-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcyber-security-best-practices-for-business.html
476 lines (398 loc) · 31.9 KB
/
cyber-security-best-practices-for-business.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
---
permalink: /cyber-security-best-practices-for-business/
---
<!DOCTYPE html>
<html lang="en">
<head>
<script src="https://kit.fontawesome.com/029ff40d7b.js" crossorigin="anonymous"></script>
<!-- Global site tag (gtag.js) - Google Analytics -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-XVK8SSNQSC"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-XVK8SSNQSC');
</script>
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "NewsArticle",
"headline": "Cyber Security Best Practices for Business",
"image":
"https://sybiltec.com/images/pink-silver-padlock-on-black-red-laptop-computer-turned-on-with-lights.jpg",
"datePublished": "2024-05-19T11:30:00+01:00",
"dateModified": "2024-07-21T01:00:00+01:00",
"author": [
{
"@type": "Person",
"name": "Sybil Mayard",
"url": "https://sybiltec.com/"
}
]
}
</script>
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "BreadcrumbList",
"itemListElement": [{
"@type": "ListItem",
"position": 1,
"name": "Home",
"item": "https://sybiltec.com/"
},{
"@type": "ListItem",
"position": 2,
"name": "Cyber Security Best Practices for Business"
}]
}
</script>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cyber Security Best Practices for Business | Sybiltec</title>
<meta name="Description" content="Cyber security is a top priority for all businesses. Keep yourself, your business and your customers safe by following these best practices.">
<meta name="robots" content="all">
<meta property="og:locale" content="en_GB" />
<meta property="og:type" content="website" />
<meta property="og:title" content="Cyber Security Best Practices for Business | Sybiltec" />
<meta property="og:description" content="Cyber security is a top priority for all businesses. Keep yourself, your business and your customers safe by following these best practices." />
<meta property="og:url" content="https://sybiltec.com/cyber-security-best-practices-for-business/" />
<meta property="og:site_name" content="Sybiltec" />
<meta property="og:image" content="https://sybiltec.com/images/pink-silver-padlock-on-black-red-laptop-computer-turned-on-with-lights.jpg" />
<meta property="og:updated_time" content="2024-07-21T01:00:00+01:00" />
<meta property="article:published_time" content="2024-05-19T11:30:00+01:00" />
<meta property="article:modified_time" content="2024-07-21T01:00:00+01:00" />
<meta property="article:tag" content="cyber security" />
<meta property="article:author" content="Sybil Mayard" />
<meta name="twitter:card" content="summary_large_image" />
<meta name="twitter:creator" content="@sybiltec" />
<meta name="twitter:site" content="@sybiltec" />
<meta name="twitter:label1" content="Written by">
<meta name="twitter:data1" content="Sybil Mayard">
<meta name="twitter:label2" content="Estimated reading time">
<meta name="twitter:data2" content="15 minutes">
<meta name="google-site-verification" content="4CQdjA8VuHHdJlLAeL33JXUNCcg92x6Yy2MK2H-F5rs" />
<meta name="geo.region" content="GB" />
<meta name="geo.placename" content="London" />
<meta name="geo.position" content="51.495673;0.141465" />
<meta name="ICBM" content="51.495673, 0.141465" />
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "LocalBusiness",
"image": "https://sybiltec.com/images/logos/sybiltec-logo-social.png",
"name": "Sybiltec Web Design",
"address": {
"@type": "PostalAddress",
"streetAddress": "2 Veridion Way",
"addressLocality": "Bexley",
"addressRegion": "London",
"postalCode": "DA18 4AL",
"addressCountry": "GB"
},
"geo": {
"@type": "GeoCoordinates",
"latitude": 51.495673,
"longitude": 0.141465
},
"url": "https://sybiltec.com",
"telephone": "+447768059730",
"priceRange": "$$",
"openingHoursSpecification": [
{
"@type": "OpeningHoursSpecification",
"dayOfWeek": [
"Monday",
"Tuesday",
"Wednesday",
"Thursday",
"Friday"
],
"opens": "09:00",
"closes": "18:00"
}
]
}
</script>
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "Organization",
"image": "https://sybiltec.com/images/logos/sybiltec-logo-social.png",
"url": "https://www.sybiltec.com",
"sameAs": ["https://www.instagram.com/sybiltec/", "https://www.facebook.com/sybiltec", "https://www.linkedin.com/company/sybiltec/"],
"logo": "https://sybiltec.com/favicon.png",
"name": "Sybiltec Web Design",
