Why Every Startup Needs a Cybersecurity Mindset from Day One

North Carolina has become a strong base for new businesses and tech startups. Cities like Raleigh, Charlotte, and Wilmington are attracting investors and entrepreneurs from around the country. But as more startups move their operations online, many forget one critical part of running a digital business — cybersecurity.

For new founders, it’s easy to focus on product design, funding, and marketing while ignoring online safety. Many believe that hackers only target big corporations. The truth is the opposite. Small startups are often seen as easy targets because they usually lack solid protection. A single data breach can lead to lost customers, legal issues, and serious financial damage.

Cybersecurity should not be something to think about later. It needs to be built into the foundation of every startup from day one. When security becomes part of the company culture early on, it protects not just data but also the business’s reputation and long-term growth.

  • Startups Are Prime Targets, Not Too Small to Hack

Many small business owners assume cybercriminals don’t care about them. In reality, hackers often prefer startups because they are easier to breach. New businesses rely heavily on digital platforms, online payments, and cloud tools, yet they usually skip professional security setups to save costs.

Attackers know this. They use phishing emails, fake invoices, and malware to steal data or disrupt operations. Even a small leak of customer information can destroy trust before a startup has a chance to grow. Thinking that a company is “too small to hack” is a costly mistake. Every business that collects, stores, or shares data online is a potential target.

Founders who want to understand cybersecurity from both a technical and management perspective can look to programs such as the University of North Carolina Wilmington’s online MBA in cybersecurity. The program, offered through the Cameron School of Business, combines leadership training with practical knowledge in security management. Its 100% online format makes it accessible to working professionals, and its AACSB accreditation highlights its academic quality.

Taking security seriously from the start helps close those gaps and signals that the company values responsibility.

2. The Real Cost of a Cyberattack for a Young Business

A cyberattack doesn’t just mean a temporary loss of access to files. It can stop business operations, expose client data, and lead to expensive recovery processes. For a young business, that can mean the end of operations entirely.

When a startup suffers a breach, it may lose customer trust instantly. People hesitate to share information again. Investors also become cautious, seeing the business as risky. On top of that, startups may face costs for legal advice, technical recovery, and communication damage control. In some cases, working with an internet content removal service becomes necessary to address harmful posts or leaked information that could damage a young company’s reputation.

The financial loss is only part of the problem. The emotional stress and lost time can be just as harmful. That’s why prevention is always cheaper and more effective than trying to recover after a crisis.

3. Building a Security-First Culture Early On

Cybersecurity is not only about technology; it’s also about behavior. Startups can reduce risks by creating a workplace culture where everyone understands their role in keeping data safe. That starts with leadership.

Founders and managers need to set clear rules about password management, data storage, and software updates. Regular reminders and simple training sessions go a long way. Encouraging open communication about suspicious emails or activities also helps detect threats faster.

When security becomes a shared responsibility, it feels like part of the company’s DNA rather than an afterthought. This mindset builds trust across the team and with customers as well.

4. Meeting Legal and Customer Expectations Around Data Protection

Today, customers expect their personal information to be safe. Governments are also enforcing stricter data protection laws. Even small startups must show that they follow basic security standards if they want to win contracts or partnerships.

If a startup handles customer payments or stores personal details, it must use secure systems. Being transparent about how data is collected and protected can make clients more confident. Many investors and partners now ask about security practices before making deals.

Startups that take privacy seriously early on will find it easier to grow in regulated industries and attract more business opportunities.

5. Reducing Risk by Tackling Human Error Early

Most cyber incidents don’t start with advanced hacking. They start with simple mistakes. Employees might click on a fake email, use weak passwords, or send data to the wrong person. These small actions can open the door to serious problems.

Startups can prevent many of these issues through early awareness. Training sessions don’t have to be complicated. A short meeting on how to spot phishing emails or how to create strong passwords can make a big difference. Encouraging the use of two-factor authentication and password managers helps too.

Leaders should also set an example. When management takes cybersecurity seriously, employees follow. Making cybersecurity part of regular discussions keeps it top of mind and builds accountability within the team.

A strong cybersecurity mindset doesn’t just protect a startup — it helps it grow. When teams plan for security early, they operate with more confidence and credibility. They can handle customer data responsibly, attract investor trust, and focus on innovation without constant worry.

The message is simple: it’s never too early to start protecting what matters most. A secure startup is a stronger startup, ready to face the digital challenges of the modern business world.

Why Businesses In Ireland Are Increasingly Investing In IT Support Services

In the modern business landscape, technology is no longer just a support function—it is the backbone of success. For businesses in Ireland, where digital transformation is accelerating rapidly, having reliable IT support services is crucial to staying competitive and resilient. From safeguarding sensitive data to ensuring seamless daily operations, professional IT support enables companies to focus on growth and innovation without being hindered by technical challenges. 

