Streamline your cloud experience and maximise your cloud investment with Microsoft Azure-aligned public cloud services.
Host all of your workloads in the most appropriate location while experiencing the simplicity of one cloud from Six Degrees.
Enhance your cyber security and safeguard your organisation with our cyber security strategy and advisory, consultancy, and managed services.
Connect your business through a comprehensive connectivity portfolio delivered via our owned and operated core Next Generation Network (NGN).
Secure your productivity on any device, anywhere, any time.
Streamline your hosting with comprehensive colocation services delivered from three UK data centres.
Gain clarity and control of your 5G estate, ensuring ongoing cost efficiencies are managed on your behalf through our managed service.
Gain confidence in your cloud direction and achieve accelerated time to value through our assured and optimised cloud services.
Master today’s complex threat landscape and protect your business with our intelligence-led security services.
Videos and webinars are a great way to digest the latest technology insights.
Our eBooks and whitepapers provide in-depth insights from our experts.
Our thought leaders publish regular blogs on up-to-the-minute topics.
Learn all about the latest news from Six Degrees as we continue to evolve.
We host regular in-person and virtual events for our clients.
Discover how Six Degrees has driven success for others.
Learn how we enable our clients to achieve more; providing superior secure solutions, powered by our passionate people.
We are proud to partner with many of the world’s leading vendors, enabling you to leverage our continual investment in difference-making technology.
Learn how CNS at Six Degrees delivers intelligence-led security services that protect organisations in today’s hostile landscape.
We are committed to operating in an environmentally and socially conscious way. Learn more about our commitments as a business.
We are proud of our secure cloud credentials. Learn why we’re one of the most highly accredited providers in the UK.
We are a friendly and passionate bunch here. Whether you want to work with us or for us, we think you’ll enjoy the Six Degrees experience.
Home » Blogs » Learning Lessons from How Six Degrees Stays Up-to-Date with Cyber Security Threats
The volume, variety and sophistication of cyber security threats continue to increase significantly, and organisations are under constant threat of data loss and disruption from security breaches. According to the UK Government’s Cyber Security Breaches Survey 2021, at least 85% of medium and large organisations have suffered from phishing incidents, 56% were impersonated, and 14% have been subject to malware including ransomware.
At Six Degrees, we enable organisations to strengthen their cyber security postures to protect them from current and future threats. Through our UK-based Cyber Security Operations Centre (CSOC), we monitor and analyse the latest threats and supply guidance around how organisations can prevent threats from escalating and affecting their organisation.
It’s fair to say that in our time as a secure cloud provider we’ve learned a thing or two about how to stay up-to-date with cyber security threats. In this blog, we’ll impart some of the lessons we’ve learned.
In order to stay up-to-date with cyber security threats, you need to know your enemy – how hackers are targeting you and organisations like yours. Irrespective of the size of your organisation or what industry you are in, there are three key cyber security threats that all organisations face today:
Phishing Emails
Phishing emails are sent by hackers, and pretend to be from someone you trust like your bank or your local council. Their goal is to convince you to do something they can use to their advantage, such as click on a link to a malicious website or provide login and other personal details. Phishing emails are one of the main methods hackers use to deploy ransomware and business email compromise attacks.
Business Email Compromise Attacks
Business email compromise attacks target employees within an organisation by sending spoof emails which fraudulently represent senior colleagues or trusted clients. The emails use social engineering techniques to issue illicit instructions, such as approving payments to hackers’ bank accounts or releasing confidential client data that can be leaked on the Dark Web.
Ransomware
Ransomware’s primary aim is to extort money from organisations and individuals who are infected. It achieves this by encrypting files that are saved locally and on shared drives connected to affected machines, rendering them unusable, and then threatening to leak stolen confidential information onto the public internet. Once files have been encrypted, the user is notified and asked to pay money, typically in cryptocurrency, to obtain a key that will unencrypt the files.
Unfortunately, there is no silver bullet or easy fix when it comes to combatting these cyber-attack methods. However, at Six Degrees we believe that by taking a defence in depth approach with layered controls you can reduce risk and protect yourself and your organisation from potential threats.
Cyber hygiene refers to best practices that organisations can implement to improve their cyber security posture while engaging in day-to-day business activities. At Six Degrees we constantly monitor our cyber hygiene to ensure we remain as secure as possible.
Here are some of the most common and critical areas that we believe need to be incorporated into your ongoing management processes:
Systems that are well-maintained are less likely to be vulnerable to cyber security risks. But although doing the basics properly is a great starting place, it does take into consideration external factors that can significantly impact an IT environment. Digital transformation projects can introduce new risks and vulnerabilities where existing controls are no longer effective. On this basis, how you plan for a secure future?
Adopting a comprehensive cyber security strategy enables you to increase your security posture in a controlled, efficient manner, predicting risks and removing knee jerk reactions. To meet this challenge, cyber security must become an ongoing, iterative process.
With cyber threats on the increase, how can you deliver more efficient protection for your organisation? The answer lies in orienting yourself and your organisation towards your objectives with a pragmatic approach. You need to:
This process is something we call the cyber security journey at Six Degrees. It involves a five-step iterative review process of your organisation and your cyber security capabilities — illustrated in the diagram below.
Ultimately, cyber security is a journey, not a destination. Any investment you make should be agile and flexible enough to meet both current and future demands.
Six Degrees offers the capabilities and expertise you need to ensure that your organisation is protected from the latest threats. Ready to learn more about how we can keep your organisation secure?
We recommend starting with our Aegis Cyber Security Maturity Assessment. Six Degrees conducts a comprehensive cyber security maturity and benchmarking assessment, delivered and managed in a consultant-led approach that provides you with point-in-time or ongoing visibility into your organisation’s security posture.
The Six Degrees Aegis platform will compile a detailed evaluation of your organisation’s cyber security readiness and your ability to address weaknesses, highlighting and scoring potential security gaps and making recommendations to reduce or mitigate the security risks. It draws on recognised standards and approaches including ISO/IEC 27001:2013, Cyber Essentials and NIST 800-53 to deliver a set of questions that cover a range of security domains.
How and Why You Should Adopt a Cost-Benefit…
Planning for the Future of Cyber Security Today…
More information on our Privacy and Cookies Policy can be found here: https://www.6dg.co.uk/privacy-cookies/. You can update how we contact you in the future by visiting our Communications Preference Centre here: https://www.6dg.co.uk/preference-centre/.