Accelerate Technologies helped the business strengthen security and improve employee awareness of security threats.
A growing independent accountancy practice with four branches across two counties and around 100 employees. The company had seen growth through acquisitions over the last few years, expanding in size and capabilities which also brought in new processes and the need to incorporate the existing IT infrastructure.
The company specialises in accountancy, tax and business advice, regularly collecting, processing and storing clients’ sensitive data (such as personal HMRC, PAYE, Pensions, etc.). At all times, they need to be aware of exactly what data they hold and where it is stored to protect all sensitive data from loss.
In addition to GDPR, the company had assessed their data protection against the Cyber Essentials scheme but were looking to extend their security further in line with the Centre for Internet Security (CIS) framework.
The working from home initiative during the COVID-19 pandemic prompted an urgent need to support employees with applications outside of the office to ensure that the business and billing time could continue.
Use of older, more industry specific applications, accessed via remote desktop, presented the IT team with additional security challenges, unlike cloud-delivered applications, which are designed with security in mind.
The company called on Accelerate Technologies to carry out a Cyber Security Assessment. Through a brief workshop with the IT team, the business’ appetite for cyber risk and current state of their security was assessed. Key areas identified in the report were:
Phishing scams are becoming increasingly sophisticated and it is important that employees spot and report any potentially malicious emails to protect critical business and client data.
During COVID-19 HMRC shut down almost 300 phishing scam sites*.
Employee Cyber Awareness Programme
Training – Awareness of cyber security threats is key to ensuring business continuity. Employees are often oblivious to threats, such as clicking on links within malicious emails, and it was important to ensure that processes were in place to protect sensitive information outside of the office. Training was delivered to suit different employees and their role within the business.
Simulated Phishing Attack – Phishing attacks can take on many guises, via email, SMS or social media and are designed to install malware, swindle users or farm sensitive data. A malicious email might look like a client sending through an invoice pdf, which when clicked on downloads malware. To test the areas of vulnerability to these threats, simulated phishing attacks were used, tailored to different functions within the business.
Reporting Potential Security Threats – Working alone, outside of the office, presents an additional risk. Employees are not able to quickly seek reassurance with a colleague or IT if they notice a dubious email. To create a pro-active and caring culture around security the company decided to use phishing “call it out” software, so they can report anything suspicious and be rewarded for their vigilance.
Studies at Microsoft indicate that an email account is 99.9% less likely to be compromised if it is protected by Multi-Factor Authentication
Configuration and policies – Office 365 email security configurations, policies and user privileges were reviewed to ensure all risks were covered and that all notifications were active to spot any malicious behaviour. The assessment also recommended making sure any email domains were properly protected against impersonation.
Multi-Factor Authentication – People tend to use the same password for personal and work accounts or use weak passwords that can be easily hacked by criminals. Implementing Multi-Factor Authentication (MFA) for user access has significantly reduced the threat of compromise to email and critical applications.
Application Security – Accountancy firms in the UK rely on older industry applications, and the company provided access to these via remote desktop. Remote servers are vulnerable to cyber-attack if user access is not secured through multi-factor authentication (MFA). The company rolled out MFA and single sign-on without disrupting users and making access simpler and less cumbersome for employees.
For complete protection on the client side, it is also important to secure access to on-line applications with MFA.
Supplier Security – The company carried out third-party due diligence to ensure that IT systems and firewalls outsourced to other companies also adhered, not only to standard service level agreements, but to appropriate security guidelines.
Let us help you navigate SD WAN, SASE and WAN Op
Secure access for remote workers? Moving to cloud-based applications/SaaS? Optimising applications?Discuss Requirements
Phishing Simulation & Awareness Assessment
Shore up your defences against phishing scams. Get started with a Phishing Simulation & Awareness Assessment from Accelerate.Find out more
Cyber Security Assessment
As remote working grows, how do you deal with the ever-expanding attack surface and poorly protected devices?Learn More