In this article, we are going to explore the various reasons why investing in IT support is essential for Irish businesses.

Strengthening Cybersecurity and Data Protection

Cybersecurity is a paramount concern for businesses worldwide, and Ireland is no exception. With cyberattacks becoming more sophisticated and frequent, companies face significant risks including data breaches, ransomware, and identity theft. Such incidents can lead to severe financial losses, legal consequences, and damage to brand reputation.

Professional IT support services like Hybrid TP provide businesses with robust cybersecurity measures designed to protect sensitive data and IT assets. These include firewalls, intrusion detection systems, antivirus software, encryption, and continuous monitoring to detect and respond to threats in real time. IT experts also conduct vulnerability assessments and penetration testing to identify and address security weaknesses before they can be exploited.

In addition, IT support providers help businesses comply with stringent data protection regulations such as the General Data Protection Regulation (GDPR), which applies across the European Union including Ireland. Compliance involves implementing appropriate security controls, conducting regular audits, and maintaining detailed records—all of which IT professionals can manage effectively. This not only mitigates legal risks but also builds customer trust by demonstrating a commitment to safeguarding personal information.

Cost Savings and Scalability

For many Irish businesses, especially small and medium-sized enterprises (SMEs), maintaining an in-house IT department can be prohibitively expensive. Hiring, training, and retaining skilled IT staff, along with investing in infrastructure and software licences, can strain budgets.

Outsourcing IT support to managed service providers (MSPs) offers a cost-effective alternative. MSPs provide access to a team of experienced professionals and the latest technology without the overhead costs associated with full-time employees. This model allows businesses to convert fixed IT expenses into predictable operational costs.

Furthermore, managed IT services are scalable and flexible. As a business grows or experiences fluctuations in demand, IT support can adjust resources accordingly. Whether expanding IT capacity during busy periods or scaling down during quieter times, this adaptability ensures that companies only pay for the services they need, enhancing financial efficiency.

Enhancing Operational Efficiency and Productivity

Technology underpins virtually every aspect of modern business operations. From managing customer relationships and supply chains to handling internal communications, IT systems enable companies to streamline workflows and automate routine tasks. However, these systems can be complex, and technical issues such as software glitches, hardware failures, or network outages can disrupt operations and reduce productivity.

IT support services provide businesses with the expertise needed to maintain and optimise their IT infrastructure. By offering rapid troubleshooting and problem resolution, IT professionals minimise downtime and ensure that employees can focus on their core responsibilities without unnecessary interruptions. Regular maintenance, including software updates and hardware checks, prevents unexpected failures and keeps systems running smoothly.

Moreover, IT support teams can advise on and implement automation tools and software solutions tailored to a company’s specific needs. This not only reduces manual workload but also improves accuracy and speeds up processes, contributing to overall operational efficiency.

Compliance with Regulations and Industry Standards

Irish businesses operate in a regulatory environment that demands strict adherence to data protection and IT governance standards. The GDPR, introduced in 2018, imposes rigorous requirements on how personal data is collected, stored, and processed. Non-compliance can result in hefty fines and reputational damage.

IT support teams help businesses navigate these complex regulations by implementing necessary technical controls and policies. They conduct regular compliance audits, ensure data is encrypted and access is controlled, and maintain detailed logs required for regulatory reporting.

Beyond GDPR, certain industries such as finance, healthcare, and retail may have additional standards and certifications to meet. IT support services provide the expertise to align IT practices with these requirements, reducing risk and enhancing credibility with customers and partners.

Proactive IT Management and Business Continuity

One of the greatest advantages of professional IT support is proactive management. Instead of waiting for issues to arise, managed IT service providers continuously monitor systems to detect potential problems early. This proactive approach reduces downtime by addressing vulnerabilities before they cause failures.

Proactive IT management also includes regular system updates, patch management, and performance optimisation. These practices keep technology current and secure, preventing compatibility issues and security breaches.

Business continuity is another critical area where IT support services add value. They develop and implement disaster recovery plans that ensure data is regularly backed up and can be quickly restored in the event of hardware failure, cyberattack, or natural disaster. Cloud-based backup solutions and off-site storage mean that businesses can recover swiftly, minimising operational disruption and financial losses.

Supporting Remote Work 

The COVID-19 pandemic accelerated the adoption of remote and hybrid working models, a trend that continues to shape the Irish business landscape. Remote work introduces new IT challenges, including secure access to company resources, reliable communication tools, and data protection outside traditional office environments.

