Cyber Security

43 percent of cyber attacks are aimed at small businesses

051-spam

Email Security

1 in 131 emails contains a malware. Is your business protected? 

78 percent of people claim to know the risks that come with clicking unknown links in emails and yet still click these links.

View Details
database-1

Virus & Malware protection

230,000 new malware samples are produced every day.— and this is predicted to only keep growing
View Details
unlock

Data Breach / Ransomware

It takes most business about 197 days to detect a breach on their network.

81 percent of data breach victims do not have a system in place to self-detect data breaches.

 

View Details
computer

Computer vulnerabilities

Remember the virus that affected the NHS – it was preventable. How? – By installing a windows update.
View Details

Email Security

Think about all the things associated with your email address: Login information, Banking details, Personal details etc etc

Emails are now being increasingly used by hackers, and an estimated one in every 131 emails contain a malware. This is the highest rate in about five years, and it is further expected to increase as hackers attempt to use malware like ransomware to generate money from unsuspecting people. 

Identity fraud has also seen a significant rise, particularly in developed countries like the United States and the UK. In 2016, 6.15% of consumers became victims of identity fraud, with the costs associated with also increasing. In 2017, the total amount of losses due to identity fraud in the US reached $16 billion.

$
0
Average Cost Of A Ransomware Attack
0
%
of companies said they were the victims of cyber crime in 2016
0
%
phishing attacks carried out in December last year were against SMEs

Percentage Of Businesses That Experienced A Cyber Security Breach In The Past 12 Months

38%

Micro Firms

52%

Small Businesses

66%

Medium Businesses

68%

Large Businesses

Types of breaches suffered among those who have identified breaches

Fraudulent emails or being directed to fraudulent websites 43%
Viruses, spyware or malware 20%
Others impersonating organisation in emails or online 12%
Ransomware 8%
Hacking or attempted hacking of online bank accounts 5%
Denial-of-service attacks 4%
Unauthorised use of computers, networks or servers by outsiders 3%
Any other breaches or attacks 3%
Unauthorised use of computers, networks or servers by staff 1%

Free Consultation

There is no greater wealth than wisdom, no greater poverty than ignorance; no greater heritage than culture and no greater support than consultation.

Fill in the form and we will get it touch as soon as possible.

Consult Me!

WANNACRY AND NOTPETYA HIT DURING 2017 AND WERE THE MOST PROLIFIC EVER SEEN

0
countries
0
Machines
0
Billion Dollars
Damages estimated from NotPetya

Virus & Malware protection

My Tech Guy & Webroot Secureanywhere® Business Endpoint Protection

Here at My Tech Guy, we have used various Antivirus and malware protection software; but nothing has come close to Webroot Secureanywhere®. That is why we have teamed up with them to provide their award winning solution to all our customers. 

 

During 2016, Webroot classified 56% of previously unseen
malware executables as malicious within the first hour of
encounter

How Secure Are You?

Data Breach / Ransomware

Ransomware and its variants have become a serious threat around the world, and 2017 saw new, more virulent and destructive variants with a variety of purposes. The two most discussed and largest ransomware attacks in history— WannaCry and NotPetya—hit during 2017 and were the most prolific ever seen. Together, they infected more than 200,000 machines in more than 100 countries, all within just 24 hours. These attacks used the EternalBlue exploit to attack the server message block (SMB), which is essentially a filesharing vulnerability on Windows XP and newer. The malware was then able to move laterally through the network just like a worm, reaching any computer running SMB, even those not connected directly to the network, but to another networkconnected device.

 

NotPetya arrived a few months later, using the same exploit to eventually spread worldwide from its origin as an infected update to Ukrainian tax software. Rather than encrypting files, NotPetya modified the master boot record (MBR) and encrypted the entire hard drive, preventing the Windows OS from booting. The attack was designed to do as much damage as possible to Ukrainian infrastructure during a holiday, and it achieved its goal: power plants, banks, and supermarkets were shut down. After the attack spread across the world, estimated damages of more than $1.2 billion were reported.

How Secure Are You?

Cyber Security Trends

  • Cryptojacking

    Instead of stealing a
    victim’s files and ransoming them for money, the cybercriminals
    steal victims’ CPU power to mine cryptocurrency

  • Ransomware

    Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

  • Polymorphism

    A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self-encrypted virus designed to avoid detection by a scanner. Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.

  • Malicious Mobile Apps

    As the world increasingly connects to the internet
    while on the go, these devices become a prime target for
    attackers. The malicious mobile app is the most common form
    of attack.

computer

Computer vulnerabilities

A vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorised actions within a computer system.

These vulnerabilities can be remain undiscovered for the life span of a computer/or operating system or they become known and the Operating system providers provide a update or a patch.

Installing these patches and updates is extremely important. Once a vulnerability is made public – you can almost guarantee some one will exploit it.  

 

How Secure Are You?

Get In Touch!

No Business is too small for us

Choose your Poison – Email, Telephone, Skype 

Address

10 Lune Sqaure,

Damside Street,

Lancaster

Business Hours

Mon – 9AM – 6PM

Tue – 9AM – 6PM

Wed – 9AM – 6PM

Thu – 9AM – 6PM

Fri – 9AM – 6PM

Sat – 9AM – 3PM

Sun – Closed