What Should My Business Do During a Cyber Attack?

Updated: 10 Dec 2023

microsoft logo
microsoft logo
WatchGuard logo
cisco logo
vipre logo
Investors in people logo
VMware logo
Tech Data logo
Veeam logo
SkyKick logo
Eset logo
Dell logo

With 50% of UK businesses experiencing a breach or attack in the last 12 months, according to the UK government’s 2024 cyber security breaches survey, it’s clear cyber threats are far too common, with both small businesses and larger enterprises at risk.

Cyber attack protection for businesses

This highlights the need for robust cyber security solutions and protocols, to defend against emerging threats and protect critical data.

There is plenty of free online training and advice available on what to do in response to cyber attacks. But what should you do during an attack?

It can be a frightening experience. While you’re unlikely to have time to read articles like this during a live attack, preparing now – by learning how to react – can be a vital step in protecting your business and minimising damage.

At Netcentrix, we’ve helped countless businesses defend themselves against criminals seeking to steal financial and other vital data, and wreak havoc. Speak to us about tackling cyber security risks today, or keep reading to find out more.

How Can You Tell A Cyber Breach is Happening?

How can you tell a cyber breach is happening?

Given that cyber attacks can take many forms, it’s not always easy to identify when one is occurring. Many businesses don’t realise anything has happened until the damage has been done.

That said, there are a few signs you can look out for to help spot a potential cyber attack:

  • Changes in Your Browser

If a cyber criminal has managed to breach your system, they may install nefarious add-ons within browsers like Google Chrome to monitor your activity and steal data. Alternatively, you may notice that your default browser has changed without explanation. Both can be signs of suspicious activity.

  • Locked Accounts and Password Reset Emails
Locked passwords during cyber attack

Many of us have received emails on personal accounts notifying us that someone is trying to log in from another device. Employees at a business under attack may receive similar notifications, which could indicate a criminal launching an assault on employee profiles.

Alternatively, a worker may arrive one morning to find they’ve been logged out of their email accounts (and similar) with the passwords changed.

  • Multiple Phishing and Smishing Attempts

Rather than using complex methods to breach employee accounts, a criminal may attempt phishing, trying to trick employees into handing over sensitive login information by disguising themselves as a colleague. This is one of the most common types of cyber attack.

If you see a large number of phishing emails arriving in quick succession, it could indicate a coordinated cyber attack.

These criminals may also attempt smishing, which is the same method as phishing but applied to text messages and messaging applications.

  • Unauthorised Payments

When criminals gain access to a network or sensitive data, many will focus solely on financial gains, with company bank accounts being targeted. So be sure to respond to any unrecognised or unusually large transfers immediately.

Cyber attack financial losses
  • Spontaneous Data Loss

If you wake up to find hard drives and spreadsheets have been emptied of essential company data, your systems may have been accessed by a criminal overnight. They may have downloaded the data before wiping it in an attempt to sell it back to you.

  • Slow-Running Systems

If your business is used to enjoying fast and reliable devices, along with a speedy internet connection, a sudden slowdown in either of these elements could indicate a criminal intentionally causing problems to disrupt operations.

  • Unusual Network Traffic

When connections to your network and devices are suddenly being made from unexpected locations – away from your premises or known remote working locations – this could mean that someone from outside your organisation has successfully breached your systems.

These are just some of the signs of an ongoing cyber attack. For more advice on ways to stay alert and defend yourself against such incidents, speak to Netcentrix today.

Ways to Mitigate the Effect of an Ongoing Cyber Attack

  • Shut Down the Network and Devices

Because cyber criminals typically attack systems via an internet connection, they require access to your network and devices. This isn’t possible if they don’t have a network to connect to.

So, when you realise your company is under attack – based on the red flags mentioned above – your first step should be to disconnect your devices immediately by shutting down your network connection.

Essentially, this cuts off the bridge between the attacker and your systems. Before turning anything back on, you should consult your in-house cybersecurity expert, or hire a third-party expert if necessary, to ensure your next steps are safe.