IT support services enable businesses to implement and manage technologies that facilitate remote work. This includes setting up virtual private networks (VPNs) for secure connections, deploying cloud-based platforms for file sharing and collaboration, and configuring video conferencing tools to maintain communication.

By ensuring that remote employees have seamless and secure access to necessary applications and data, IT support helps maintain productivity and employee satisfaction. It also mitigates security risks associated with remote access, such as unsecured Wi-Fi networks or personal devices.

Gaining Competitive Advantage with Strategic and Thoughtful IT Planning

Beyond day-to-day technical support, IT service providers offer strategic guidance that helps businesses leverage technology for growth and innovation. They assess current IT infrastructure, identify gaps, and recommend solutions aligned with business objectives.

In a competitive market like Ireland’s, companies that adopt emerging technologies such as artificial intelligence, data analytics, and cloud computing can differentiate themselves. IT support teams facilitate this by managing technology integration, training staff, and ensuring systems are scalable and secure.

Strategic IT planning also involves budgeting for future technology investments and anticipating industry trends. This foresight enables businesses to stay agile, respond quickly to market changes, and seize new opportunities.

Conclusion

In an increasingly digital and interconnected world, IT support services have become a cornerstone of business success in Ireland. From enhancing operational efficiency and productivity to strengthening cybersecurity and ensuring regulatory compliance, professional IT support delivers tangible benefits that protect and propel businesses forward.

Cost-effective and scalable managed IT services provide flexibility for companies of all sizes, while proactive management and disaster recovery plans safeguard business continuity. Support for remote work and strategic IT planning further empower Irish businesses to adapt and thrive in a dynamic environment.

Ultimately, investing in robust IT support is not just about fixing problems—it is about building a resilient, innovative, and competitive organisation ready to meet the challenges of the future. For Irish businesses aiming to succeed in the digital age, partnering with expert IT support providers is an essential step towards sustainable growth and long-term success.

 

One in 10 admit to pirating content on their work devices

IT.ie, a leading Irish IT managed services company, is today urging SMEs to strengthen their cybersecurity defences as the deadline for the EU’s NIS2 directive approaches. The need for businesses to reinforce their cybersecurity measures is highlighted in research carried out by IT.ie and SonicWall, which found that one in 10 office workers have pirated content on a work device in the last year.

The research of 1,000 office workers based in Ireland was carried out by Censuswide on behalf of IT.ie and SonicWall, a global leader in cybersecurity innovation. The research emphasises the human role in cybersecurity breaches, as well as a discrepancy between vigilance at home versus in the office.

The majority (65%) of office-based employees said they used a work device for personal tasks in the last 12 months. Of these, 32% have used it for online shopping, 24% for accessing a personal social media account, and 17% for streaming movies and TV shows. Additionally, 9% have used it for gaming and 7% for gambling. Many of these figures are significantly higher for office workers aged 18 to 24. Of this age group, in the last 12 months, 36% checked their social media on a work device, 24% gamed and 17% pirated TV shows or movies.

The survey suggests that these extracurricular activities are more likely to happen when employees are working from home, with 53% saying they are more inclined to use websites and apps that are not approved by their employer when they work remotely. Furthermore, 64% said being in the office makes them more vigilant about cybersecurity. This may explain why 58% feel more exposed to cyberattacks when working remotely.

Despite this, 28% of office workers said they do not use a company-provided VPN (virtual private network) when accessing work systems remotely. In fact, 23% say their employer doesn’t have specific remote working cybersecurity policies at all.

The research comes as the latest NIS2 Directive deadline approaches, requiring EU member states to provide a list of organisations that will fall under it. It is expected that compliance will be costly, highlighting the financial burden of adequate cybersecurity for SMEs. To address this, IT.ie is launching CyberProtect, a multifaceted solution designed to make cybersecurity more accessible to SMEs.

Eamon Gallagher, founder and managing director, IT.ie, said: “As the EU-wide NIS2 Directive approaches, businesses are now facing the ever-present risk of cybersecurity attacks, along with the new risk of non-compliance with the Directive. Our research shows that human error – and simple human nature – remain significant risks to businesses. For example, we found that 46% of employees have viewed confidential work documentation in a public place in the last 12 months.

“Such practices should be addressed – and hopefully eliminated – with frequent cybersecurity training. But that must be backed up by combined measures that can help to protect a business if, and when, an employee does make an error. Employees are not acting maliciously, but they do make mistakes. This needs to be countered by simply making it impossible for employees to access pirate websites, gambling sites and many others using their work devices.

