Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Putting reputations on the line by ignoring cyber security

cybersecurityMany small and medium sized manufacturing businesses could vastly improve their online safety and subsequently their reputation if they made cyber security more of a priority. According to new data from the government’s Cyber Security Tracker, 23% have suffered from a virus, Trojan, malware or spyware attack in the last year yet 49% never or rarely monitor their IT systems for security breaches.

Many businesses confess that they rarely or never use complex passwords (34%) or encrypt files containing confidential or business critical information (66%) despite 10% having incurred costs to restore affected IT systems over the past 12 months.

It’s clear that more manufacturing businesses could make their processes more secure simply by seeking some guidance. 15% say that a friend or family member is currently responsible for helping with IT issues when needed and 4% admit that they don’t have anyone in the business responsible for online security.

Despite the fact that many companies do not have someone accountable for cyber security, the issue is in fact on the radar of business leaders, but many are too busy to give it serious consideration. 66% of manufacturing companies agree they should make cyber security a bigger priority but that other matters always seem more urgent.

When it comes to online concerns for manufacturing businesses, the top worry is suffering from a virus, Trojan or other spyware/malware as identified by 50%. This is followed by financial loss from theft of money or bank details (46%) and hacking (37%). However with 95% of procurement managers at big businesses saying that they would avoid a small firm that had failed to protect itself from cyber crime, SMEs also need to be aware of the long-term effects that cyber attacks can have on a business and its reputation.

Universities Minister David Willetts said: “The internet provides small and medium sized manufacturing businesses with huge opportunities but there are also risks. However the majority of cyber crime relies on businesses failing to do the basics well. Making your business cyber streetwise can be quick, easy and cheap with the right support. Make life harder for cyber criminals and protect your business, its customers and its reputation.”

Cyber Streetwise has identified five simple steps every business should take today to immediately improve their online lives:

– Install and always update antivirus and firewall software to protect business and customer information
– Use complex passwords for IT systems, computers and devices
– Ensure you and your staff never download something if its origin is unknown
– Ensure staff delete suspicious emails before opening
– Review what important information your business holds and whether it is adequately protected.

Our Sponsors