Published: 17 Aug 2022
We all use the internet in our day-to-day lives and increasingly we are leaving ourselves more and more exposed to exploitation and theft. From our banking to our communications, many aspects of our work and private lives are lived, experienced and carried out through electronic devices. But from hacking into our details to falling foul of ransomware, there are so many ways we can be exploited and vulnerable online. How can we protect our businesses and ourselves in the surveying profession, when we are so reliant on being online?
Compromised and locked out
Many surveying firms and TSA members are SMEs and it’s important that they are invulnerable – or at least armed – against any kind of cyberattack. In collaboration with PCM Systems, our IT services provider and a TSA Supplier member themselves, we have formulated guidance on cybersecurity for our members, which aims to keep them safe and secure online. There’s been much in the news and business channels about ransomware, which is exactly as sinister as it sounds. A ransomware attack is something that can happen quite inadvertently to internet users. It applies to software and ends up with a demand for a ransom.
If criminals manage to instal bugs, viruses and ransomware on your computers – via a download or document, for example – then they are able to encrypt your own data and force you to pay to be allowed to re-access it. They effectively freeze your computer system. Even if you pay the ransom, you may still be at their mercy, as they may then threaten to release your data they have harvested, to prove that your system is insecure and vulnerable. Therefore, your clients will suffer too. This can be both embarrassing and financially costly – and even if it’s not particularly sensitive data that has been stolen, it can still cause a great deal of wasted time and disruption for your business sorting it out.
Be on your guard
There are several ways you can make yourself more robust, when it comes to your surveying business and its internet security. Most important is to have an up-to-date antivirus system and software, that will make it difficult to access your private systems, networks and information. Make sure you have downloaded a valid antivirus programme and also that you have set it up properly, so that its’ various levels of security, such as firewalls, are activated and running correctly. These will deflect any threats away from your network, files and data. If you are not sure what you are doing, ask an IT specialist to come in and set it up for you.
It’s also worth looking out for various common scams associated with emails, such as phishing or dodgy attachments. They will try to make you divulge your personal details. Don’t open anything that looks ‘phishy’, insomuch as if it’s not from a sender you recognise. And even if it is a trusted sender, check that it is indeed authentic and someone hasn’t cloned one of your contacts. If you click on the link, is can create a gateway onto your computer for criminals to access information.
We’ve all had the telephone call from someone claiming that there’s been a security breach on our laptops. These bogus calls are quite widespread and commonplace now, so it’s best to have an excuse ready or simply hang up on them. They are only trying to get you to impart your details to gain access your computer or your bank account. It can be as simple as a wrong click that can cause you a lot of worry and stress that you can do without. By having the correct security in place, you’ll have both peace of mind and efficiency in your business.
Keep cyber criminals at bay
Our essential guide to cyber security, created with PCM Systems, outlines several ways you can try to keep cyber criminals at bay. This includes such aspects as how to identify key methods of cyber scams. It’s easy to ‘mask’ the sender’s name to one you might recognise, so always check the email domain too. Never pay an invoice from someone you don’t recognise and if you use Purchase Orders, check that the invoice references it. Do their bank details match those from previous transactions? It’s also worth considering using a two-factor or multi-factor authentication, to access your data – especially on mobile devices. This might include sending a code to your phone, or unique bio-details like fingerprint recognition.
For more information on cybersecurity online for surveying businesses, get in touch with us via TSA website. We can put you in contact with one of our trusted IT security associates, which can help you ensure that you are prepared for anything cyber criminals can throw at you.