“Many SMEs struggle to implement comprehensive security measures due to financial constraints and poor availability of options. CyberProtect recognises this urgent need by making cybersecurity more accessible to businesses, regardless of their size. It is a comprehensive security stack that eliminates the need to deal with multiple vendors. With SMEs accounting for 99.8% of businesses here, we must ensure we do everything we can to protect them – and our economy.”

Stuart Taylor, Regional Director for Northern Europe, Sonicwall, said:

“These office behaviours, especially in hybrid or remote environments, highlight the importance of a layered security approach – one that extends beyond traditional perimeter defences. Solutions like SonicWall’s layered security architecture integrate advanced threat protection, cloud secure edge, zero-trust access, endpoint control, and secure mobile connectivity can help organizations protect every access point, whether in-office or remote.”

How Sports Apps Are Protecting Your Data And Safeguarding Against Security Breaches

With the new year comes the start of a new season for many of your favorite sports. Also new this year was the launching of many online Sportsbooks in a few states. Coincidentally, with the state of Massachusetts set to launch online sports betting next month, BetMGM Massachusetts will have all the best sign-up bonuses for those looking to try their luck when Ireland’s own Conor McGregor steps back into the octagon for the UFC later this year.

As such, it’s now much easier to bet on your favorite players and teams. However, for those experienced bettors who may be used to placing their physical bets at a casino or retail sports betting site, there may be a legitimate concern for the security of their personal data. The challenge now is to assure potential users that they can trust that their information is secure. 

Setting up an online account usually requires some transferring of information, at least enough to advance past its age restrictions. Alternatively, if an individual who wished to wager a sizable amount of cash were to do so at a casino, such information would not necessarily be compulsory. Also, many geo-tracking devices will prevent bettors from placing wagers outside their place of residence or registration. 

Prior to the legalization of sports betting, in many states, it has been stipulated that sensitive information should be encrypted by all applications that store personal data. This in turn helped to institute a foundation for mobile regulations relating to sports betting. 

 

One of the legislations stated by many of the sports betting apps is that a user’s account must only be funded through an electronic, bank-to-bank transfer only if the operator has appropriate internal controls to guard against payment frauds or breaches. Payments like these (ACH transfers) have to be processed through the Automated Clearing House.

In addition, even stricter measures have been put in place to shelter customers. As many casinos and sportsbook sites accept credit card transactions and save deposits for patrons, they are also expected to meet Payment Card Industry (PCI) compliance standards. This is an incentive so companies are encouraged to create a secure environment for credit card transactions. 

Online gaming businesses, as well as sportsbook operators, must comply with the Bank Secrecy Act and the other requirements outlined by the U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN). Under federal law, all casinos must file a Currency Transaction Report on single or multiple transactions (minimum of $10,000) by any individual on a single day. 

Usually, when a customer places a bet, the supplier may only receive a reference number to identify that particular transaction and basic information such as the user’s location. The remaining personal information is gathered by the sportsbook in order to build its customer database. A few sportsbooks also provide security to guard against user liabilities. For example, MGM guarantees its customers cannot lose more than $50 if they fall victim to any unauthorized monetary transfers or upon proof of identity fraud. The claims must be made within two days of the occurrence. 

All licensed sports apps are required by law to utilize the most updated encryption techniques. Most use Secure Socket Layer (SSL) to encrypt server-to-server communication. Sports apps are not exempt from this legislation, and as such, they may use SSL encryption and sometimes even offer password security in an attempt to further secure your information. 

However, although most sportsbooks around the globe use SSL encryption certificates to prevent breaches in transaction data, mobile sportsbook applications may not always offer this same feature. Hence, users need to remain aware of the APIs (Application Programming Interfaces) on their mobile platforms, as any app utilizing this feature can restrict the possibility of a breach during information transfers. Any application lacking this authorization may be susceptible to a data breach. 

Any sports app can be the target of a cyberattack, and as a result, these security issues can affect not only the established sports industry but the online sports industry as well. Users must also be vigilant in remaining aware of security measures and the steps to be taken if a data breach is suspected. The process of creating an account, performing a cash transaction, placing a bet, and cashing out should be as seamless and simple as possible. Anything otherwise may lead to possible scams or hacks. 

One of the top priorities of online sportsbook apps is to ensure that their users’ information is kept private because the reputation of the business depends on it. Users can remain confident that their information remains secure as long as the sport application has taken the necessary steps to guard against breaches in data. 

Laying the Foundations for a Cyber Resilient Future – Jason Ward, Vice President and Managing Director, Dell Technologies Ireland

With citizens, governments, and businesses more dependent than ever on digital connectivity, one of the most pressing sectoral issues for this decade is cybersecurity.

While this issue has been in the public consciousness for some time now, there is still a wide perception gap in Ireland between business leaders who consider cyber security a priority, and the lack of implementation of security strategies within their own organisations[1].