"description": "Sybiltec provides web design services to small businesses in the South East London region and surrounding areas. Whether you are looking to build your first website or redesign an existing one, we offer a service that's right for you. Services include: small business websites, e-commerce websites and online learning platforms. We work with Shopify, WordPress, Wix, WooCommerce and LearnDash.",
"email": "[email protected]",
"telephone": "+447768059730",
"address": {
"@type": "PostalAddress",
"streetAddress": "2 Veridion Way",
"addressLocality": "Bexley",
"addressCountry": "GB",
"addressRegion": "London",
"postalCode": "DA18 4AL"
}
}
</script>
<link rel="canonical" href="https://sybiltec.com/cyber-security-best-practices-for-business/" />
<link rel="stylesheet" href="https://sybiltec.com/styles.min.css" type="text/css">
<link rel="icon" type="image/png" href="https://sybiltec.com/favicon.png">
</head>
<body>
<div class="announcement-bar">
<div class="container-1140">
<span><i class="fa-regular fa-envelope"></i><a href="mailto:[email protected]?subject=Website Enquiry" target="_blank">[email protected]</a></span>
</div>
</div>
<div class="header">
<div class="container-1140">
<div class="row">
<div class="col-2">
<div class="logo">
<span class="logo"><a href="/">Sybiltec</a></span>
</div>
</div>
<div class="col-10">
<div class="nav">
<div class="topnav" id="myTopnav">
<a href="/">Home</a>
<a href="https://sybiltec.com/about/">About</a>
<a href="https://sybiltec.com/services/">Services</a>
<a href="https://sybiltec.com/clients/">Case Studies</a>
<a href="https://sybiltec.com/contact/" class="btn-contact">Contact Us</a>
<a href="javascript:void(0);" class="icon" onclick="myFunction()">
<i class="fas fa-bars"></i>
</a>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="hero">
<div class="container-1140">
<h1>Cyber Security Best Practices for Business</h1>
</div>
</div>
<div class="main section">
<div class="container-1140">
<ol class="breadcrumb">
<li>
<a href="https://sybiltec.com">Home</a>
</li>
>
<li>
Cyber Security Best Practices for Business
</li>
</ol>
<p>Date updated: 21 July 2024 | by Sybil Mayard</p>
<p>Cybercrime is constantly on the rise, and therefore you must make <strong>cyber security</strong> a top priority <strong>for your business</strong>. Keep yourself, your business and your customers safe with the tips and advice in our blog.</p>
<p>By following good cyber security practices, you can enjoy a safe and secure experience both online and offline.</p>
<h2>1. Don't Delay, Update Your Devices Today!</h2>
<p>Install an antivirus product on your devices and keep it up to date. Carry out a virus scan regularly to detect and remove any malicious software.</p>
<p>Keep all of your devices' operating system software up to date. By default, devices are usually set to download and install the updates automatically. However, if this will be disruptive to your working day, add a recurring appointment to your calendar to remind yourself to manually install the updates at a more convenient time.</p>
<p>Only download apps and software from legitimate sources and always install the latest version.</p>
<h2>2. Be Careful With Your Passwords </h2>
<p>Do not reuse passwords across multiple websites!</p>
<p>Do not store passwords on spreadsheets, emails, hard drives, or on paper. Instead, use a password manager such as LastPass or Dashlane. Password managers are simple, secure and convenient to use. Both of these platforms include a free plan which allows you to store an unlimited number of passwords. Once you have stored all of your passwords in the password manager, go through your notes and emails, and delete any that contain passwords.</p>
<p>For each account, create a strong, unique password. A strong password is at least 16 characters long, consisting of a random combination of uppercase and lowercase letters, numbers and special characters (such as @, #, _, -, &, *, ^). For some interesting stats, download the famous <a href="https://www.hivesystems.com/password-table" target="_blank" rel="noopener noreferrer">Hive Systems Password Table</a> which illustrates how long it takes for a hacker to brute force a password in 2024.</p>
<h3>2-Factor Authentication</h3>
<p>Where possible, set up 2-factor authentication, or 2FA (also known as two-step verification). This adds an extra layer of security to your account because the access requires 2 forms of identification (the password and a security code). Common forms of 2FA include SMS verification, which involves sending a text message to your phone containing a unique security code, or obtaining a code via an authentication app. As well as your password, you would need to enter this code into the website to gain access to your account. Never share your security code with others.</p>
