Oyster Bay Systems has recently launched
OysterCare, a multi-discipline IT consultancy service providing
network security.
The launch of the new system coincides with a
rise in cyber attacks that are costing companies billions of pounds
each week, according to Michael Breach, managing director of Oyster
Bay.

Only 35 percent of small to medium-sized enterprises have a
comprehensive disaster recovery programme in place.

Half of all companies that lose their data go out of business
overnight and some 90 percent are reported to not survive more than
two years.

Breach said that hardening a company’s systems can be expensive,
but leaving them open to attack is, sooner or later, going to be
more expensive – as well as potentially catastrophic to a
business.

“If you have an internal IT team some measure of protection can
be gained,” Breach said. “But be mindful that fraud is often
perpetrated by people inside the circle.

“It is wiser to employ an external agency to give an independent
view of your vulnerabilities.”

He added: “If you have never encountered a disgruntled employee,
or you simply can’t understand why anyone would want to target your
installation, then you need to know that many attacks on internet
and network systems are not aimed at specific organisations.

How well do you really know your competitors?

Access the most comprehensive Company Profiles on the market, powered by GlobalData. Save hours of research. Gain competitive edge.

Company Profile – free sample

Thank you!

Your download email will arrive shortly

Not ready to buy yet? Download a free sample

We are confident about the unique quality of our Company Profiles. However, we want you to make the most beneficial decision for your business, so we offer a free sample that you can download by submitting the below form

By GlobalData
Visit our Privacy Policy for more information about our services, how we may use, process and share your personal data, including information of your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.

“A mass broadcast can use unprotected systems as staging posts
to reach other vulnerable systems, making it more difficult to
detect the originating criminal, while at the same time
exponentially increasing his chances of successfully hitting a soft
target.”

Breach advocates a business continuity plan should be drawn up
to ensure companies are prepared for a worst-case scenario.

“The plan,” he said, “should be short and readable but must be
rigorous.”