
cybersecurity
Cyber-attacks: a wake-up call for organisations
By
Anita Muganda
•
3 min read
Discover the biggest cybersecurity risks this year and protection strategies.

cybersecurity
Cyber-attacks: a wake-up call for organisations
By
Anita Muganda
•
3 min read
Discover the biggest cybersecurity risks this year and protection strategies.
Introduction
Introduction
The recent cyber-attacks on major UK retailers – M&S, Harrods, and Co-op – serve as a stark and urgent wake-up call for all business owners, not just those in retail. The key message is this: Cybersecurity is no longer an optional extra, but a fundamental pillar of business survival and resilience in today's digital landscape.
The recent cyber-attacks on major UK retailers – M&S, Harrods, and Co-op – serve as a stark and urgent wake-up call for all business owners, not just those in retail. The key message is this: Cybersecurity is no longer an optional extra, but a fundamental pillar of business survival and resilience in today's digital landscape.
What does this mean for business and organisations? Here’s our 10-point action plan:
What does this mean for business and organisations? Here’s our 10-point action plan:
1. Assume You Are a Target
1. Assume You Are a Target
The attacks on these well-known brands demonstrate that no business, regardless of size or sector, is immune to cyber threats. Attackers are becoming increasingly opportunistic and sophisticated. It's crucial to move away from a mindset of "it won't happen to us" to "we need to be prepared for when it happens."
The attacks on these well-known brands demonstrate that no business, regardless of size or sector, is immune to cyber threats. Attackers are becoming increasingly opportunistic and sophisticated. It's crucial to move away from a mindset of "it won't happen to us" to "we need to be prepared for when it happens."
2. Elevate Cybersecurity to a Board-Level Priority
2. Elevate Cybersecurity to a Board-Level Priority
Cybersecurity should not solely reside within the IT department. It needs to be a strategic discussion at the highest levels of the organization, integrated into overall business risk management. This includes allocating sufficient budget and resources for robust security measures and fostering a security-conscious culture across the entire company.
Cybersecurity should not solely reside within the IT department. It needs to be a strategic discussion at the highest levels of the organization, integrated into overall business risk management. This includes allocating sufficient budget and resources for robust security measures and fostering a security-conscious culture across the entire company.
3. Implement Defence-Grade Cybersecurity:
3. Implement Defence-Grade Cybersecurity:
Basic security measures are no longer sufficient. Businesses need to adopt a more proactive and layered approach, incorporating advanced threat detection, prevention, and response capabilities. This might include:
Robust firewalls and intrusion detection/prevention systems: To act as the first line of defense against external threats.
Advanced endpoint security: To protect individual devices (laptops, POS systems) which can be entry points for attackers.
Data encryption: To protect sensitive data both in transit and at rest, making it unusable even if accessed by unauthorized parties.
Multi-Factor Authentication (MFA): Implementing MFA for all critical accounts significantly reduces the risk of unauthorized access, even if passwords are compromised. Be aware of "MFA fatigue" tactics and educate employees.
Regular security audits and penetration testing: To identify vulnerabilities in systems and processes before attackers can exploit them.
Threat intelligence: Staying informed about the latest threats and attack techniques to proactively adapt security measures.
Basic security measures are no longer sufficient. Businesses need to adopt a more proactive and layered approach, incorporating advanced threat detection, prevention, and response capabilities. This might include:
Robust firewalls and intrusion detection/prevention systems: To act as the first line of defense against external threats.
Advanced endpoint security: To protect individual devices (laptops, POS systems) which can be entry points for attackers.
Data encryption: To protect sensitive data both in transit and at rest, making it unusable even if accessed by unauthorized parties.
Multi-Factor Authentication (MFA): Implementing MFA for all critical accounts significantly reduces the risk of unauthorized access, even if passwords are compromised. Be aware of "MFA fatigue" tactics and educate employees.
Regular security audits and penetration testing: To identify vulnerabilities in systems and processes before attackers can exploit them.
Threat intelligence: Staying informed about the latest threats and attack techniques to proactively adapt security measures.
4. Focus on Business Continuity and Disaster Recovery
4. Focus on Business Continuity and Disaster Recovery
Even with strong defences, breaches can still occur. Having a well-defined and regularly tested business continuity and disaster recovery plan is crucial to minimize disruption and ensure a swift return to normal operations. This includes:
Data backups and recovery procedures: Regularly backing up critical data and having a tested process to restore it quickly.
Incident response plan: A clear, step-by-step plan outlining roles, responsibilities, and procedures to follow in the event of a cyber incident.
Communication plan: Establishing clear communication channels with employees, customers, and stakeholders during and after a cyber-attack.
Even with strong defences, breaches can still occur. Having a well-defined and regularly tested business continuity and disaster recovery plan is crucial to minimize disruption and ensure a swift return to normal operations. This includes:
Data backups and recovery procedures: Regularly backing up critical data and having a tested process to restore it quickly.