<p>When setting up 2FA, you should also create a backup method to access your account if you lose your phone. This is usually in the format of a recovery code. Please store your recovery codes in a safe place such as in a password manager.</p>
<h2>3. Manage Permissions Wisely</h2>
<p>If your organisation hires employees or contractors, each user will need their own, separate login for each account. Logins should not be shared between users. Remember the "Principle of Least Privilege"; that is, don't automatically grant all users admin permissions. Instead, provide each user with the lowest level of access required to perform his or her job effectively and keep the number of users with admin permissions down to a minimum. Delete logins for users who no longer work for your organisation.</p>
<h2>4. Protect Your Data and Others' Data</h2>
<p>Lock the screen when away from your computer or laptop. If possible, enable the encryption feature on your laptop. BitLocker is available for Windows, and FileVault for Mac. </p>
<p>Do not store personal data for longer than it is needed.</p>
<p>Keep devices and documents stored safely and away from unauthorised personnel.</p>
<p>Keep all of your documents and data backed up. Create one backup in the cloud and at least one other backup on a physical hard drive stored in a location different from where you usually work. Back up your work frequently, ideally once a day.</p>
<p>Here are a few options for cloud backup solutions, all of which offer a free plan for a limited amount of storage space:</p>
<ul>
<li>Google Drive</li>
<li>Dropbox</li>
<li>IDrive</li>
<li>MEGA</li>
</ul>
<h3>Responding to a Data Breach</h3>
<p>Have an incident response procedure in place and in the event of an incident, record as much information as you can about it (what happened and when, why it happened, who was involved, what data was lost, which action you took etc.).</p>
<p>Remember: if your organisation suffers a data breach, and personal data is involved, you may need to report it to the Information Commissioner's Office (ICO) within 72 hours. When in doubt, please contact us and our experts will advise you on the best course of action.</p>
<h2>5. Beware of Spam</h2>
<p>If you get inundated with junk emails every day, it can be tempting to click the Unsubscribe link at the bottom of the emails. Never click this link or respond to the emails as this indicates to the spammers that your email address is active and could result in your receiving even more junk mail.</p>
<h2>6. Learn How to Identify Scam Emails and Texts</h2>
<p>Scam emails and texts often contain phrases like the following to lure you into taking action:</p>
<ul>
<li>Your account has been suspended</li>
<li>We detected unusual activity on your account</li>
<li>Someone tried to log in to your account</li>
<li>Your password has expired</li>
<li>You're eligible to receive a grant</li>
<li>You're due to receive a tax refund</li>
<li>Your package could not be delivered</li>
</ul>
<p>Do not click links in suspicious emails or texts. These links can take you to a website that looks like a genuine site but isn't, in an attempt to steal your personal information. </p>
<p>Do not open attachments from suspicious emails. Attachments can contain viruses or other malware that can also steal your information or harm your computer.</p>
<p>Never respond to an email that promises a large amount of money in return for your personal information.</p>
<p>Look at the email address of the sender. If the domain (the part after the @ sign) doesn't match the company it appears to be coming from, then it's fake.</p>
<img id="unusual" src="https://sybiltec.com/images/cybersecurity/microsoft-account-unusual-sign-in-activity.png" alt="Microsoft account unusual sign-in activity" style="width: 500px; max-width: 100%;">
<p>Read the email carefully and look for spelling, punctuation and grammar mistakes.</p>
<img src="https://sybiltec.com/images/cybersecurity/microsoft-account-did-you-attempt-change-password.png" alt="Microsoft account did you attempt to change your password" style="width: 500px; max-width: 100%;">
<p>Look out for the generic "Dear customer" greeting.</p>
<p>Learn how to spot deceptive links. Do not click on links; instead, hover over the links and buttons to check if the links are genuine:</p>
<img src="https://sybiltec.com/images/cybersecurity/amazon-phishing-email.png" alt="Phishing email appearing to be from Amazon" style="width: 500px; max-width: 100%;">
<p>If you receive a suspicious email, report it as Phishing via your email program and delete it immediately. You can also block the sender to avoid receiving further emails from this sender, however, this is usually ineffective as scammers constantly change their email addresses.</p>
