Cyber-attack

Three Warning Signs your Company May Have Been a Victim of a Cyber-attack


Cyber-attacks have become increasingly common across industries, throughout the world. If you do a quick Google search, you will be able to identify the latest high-profile victims of cyber-attacks. But it’s not just global corporate giants that fall victim to cyber-attacks. A study from Hiscox showed that half of all small businesses suffered a cyber-attack in 2018.

As businesses of all sizes continue to operate remotely or using a hybrid model, there is an increased chance of your business falling victim to a cyber-attack. These type of breaches can lead to data being stolen or encrypted, funds being misappropriated and disabled computers leaving employees unable to work.

These attacks have grown significantly sophisticated and can initially go undetected by businesses. A study conducted by RiskBased identified that in the first half of 2020, over 36 billion records were exposed by data breaches. You need to understand the early warning signs so you can implement solutions to ensure you limit the damage caused.

Here are some of the signs that could mean your company has fallen victim to a cyber-attack:

Suspicious Emails

If your emails have just been compromised, hackers may contact your clients, suppliers or your internal team seeking confidential information. In some instances, clients may contact your business to notify you that they have been receiving unusual emails from a company address.

Similarly, an email may be sent between employee emails requesting payments be made to third parties. Hackers can monitor emails sent through internal accounts and identify those who are responsible for making payments. These ‘man in the middle’ attacks facilitate information being gathered through external intelligence.

What to do next:  

Do not provide details for any unauthorised payments. Contact your secure IT provider for further assistance.

Unusual Account Activities

Before, during or following a cyber-attack, issues with account users may arise. These may be identified through accounts being locked frequently, indicating that hackers are trying to brute force a login. Unusual admin account activities such as log-ins at odd hours could signify that the system has been infiltrated. Network event logs itemise activity on servers and desktops – examining these will indicate odd activity.

What to do next:  

If you begin to notice these issues arising within your business make note of the times and contact your IT service provider who will be able to identify the cause and ensure your data remains protected in future.

Slow Speeds

A slow network or internet connectivity may indicate that data is being copied to an external location. This coupled with anti-virus warnings on staff desktops, laptops and company servers may suggest that your business is experiencing a cyber-attack.

What to do next:  

Contact your IT provider for further assistance.

Cyber-attack

These are just some examples of what can occur during the early stages of a cyber-attack. For more on how to identify, mitigate and manage these risks, contact Radius today email sales@radius.ie or contact us here


Call our sales team now on LoCall 0818 592500.

Alternatively, please send us a message via the form below and we’ll call you back.

Get in Touch

Certified Excellence


Radius maintain both ISO quality and Information Security certification. With GDPR regulations now in force, it’s critical that your IT partner handles your organisation’s sensitive data with the highest of standards.

ISO Quality and Information Security certification requires rigorous processes to be embedded at the heart of everything we do. Radius is proud to maintain this standard, awarded to only the very top tier of IT service providers.

Industry leading partnerships

Radius is a gold Microsoft partner for Datacenter and Cloud Solutions, a preferred HP and Cisco partner and a Retail Excellence Ireland gold partner. These partnerships give us unrivalled access to the best technology to support our clients’ IT and Telecoms needs.