The Delivery Group prides itself in its innovative customer interfaces.
Our Group operate bespoke IT systems delivering outstanding services to our clients. These have to be robust, agile and open in order to interact with WMS, and other order processes.
We use many solutions on a daily basis to help protect our systems and our customers from ransomware attacks during IT downtime. Good practice and protocols are key to the success of our business and the way we operate.
Our infrastructure is high availability with multiple cross site replication, we have multiple firewalls and have deployed server and local copies of antivirus software to ensure that remote and office workers have the same level of protection. Our businesses take IT and physical security very seriously. We are ISO27001 accredited and hold Cyber Essentials Plus within The Delivery Group. We utilise private cloud technologies and physical on site server cluster’s protected with the latest definitions of antivirus and firewalls.
Communication is key to prevent attacks, as we must educate all our staff to identify a hoax or a malicious email or website, this is done by simply reminding them on a monthly basis of the latest threats, the techniques employed and if they deem anything suspicious to raise this with their line managers or IT department. Whilst we cannot prevent all attacks, education minimises risks to our servers and data.
Simple straight forwards steps to prevent attacks include looking at the structure of the email, the formatting and its features, beware if an email exhibits any of the following-
- It’s from a company or individual that you’ve never had contact with previously.
- It asks you to click a link. (These include PDF links, links to a website, if you are seeing a link to click here for say a PayPal payment, remittance or Apple upgrade or Microsoft upgrade, you can hover over the link and easily tell if this is legitimate, if in doubt please contact your internal IT department.)
- It asks you open an attachment, or asks you to enable a macro to access the file
- It has been sent via a public email service and not a business email address.
e.g. @hotmail.com, @yahoo.com, @gmail.com @ukcmsnetwork.com, @p2pmail.co.uk, @securedmail.co.uk
- It asks you to verify any personal details or account details.
- It does not refer to you by your name.
- It uses poor grammar or spelling.
- It is poorly formatted or uses low quality images.
- It appears to be from an existing contact but the style of language or formatting of the email differs from previous emails.
We pride ourselves in our integrity and security of our systems giving you our customers the confidence that your transactions and supplier is secure and safe.