Depending on the nature of the attack, it may be necessary to reset both your network and devices to ensure all traces of the attacker have been removed. This will be discussed in detail with you.

  • Check All Cyber Security Tools for Alerts

If your company already uses various cybersecurity tools, such as antivirus software, firewalls and VPNs, these should detect any anomalies in your network activity.

Cyber security tools against cyber attack

If abnormalities are detected, such software should alert users immediately, so quick and appropriate action can be taken to eliminate the threat. However, for this to be effective, notifications must be enabled. Make sure these alerts haven’t been accidentally switched off if you suspect an attack.

  • Change Passwords Immediately and Check Device Logins

If you’re concerned that one of your devices, tools, or systems has been breached, change the passwords immediately.

If you use a password manager application (assuming it hasn’t been compromised), you can do this in bulk, saving time and reducing the chance of other accounts becoming compromised.

You can also check the login data for signs of unauthorised access. If you see login attempts from unfamiliar locations, be sure to log out of all devices and change the passwords as quickly as possible.

  • Turn on Multi-Factor Authentication

Multi-factor authentication has proven to be an invaluable tool in the fight against cyber criminals, forcing someone to prove their identity by confirming it on a separate device – usually on mobile devices.

Multi-factor authentication against cyber attacks

Without this secondary confirmation, the chances of a criminal successfully breaching your systems are much lower. So, if you receive emails or notifications of multiple unauthorised login attempts, ensure multi-factor authentication is enabled on all accounts you need to protect.

Looking for the Best Cyber Security for Business? Choose Netcentrix

Concerned your business is vulnerable to a cyber attack? Worried about what you’d do if faced with an online assault? Netcentrix can offer comprehensive cyber security solutions, giving you the defences you need to deter attacks and protect sensitive data.

As an approved Microsoft partner, you can trust us to install security solutions and apps that are fully vetted and up-to-date, to repel oncoming attacks, keeping your systems safe at all times.

Cyber security to cyber attacks- Netcentrix

When partnering with Netcentrix, we will perform an in-depth analysis of your systems and working practices, so we can deliver bespoke tools and solutions.

Plus, with round-the-clock technical assistance available, you can be sure you’ll always have expert advice whenever you need it.

To find out more about our cyber security solutions for businesses, speak to a Netcentrix cyber specialist today.

CONTACT

Author

  • Liv Appleton

    Technology Content Marketing Executive, Liv, joined the team in 2021, as our technology copywriter, before progressing to her current role as our Content Marketing Executive in 2022. Liv has a strong background in the field of technology and leverages deep industry knowledge across a range of topics to create informative, insightful, and educational content to guide businesses towards effective technology adoption. Liv is committed to bringing up to date information on the latest technology, reporting on industry trends and providing advice to empower customers to make the most of everything their technology solutions have to offer.

    View all posts

Speak To A Netcentrix Agent Today!

Empower your business with cutting-edge technology solutions. 

Take the next step towards success – fill out our contact form now and let our expert team tailor a solution for your unique needs.

Other Queries

For any other queries or questions, please contact us on the following

    By submitting this form, you are consenting to be contacted by phone or email by Netcentrix and all Netcentrix associated companies. Netcentrix is committed to protecting and respecting your privacy and will only use your information to market relevant services or products to you. To view our Privacy Policy click here.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Useful Resources

    Disaster recovery vs Business Continuity
    IT Services
    4 Feb 2025|Liv Appleton

    Disaster Recovery and Business Continuity: What’s the Difference?

    For businesses of all sizes, the ability to quickly recover from unexpected disruptions is crucial....
    Cloud storage for hybrid workers
    Cloud Services
    10 Jan 2025|Liv Appleton

    The Advantages and Disadvantages of Cloud Storage

    According to data from infrastructure experts Thales Group, over 60% of global corporate data is...
    ISO Certifications for Cyber Security
    Security
    3 Jan 2025|Liv Appleton

    Which ISO Certifications Should My Cyber Security Provider Have?

    Choosing a trusted cyber security provider is crucial for safeguarding your business. With countless providers...

    Get In Touch Today.

    To find out more or to talk to one of our experts, contact us today.