Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

‘Tesco Bank hacking is a warning to all businesses’

Thousands of Tesco Bank accounts were reportedly affected by apparent fraudsters
Thousands of Tesco Bank accounts were reportedly affected by apparent fraudsters

Tesco Bank’s online hacking attack has prompted the boss of a north-east IT firm to issue a stark warning that cybercrime must be taken seriously by businesses of all sizes.

Austen Clark, managing director of Clark Integrated Technologies, based at Auchterless, between Fyvie and Turriff, said small and medium-sized enterprises were just as vulnerable as big companies.

The “fast-paced and ever changing nature” of information technology mean new online risks are emerging all the time, Mr Clark said.

He added: “There is a serious and important message for companies of all sizes that store and handle personal data. People’s personal information must be securely protected at all times.

“It’s time for small businesses to sit up, appreciate the potential severity of cyber-attacks and implement good risk management.”

Cloud computing and an increase in home-working have led to more data being stored electronically and in remote locations.

Mr Clark said: “We’ve observed that attackers are exploiting the new opportunities that these new ways of working creates.

“Hackers are now aware of your weakest locations, such as off-network devices and remote offices, and they now target specific systems and users.

“They have the patience to acquire multiple footholds … and are more motivated and sophisticated than ever.

“Data has been the driving force behind the latest attacks and is viewed as the world’s newest currency.”

He advised businesses to increase their online security by securing IT, using up-to-date malware protection, managing user privileges, educating workers and raising awareness to of good practice.

Some of the most basic measures for businesses include:

• Allowing your software and applications to be updated as soon as possible. Updates often contain vital security information to protect your devices from new threats.

• Never use obvious passwords like “password”. Add symbols and numbers and a mix of upper and lower case letters to ensure a strong password.

• Delete and block suspicious e-mails and never open attachments or follow links contained within.

• Don’t forget smartphones and tablets are at just as much risk from viruses and other forms of malware as computers. Install anti-virus protection, keep it up to date and use it regularly.

• Educate your staff on the dangers of cybercrime, both to the business and them – and encourage people to use best practice

Mr Clark said: “The internet brings huge business opportunities but it also brings risks and businesses face cyber-attacks every single day.”