The reality is that cybercrime is showing no signs of slowing down, posing risks across all aspects of society. In 2021, ransomware attacks were up 150% and more than 80% of experts say this growth is now threatening public safety[2]. Here in Ireland, the Garda National Cybercrime Bureau has seen a significant increase in the number of ransomware attacks in 2021[3]. These statistics demonstrate the gravity and prevalence of cybercrime today. The question is, as we focus on global recovery, and a new era of economic growth, how do we protect against cyber threats?

In order to deliver on globally ambitious designs of digital inclusion, sustainability, improved health outcomes, defence, and much more for the economies of tomorrow; cyber resiliency is a key building block and enabler.

The adverse financial impacts involved with cybercrime are seismic, and unsustainable for economies to absorb long-term. It’s no secret that advanced technologies such as Artificial Intelligence (AI), Machine Learning (ML) and IoT are the key building blocks for future progress, but perhaps ironically, it’s these same technologies that can present new opportunities for cyber criminals.

The ultimate challenge will be securing such technologies and enabling more resilient, long-term solutions to the threats posed by cyber criminals. To make this vision a reality, the need for collaboration and support between the public and private sectors has never been more vital.

SME Cyber support vital for wider economy

Small and Medium-sized Enterprises (SMEs) are the backbone of local economies. Yet they increasingly find themselves the target of cyberattacks. Almost one in three small and medium firms in Ireland say they have experienced some form of cybercrime in the past year, according to an EU survey. Irish SMEs recorded above-average levels of incidents with ransomware compared to other EU countries[4].

It is essential that we work to support and protect such businesses, particularly as we look to build more resilient, balanced societies. SMEs, unlike other businesses, often require and are entitled to greater government support and nurture. Governments that recognise SMEs as integral to a truly flourishing society will empower and deliver the most economic progress. Helping these smaller organisations protect themselves against the ever-growing cybersecurity threat must be a priority for public sector recovery strategists, in the months and years ahead.

The convergence of proactive and reactive digital resilience strategy is now imperative across organisations, businesses, and industries – cybersecurity defences alone are no longer enough. Organisations need to integrate resilience into all areas of their businesses’ digital transformation planning and operations[5]. This will be a key focus of the Dell Technologies Forum, which we will be hosting at the Convention Centre on September 27th.

Public to Private Sector Empowerment

It is now more important than ever that public sector infrastructure empowers business resilience to help identify, protect, detect, respond, and recover from a cyberattack and enable a rapid return to fully functioning operations. Even with strong cyber defences in place, it’s impossible for companies to avoid all cyber disasters and their resultant, adverse impacts on data, privacy, and trust. Therefore, the key objective should be developing a cyber resilience strategy that can anticipate and quickly recover from significant disruption.

One essential component of such resilience is to create and implement thorough cybersecurity training exercises amongst workforces. This not only prepares employees to identify security risks and lures, but also heightens awareness and reinforces the need for teamwork, skills, and collaboration across the whole organisation.

From the development of a baseline security standard to be applied by all Government Departments and key agencies through to the creation of a Public Sector IT Security Forum to facilitate information sharing and support the deployment of the baseline security standard, it’s positive to see Government prioritise a top-down and unified approach to cyber security within our public services.

However, given the fast pace of digital transformation and the ever-evolving nature of cyber threats, there is a need to ensure even closer links between Government and industry so that Irish businesses and the public sector remain one step ahead of any cyber threats before they emerge.

As innovation transforms our economy, helping it to meet pressing challenges in areas ranging from education to justice to health, so too should our cyber resilience strategies be evolving to ensure the continuity of these vital services.

By adopting a proactive, collaborative and unified approach to cyber resilience, we can turbocharge our long-term economic prosperity and innovation, creating a more agile and resilient infrastructure that provides the digital defences crucial to modern Ireland’s recovery.

 To register for the Dell Technologies Forum on September 27th at the Convention Centre, visit: https://events.dell.com/event/14f9f60b-bbb9-4e58-bbef-ab6206452026/summary

Majority of Organizations Uncertain They Can Recover from a Ransomware Attack, Says New Dell Technologies Report

The Dell Technologies 2021 Global Data Protection Index (GDPI) findings reveal organizations are facing several data protection challenges driven by the constant threat of ransomware and the consumption of emerging technologies such as cloud-native applications, Kubernetes containers and artificial intelligence.

According to a recent IDC survey, more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months[i]. To help address these rising – and seemingly inevitable – issues, Dell Technologies is introducing new software and services to accelerate virtual machine (VM) backup data availability, simplify management of large data sets, and maintain business continuity while alleviating dependencies on day-to-day cyber recovery operations.

