect my business?\" \/>\n<meta property=\"og:description\" content=\"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\" \/>\n<meta property=\"og:site_name\" content=\"names.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/namesco\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-18T08:04:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-18T08:08:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Namesco\" \/>\n<meta name=\"twitter:site\" content=\"@Namesco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\"},\"author\":{\"name\":\"Nathan\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"headline\":\"What is a cyber attack and how can I protect my business?\",\"datePublished\":\"2019-07-18T08:04:28+00:00\",\"dateModified\":\"2019-07-18T08:08:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\"},\"wordCount\":556,\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\",\"url\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\",\"name\":\"What is a cyber attack and how can I protect my business?\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"datePublished\":\"2019-07-18T08:04:28+00:00\",\"dateModified\":\"2019-07-18T08:08:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"description\":\"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage\",\"url\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"contentUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png\",\"width\":945,\"height\":425,\"caption\":\"cybercrime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"names.co.uk\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.names.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.names.co.uk\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is a cyber attack and how can I protect my business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.names.co.uk\/blog\/\",\"name\":\"names.co.uk blog\",\"description\":\"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\",\"name\":\"Nathan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"caption\":\"Nathan\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.\",\"url\":\"https:\/\/www.names.co.uk\/blog\/author\/nathan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a cyber attack and how can I protect my business?","description":"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/","og_locale":"en_GB","og_type":"article","og_title":"What is a cyber attack and how can I protect my business?","og_description":"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.","og_url":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/","og_site_name":"names.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/namesco\/","article_published_time":"2019-07-18T08:04:28+00:00","article_modified_time":"2019-07-18T08:08:11+00:00","og_image":[{"width":945,"height":425,"url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","type":"image\/png"}],"author":"Nathan","twitter_card":"summary_large_image","twitter_creator":"@Namesco","twitter_site":"@Namesco","twitter_misc":{"Written by":"Nathan","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#article","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/"},"author":{"name":"Nathan","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"headline":"What is a cyber attack and how can I protect my business?","datePublished":"2019-07-18T08:04:28+00:00","dateModified":"2019-07-18T08:08:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/"},"wordCount":556,"image":{"@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","articleSection":["Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/","url":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/","name":"What is a cyber attack and how can I protect my business?","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage"},"image":{"@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","datePublished":"2019-07-18T08:04:28+00:00","dateModified":"2019-07-18T08:08:11+00:00","author":{"@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"description":"There are many types of cyber attack, some more serious and damaging than others. Take a dive into how you can protect your business from cyber attacks.","breadcrumb":{"@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#primaryimage","url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","contentUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/07\/Your-online-security.png","width":945,"height":425,"caption":"cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/www.names.co.uk\/blog\/what-is-a-cyber-attack-and-how-can-i-protect-my-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"names.co.uk","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.names.co.uk\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.names.co.uk\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"What is a cyber attack and how can I protect my business?"}]},{"@type":"WebSite","@id":"https:\/\/www.names.co.uk\/blog\/#website","url":"https:\/\/www.names.co.uk\/blog\/","name":"names.co.uk blog","description":"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471","name":"Nathan","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","caption":"Nathan"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.","url":"https:\/\/www.names.co.uk\/blog\/author\/nathan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=14802"}],"version-history":[{"count":2,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14802\/revisions"}],"predecessor-version":[{"id":14805,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14802\/revisions\/14805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media\/14803"}],"wp:attachment":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=14802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=14802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=14802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}