Incident response plan: A clear, step-by-step plan outlining roles, responsibilities, and procedures to follow in the event of a cyber incident.
Communication plan: Establishing clear communication channels with employees, customers, and stakeholders during and after a cyber-attack.
5. Understand and Mitigate Third-Party Risks
5. Understand and Mitigate Third-Party Risks
The interconnected nature of modern business means that vulnerabilities in your supply chain or with third-party vendors can be exploited to attack your organization. Thoroughly vet the security practices of your partners and limit their access to your systems and data.
The interconnected nature of modern business means that vulnerabilities in your supply chain or with third-party vendors can be exploited to attack your organization. Thoroughly vet the security practices of your partners and limit their access to your systems and data.
6. Invest in Employee Training and Awareness
6. Invest in Employee Training and Awareness
Human error remains a significant factor in many cyber breaches. Regular and comprehensive training programs are essential to educate employees about phishing scams, social engineering tactics, password security, and other cybersecurity best practices.
Human error remains a significant factor in many cyber breaches. Regular and comprehensive training programs are essential to educate employees about phishing scams, social engineering tactics, password security, and other cybersecurity best practices.
7. Enhance Monitoring and Detection Capabilities
7. Enhance Monitoring and Detection Capabilities
Implement robust monitoring tools and security operations to detect suspicious activity and potential intrusions in real-time. Prompt detection can significantly limit the damage caused by an attack. Pay close attention to unusual login attempts and potential misuse of privileged accounts.
Implement robust monitoring tools and security operations to detect suspicious activity and potential intrusions in real-time. Prompt detection can significantly limit the damage caused by an attack. Pay close attention to unusual login attempts and potential misuse of privileged accounts.
8. Review and Update Password Reset Processes
8. Review and Update Password Reset Processes
The recent attacks reportedly involved exploiting weaknesses in IT helpdesk password reset procedures. Businesses must review and strengthen these processes to ensure that only legitimate employees can reset passwords, especially for accounts with elevated privileges.
The recent attacks reportedly involved exploiting weaknesses in IT helpdesk password reset procedures. Businesses must review and strengthen these processes to ensure that only legitimate employees can reset passwords, especially for accounts with elevated privileges.
9. Learn from Others and Share Information
9. Learn from Others and Share Information
Engage with industry peers and relevant cybersecurity organizations to share threat intelligence and best practices. Learning from the experiences of companies like M&S, Harrods, and Co-op can provide valuable insights for strengthening your own defences.
Engage with industry peers and relevant cybersecurity organizations to share threat intelligence and best practices. Learning from the experiences of companies like M&S, Harrods, and Co-op can provide valuable insights for strengthening your own defences.
10. Resilience is Key, Not Just Awareness
10. Resilience is Key, Not Just Awareness
While awareness is important, the focus needs to shift towards building true cyber resilience – the ability to not only defend against attacks but also to withstand, respond to, and recover quickly from them, minimizing the impact on operations, reputation, and customer trust.
While awareness is important, the focus needs to shift towards building true cyber resilience – the ability to not only defend against attacks but also to withstand, respond to, and recover quickly from them, minimizing the impact on operations, reputation, and customer trust.
Conclusion
Conclusion
Cyber-attacks are not isolated incidents. They are a clear indicator of an ever-evolving threat landscape and the increasing targeting all businesses that handle sensitive data and rely on digital infrastructure. Business owners must take these incidents as a serious warning and act decisively to strengthen their cybersecurity posture to protect their organizations in the long term. Ignoring these lessons could lead to significant financial losses, operational disruptions, reputational damage, and a loss of customer trust.
Trust is your ultimate asset. Talk to us about how to protect it.
Cyber-attacks are not isolated incidents. They are a clear indicator of an ever-evolving threat landscape and the increasing targeting all businesses that handle sensitive data and rely on digital infrastructure. Business owners must take these incidents as a serious warning and act decisively to strengthen their cybersecurity posture to protect their organizations in the long term. Ignoring these lessons could lead to significant financial losses, operational disruptions, reputational damage, and a loss of customer trust.
Trust is your ultimate asset. Talk to us about how to protect it.
Related Articles
Related Articles
Services
Menu
Almasi Group Ltd
86-90 Paul Street,
London, EC2A 4NE, UK
All rights reserved © Almasi Group Ltd
Stay in the loop
Services
Menu
Almasi Group Ltd
86-90 Paul Street,
London, EC2A 4NE, UK
All rights reserved © Almasi Group Ltd
Stay in the loop
Services
Menu
Almasi Group Ltd
86-90 Paul Street,
London, EC2A 4NE, UK
All rights reserved © Almasi Group Ltd
Stay in the loop