“While ransomware attacks can be devastating for people and businesses, accepting defeat as a foregone conclusion is not the answer,” said Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies. “We understand the stakes have never been higher, and the task of protecting data has never been more complex. As the leading provider of data protection hardware and software, our portfolio addresses this growing challenge by helping customers adopt a holistic cybersecurity and data protection strategy to identify, protect, detect, respond and recover from ransomware and other cyberattacks.”

New GDPI findings reveal increased state of complexity around data protection

The 2021 Dell Technologies GDPI survey of 1,000 global IT decision makers shows organizations are combatting continued data growth and increased data protection complexities. The study found that organizations are managing more than 10 times the amount of data than they did five years ago – from 1.45 petabytes in 2016 to 14.6 petabytes in 2021. Additionally, 82% of respondents are concerned their organization’s existing data protection solutions won’t be able to meet all future business challenges. These concerns are well-founded, with more than 30% reporting data loss in the last year and nearly half (45%) experiencing unplanned system downtime.

GDPI findings include:

  • Sixty-two percent are concerned their existing data protection measures may not be sufficient to cope with malware and ransomware threats, while 74% agree they have increased exposure to data loss from cyber threats with the growth of employees working from home.
  • Over two-thirds (67%) lack confidence that all their business-critical data can be recovered in the event of a destructive cyberattack or data loss.
  • Sixty-three percent believe emerging technologies—such as cloud-native applications, Kubernetes containers, artificial intelligence and machine learning pose a risk to data protection, and the lack of data protection solutions for newer technologies was one of the top three data protection challenges for organizations.
  • On average, the cost of data loss in the last 12 months is approaching four times higher for organizations using multiple data protection vendors as compared to those using a single-vendor approach.

 

Delivering comprehensive data protection and trusted cyber resiliency

Dell Technologies is addressing the ever-evolving IT landscape with solutions that help organizations protect traditional and modern workloads with a singular approach. A leader in multi-cloud data protection, Dell protects about seven exabytes of data across all major public cloud providers.Through constant innovation, agile engineering and tight integration with VMware and other industry leaders, Dell continues to be the leading provider of data protection appliances and software globally.Dell offers one of the industry’s most comprehensive portfolios for cyber resilience at the edge, core data centers and multi-cloud environments, delivered with solutions such as Dell EMC PowerProtect Cyber Recovery and Dell EMC PowerScale with Superna Eyeglass Ransomware Defender.

New software and managed services offerings include:

  • Dell EMC PowerProtect Data Manager adds Transparent Snapshots to give organizations a new and unique way to help protect their VMware VMs at scale. By simplifying and automating VM image-level backups and requiring less infrastructure, Transparent Snapshots deliver up to five times faster backups and up to a five-time reduction in VM latency iv, helping organizations ensure availability of VM data effectively and efficiently.

  • Dell EMC PowerProtect appliances with Smart Scale helps organizations manage multiple data protection appliances at exabyte scale, allowing IT staff to make informed decisions about their capacity needs and keep up with data growth. With Smart Scale, customers can configure multiple appliances as a single pool giving them the ability to see and manage large data sets in one entity—as many as 32 PowerProtect appliances and more than three exabytes of logical capacity. Organizations can maximize resources and save costs with proactive monitoring and simplified management of backup data.

  • Dell Technologies Managed Services for Cyber Recovery Solution helps organizations drive consistent operations and reduce risk of data loss by having Dell experts manage day-to-day cyber recovery vault operations and support recovery activities. These managed services build on Dell’s portfolio of cyber recovery consulting, deployment, and support services, helping customers protect and manage this critical capability.

“Transparent Snapshots in PowerProtect Data Manager simplifies backing up our virtual machines using less infrastructure and without impact to the production environment. By removing the need to deploy or manage proxies to move data, our virtual machines can be backed up faster, saving us time,” said Drew Hills, infrastructure analyst, IT Systems, Information Technology, USC Australia.

“We are pleased to see Dell Technologies deliver the Transparent Snapshots innovation in PowerProtect Data Manager to help our mutual customers simplify and speed data protection,” said Lee Caswell, vice president, marketing, Cloud Platform Business Unit, VMware.

As ransomware and other cyberattacks continue to evolve so does the need to outpace these threats with innovation,” said Phil Goodwin, research vice president, IDC. “Dell Technologies’ new advancements in software and services are designed to help organizations increase their ability to recover business critical data from a cyberattack with the least amount of disruption.”

