Cyber Resilience for SMEs: A Chat with DeltaXML’s Systems Administrator

In the age of digitalisation, ensuring digital security is a concern shared by businesses of all sizes, ranging from start-ups to established enterprises. As we navigate the digital landscape to establish and promote our presence, we unintentionally generate a significant amount of personal data. Mishandling this data could have serious consequences. In a recent discussion, we sat down with Peter Anderson, DeltaXML’s IT System Administrator, to assess potential risks to the company and discuss practical measures for securing our critical information.

Q. What are the key threats to national security currently faced by businesses such as ourselves?

A. As part of our responsibilities as an ISO 27000 certified company, we are obliged to be aware of several key threats that could apply to national security.

Firstly, we have your common old garden Cyber Security Risks. The ever-evolving nature of cyber threats poses a continuous challenge. Cybercriminals may employ sophisticated techniques such as ransomware attacks, phishing, or exploiting vulnerabilities in the supply chain’s digital infrastructure. Maintaining robust cybersecurity measures is crucial to counter these threats.

For a company like ourselves, the Supply Chain can be a source of vulnerability. Ensuring the security of components, monitoring for vulnerabilities, and promptly addressing any issues is crucial to prevent security breaches that could have cascading effects on our software and, by extension, national security.

Finally, (or at least for this answer, in the real world this response could go on and on) insecure coding practices or inadequate security testing can introduce vulnerabilities into our software. This not only puts our products at risk but also jeopardises the trust of our clients. By using secure coding standards, conducting regular security audits, and promoting a culture of security awareness among the DeltaXML team are critical measures.

Q. What measures are in place to secure critical information and why?

A. In our commitment to ensuring robust cybersecurity, several measures are in place to secure critical information, each serving a specific purpose in fortifying our defences.

One of the most important things that we can do to secure our data, is to recognise that human error can be a significant factor in cybersecurity incidents, we conduct regular awareness training for all staff members. This training covers best practices, security policies, and the latest threats and tactics employed by cyber adversaries. By educating our team, we enhance their ability to identify and mitigate potential security risks, contributing to a more resilient security posture.

Following on from this, where possible, throughout the business we adopt the Principle of Least Privilege (PoLP) This principle ensures that individuals are granted the minimum level of access required to perform their specific job functions. By restricting access rights to the essential minimum, we reduce the risk of unauthorised access and limit the potential impact of security incidents, enhancing overall system security. This in turn leads to periodic access reviews and audits to assess and validate user access privileges. This proactive approach allows us to identify and rectify any discrepancies or unauthorised access promptly.

It would be remiss of me to close this answer off without mentioning that we enforce the use of strong, complex passwords to protect access to our systems. Additionally, where available Multi-Factor Authentication (MFA) is implemented and used. MFA adds an extra layer of security by requiring users to authenticate their identity through multiple means, such as a password and a temporary code sent to a mobile device. This significantly reduces the risk of unauthorised access, even if passwords are compromised.

Q. What steps can citizens take to contribute to national security?

A. My answer to this doesn’t stretch much further than stay informed, practice good cyber security and embrace education and awareness and report any suspicious activity.

For my part, I encourage DeltaXML staff to practice the same steps in their personal lives. I’m sure they will all tell you about me banging on about secure passwords, MFA and not clicking on links!

To close out, I would encourage everyone to spread awareness and learnings. If you have a or friend relative that is less tech savvy then help them navigate the murky waters that can befall them.

About Peter Anderson

With over 18 years as an IT Systems Administrator, Peter Anderson has continually demonstrated a remarkable ability to navigate and elevate every facet of IT operations. His expertise encompasses a broad spectrum, including adept Windows Server Administration and Maintenance, virtualisation environments management, proficiency in Microsoft SQL Server, and strategic networking enhancements. Pete’s pivotal role in system updates, migrations, and certifications, such as Cyber Essentials Plus, showcases his commitment to maintaining the highest standards of security and compliance.

About DeltaXML

DeltaXML stands at the forefront as a global leader in crafting cutting-edge software tools dedicated to change-control and version management. Renowned for their precision, our tools adeptly identify, merge, process, and synchronise changes within XML and JSON data and documents. Trusted on a daily basis by entities spanning governments, banks, aircraft manufacturers, and the defence industry, where uncompromising accuracy is paramount, DeltaXML delivers solutions that transcend expectations. Not only does DeltaXML excel in this niche, but we are also a leading provider of XML and document comparison solutions. Rooted in our mission to empower organisations, our tools elevate document integrity, streamline processes, and ensure the highest quality in document transformation and management.

Keep Reading

How Move Detection Improves Document Management

Learn how move detection technology improves document management by accurately tracking relocated content.

Streamlining Data Syndication in PIM Systems through JSON Comparison

Utilise JSON comparison to reduce errors, labour costs, and system downtime.

Move detection when comparing XML files

DeltaXML introduces an enhanced move detection feature that provides a clearer insight of how your content has changed.

Introducing Character By Character Comparison

Find even the smallest differences in your documents with speed and precision with character by character comparison.

Tackling Tracked Changes & Overcoming Hurdles in Managing Large Document Revisions

Managing large document revisions is challenging with tracked changes.

Effortlessly Manage Known Differences During Conversion Checks

Focus on unknown differences with DeltaXML's new ignore change feature for ConversionQA.

Simplifying Your JSON Management Experience with DeltaJSON

DeltaJSON simplifies JSON data management with the introduction of an NPM package.

Cyber Resilience for SMEs: A Chat with DeltaXML’s Systems Administrator

Peter Anderson, IT System Administrator, relays the importance of cyber resilience for SMEs.

S1000D and Beyond: Navigating the Skies of Aviation Data with XML

This blog explores the significance of XML in aviation data management, highlighting standards like S1000D.

Never miss an update

Sign up to our newsletter and never miss an update on upcoming features or new products