 

Availability

  • Dell EMC PowerProtect Data Manager with Transparent Snapshots will be globally available this quarter at no additional cost to customers with existing maintenance contracts.
  • Dell EMC PowerProtect appliances with Smart Scale is in technology preview today and is expected to be globally available in 1H 2022.
  • Dell Technologies Managed Services for Cyber Recovery Solutions are available globally today.

Irish Businesses Held to Ransom; 41% of Irish Businesses Suffer Cyber Attack. #cyberattack #ransomware

A recent global report by Hiscox Insurance has found that 41% of Irish firms had experienced at least one cyberattack event in a six month period from September 2019 to February 2020. These are among the findings of a study of 5,569 companies across eight countries that was commissioned by insurer Hiscox, which includes Irish data for the first time.

 

The report revealed that 6.5% of Irish firms paid a ransom following a ransomware attack.

The total cost of cyber incidents and breaches among the 335 Irish companies in the Hiscox Insurance study group was over €113m, the second lowest total of the eight countries surveyed. Despite this, of the 125 Irish companies that suffered a cyber breach, Ireland also had the highest median cost (€91,860). One Irish company suffered total cyber losses of €17.8m, with the largest single event costing approximately €4.5m.

 

The most heavily targeted sectors were financial services, manufacturing and technology, media and telecoms with 44% of firms in each sector reporting at least one incident or breach.

The Hiscox Cyber Readiness Report, now in its fourth year, surveyed a representative sample of private and public sector organisations in the US, UK, Belgium, France, Germany, Spain, the Netherlands and Ireland. Each firm was assessed on its cyber security strategy and execution, and ranked accordingly.

Irish companies are ahead for most cyber spending categories for the coming year, and by some margin, in enhancing disaster recovery capabilities, improving the security of customer-facing services and apps, and enhancing top management engagement in cyber policies and procedures.

 

Ireland also tops the table for the percentage of companies expressing confidence in their IT and security readiness (70% and 66% respectively). They are also most likely to have a standalone cyber insurance policy (38%).

Patrick Mettler, Head of Sales and Distribution for Hiscox Insurance Ireland said; “To have an Irish snapshot in the Hiscox global survey on Cyber Readiness gives us a great insight. It is shocking to see so many Irish companies suffering a cyber attack and likewise the number of businesses that have paid a ransom following a malware infection is chilling. 

There is, however, one very positive message from this year’s report. There is clear evidence of a step-change in cyber preparedness, with enhanced levels of activity and spending. Take-up of standalone cyber insurance remains patchy, but this report is a reminder that firms are many times more likely to have a cyber incident than either a fire or a theft – for which most automatically insure.” 

 

The global picture for Cyber Readiness is a lot more encouraging. While losses increased, the proportion of businesses targeted fell from 61% to 39%. Cyber losses among businesses targeted in the past year have risen nearly six-fold, from a median €8,900 per firm to  €50,732. But there are signs that firms are responding with more rigorous security measures and higher spending, to combat the loss, which increased by 39%.

 

Key Findings:

  • 335 – number of companies surveyed in Ireland

  • 41% of Irish Firms reported at least one cyber event in the last 6 months

  • 6.5% or 22 firms paid a ransom following a ransomware attack

  • The total cost of all cyber incidents and breaches among the 335 Irish companies was €96million

  • The largest Cyber incident or breach reported cost the firm approximately €4.5 million

  • Irish firms were ahead of the rest in terms of spending on Cyber protection

  • On average, Irish businesses spent 13% of their IT budget on Cyber Security

  • One quarter of firms (24%) ranked as Cyber readiness experts and are most likely to have either a dedicated head of cyber security or a dedicated team (89%)

  • 38% of firms say they have specialist cyber insurance cover

  • 18% of businesses responded with ‘don’t know’ when asked if they had experienced a Cyber event.

  • 5% of businesses stated they do not back up their critical data.

 

Global Key insights;

 

  • 5,569 professionals responsible for their organisation’s cyber security strategy were surveyed

  • The number of firms affected by a cyber event this year fell considerably, from 61% to 39%

  • Total cyber losses among the affected firms were $1.8 billion – up from $1.2 billion the previous year

  • More than 6% of total respondents paid a ransom to an attacker. Their combined losses came to $381 million.

  • Firms increased their cyber security spending by 39%. Expert firms spent more and plan to go on doing so

  • 15% of businesses reported difficulty attracting new business, following a cyber crime incident

  • Twice as many firms responded to a breach by adding new security and spending more on employee training

The Hiscox Cyber Readiness Report 2020 can be accessed at www.hiscoxgroup.com/cyber-readiness from 22 June 2020.

How to create an effective business continuity plan. #Business #IT #CyberAttack #DisasterRecovery

Business continuity plans have come to mean instructions or procedures any business should follow in the face of a successful ransomware or other cyberattack. Although IT issues are often the most debilitating when it comes to getting things back to normal, ‘business continuity’ anticipates and includes responses to other disasters, like fire, flood and theft, too.

There are business processes, partners and suppliers, human capital, data and other assets to protect in the event of a disaster. While each dark episode in the life of a company will be unique in certain aspects, enterprise can avail itself of an essential toolkit – the business continuity plan – when things go wrong. Always variable and often unexpected, business calamities demand a strategy for the maintenance of business as usual, regardless of how unusual circumstances might be in the moment.

That strategy will optimise continuity and minimise negative implications, resulting in an overall minimisation of longer-term repercussions on business profitability. It’s often grisly and as often demanding of sudden decisions that are extraneous to the core plan, but the core plan is essential as a guidebook for the promptest and least stressful restoration of business, in order to maintain cash flow and overall profitability. Force majeure events (the Covid 19 lockdown is a classic example), physical destruction or damage to business premises, or a wholesale sacking of company data are all events capable of ending business for good. The stakes are high, and the fittest companies have a ready template of action for such dark moments.

Business continuity plans and Disaster Recovery (DR)

Disaster Recovery (DR) centres on restoring IT systems after a ransomware or other cyberattack. Often confused with a business continuity plan, DR protocols may well be the most important component of a business continuity plan, yet they remain but one component of an overall plan.

 

With that said, it’s common to modern enterprise that almost nothing can be resolved without IT in place and running smoothly, hence the need to develop a reliable business continuity plan template with IT support well ahead of time. Business continuity is absolutely essential to map out while it’s still completely unnecessary. On the plus side, IT architecture lends itself to backup and security, and with typical Irish zeal and prowess in the arena, a detailed and ultimately successful continuity plan with adept DR protocols can be effectively formulated ahead of any possible disaster.

IT considerations for a business continuity plan

  • Storage. Where and how is data stored? What are the alternatives on access and/or storage if that particular access door closes? A company needs to know exactly how it will access what data it needs to roll on without hiccupping in the event of a complete denial of access or loss (removal) of working data.

 

  • Who are the key personnel in making IT continuity happen, and what are their responsibilities? It might seem a stupid question, but do they then have the authority or clearance (with accompanying credentials) to act on their responsibilities? Disaster recovery is a moment of unusual trust and professional performance – everyone needs to understand that, be equipped, and up to the task.
  • In the event of hardware damage or loss, where are new machines coming from, what or how much is needed to tie them into current daily operations, and what aspects of the current IT system or systems might snag on replacements of this nature?

Some broader considerations for business continuity plans

  • Manufacturing, sales and deliveries or service provision, as well as HR considerations feature in any decent business recovery template. How will normal comms evolve (or dissolve) during recovery? Would majority remote work be best, or perhaps a secondary location should be established that ultimately costs less and facilitates more in the event of a calamity? What functions can be contracted out?

 

  • To answer all the above questions, a business impact analysis will have been tabled and tested for validity way ahead of genuine disaster striking a company. This analysis will identify the most crucial aspects to maintain business continuity. A business impact analysis acknowledges vulnerabilities and doubles down on safeguarding these, while also looking at cost implications on all aspects of the business – what it will cost to put in place and what it might cost when absent. Generally, the latter costs a whole lot more in a typical disaster scenario.

Testing, testing, one two three

Disaster Recovery may be well-sorted by IT support in the event of catastrophe, but any successful, comprehensive business continuity plan has to factor in what happens with people and processes, too. Quite remarkably, the way in which a company performs under such adversity can often enhance client relations and go towards an overall greater profitability in the future. If ever there was a test of a business’ professionalism and real caring, it’s what it does and how it handles its clients in the event of disaster.

Effective disaster management can elevate a company’s reputation and generate an immense amount of goodwill, too. Being prepared and making the best of getting back on track can increase any company’s listed market value, plus boost customer numbers and overall confidence.

Such effective behaviour must include testing. Testing of a mock wholesale collapse of systems, testing of alternative (disaster) protocols, and testing of everyone’s ability to keep the wheels turning in a trial scenario. It might seem silly when everything is going well – much like those school drills that practise fire alarm responses – but testing a business continuity plan is as essential as formulating it in the first place. Companies that discover gaps in their contingency plans while suffering catastrophe are unlikely to be around afterwards. Testing allows for improvements and the fine tuning of the continuity strategy details. 

The business impact assessment informs the drafting of the business continuity plan. That plan contains the DR component and goes on to address all aspects of the business. And it’s in the testing – regularly and repeatedly – that an enterprise will ready itself to survive even wholesale shutdowns or failures, and go on to a better future.