<h2>7. Practice Safe Browsing Online</h2>
<p>Check that the website you are viewing is actually the one you intended to visit - verify that the URL in the address bar of the browser is correct. Spoof sites can be deceptive and are designed to look identical to the real ones. Have a look at this example of the vehicle enquiry service on the GOV.UK website.</p>
<p>A fake GOV.UK website:</p>
<img src="https://sybiltec.com/images/cybersecurity/fake-gov-uk-vehicle-enquiry-service-website.png" alt="Fake gov.uk vehicle enquiry service website" style="width: 500px; max-width: 100%;">
<p>The genuine GOV.UK website:</p>
<img src="https://sybiltec.com/images/cybersecurity/vehicle-enquiry-service-gov-uk-website.png" alt="Vehicle enquiry service on gov.uk website" style="width: 500px; max-width: 100%;">
<p>Do not enter sensitive data (e.g. contact information or credit card details) on insecure websites. To check if a website is secure, look at the address bar of the browser. The web address should begin with <strong>https://</strong>.</p>
<p>Use common sense when shopping online. If prices look too good to be true, proceed with caution!</p>
<h3>Working Away From Your Usual Location</h3>
<p>When away from home or your usual workplace, do not connect to public wi-fi networks. These networks are usually unsecured and do not require a password to be accessed. Instead, use a VPN (virtual private network). A VPN provides an extra layer of security by hiding your IP address and sending/receiving data through an encrypted "tunnel", so you can browse the Internet securely and anonymously. Consider choosing a service such as NordVPN.</p>
<p>If you are accessing your accounts on a public computer, do not leave the computer unattended and always log out when you finish your session. Some websites can save your username or email address to make logging in faster - do not check this box if using a public or shared computer. Below is an example of a warning on an online banking site:</p>
<img src="https://sybiltec.com/images/cybersecurity/halifax-online-banking-login.png" alt="Halifax Online Banking login form" style="width: 500px; max-width: 100%;">
<h2>8. Ensure That Your Website is Secure</h2>
<p>If you manage your own website, install an SSL (Secure Sockets Layer) certificate on your website. When a website has an SSL certificate enabled, the web address will begin with <em>https://</em> rather than <em>http://</em>, and the browser may also display a padlock icon in the address bar. A secure website builds trust and reassures your customers that their data is safe on your website.</p>
<p>Most website builders provide an SSL certificate for free, so you would not normally have to worry about this. However, if you are using WordPress or another content management system that does not provide one, you can obtain a free SSL certificate from Let's Encrypt or purchase one from your domain provider.</p>
<h3>Additional Tasks for WordPress Users</h3>
<p>Make sure to update your plugins, themes and core WordPress files often (we recommend checking once a week). Updating your WordPress site helps to keep it protected against security threats and vulnerabilities. Read our handy guide on <a href="https://sybiltec.com/guide-to-updating-your-wordpress-website/">how to update your WordPress website</a> the right way.</p>
<h2>9. Monitor Your Login Activity </h2>
<p>Perhaps a colleague has told you that they received an email or invoice from you that you were totally unaware of! How would you know if someone has tried to gain access to one of your accounts?</p>
<p>Many platforms include a feature that lets you track any suspicious behaviour; here is an example. If you are using Microsoft, you can go into <em>My Microsoft account</em> > <em>Security</em> > <em>View my activity</em> (below "Sign-in activity"). I recently tried this and was shocked to find out how many times someone had tried to gain unauthorised access to my account, but fortunately, none of the suspicious logins were successful. </p>
<img src="https://sybiltec.com/images/cybersecurity/microsoft-sign-in-activity.png" class="screenshot" alt="Microsoft sign-in activity" style="width: 500px; max-width: 100%;">
<p>It's recommended to add additional email addresses or phone numbers to your Microsoft account. If Microsoft detects a suspicious (and successful) login on your account, you would receive an email notification or text with instructions on how to proceed. Changing your password would usually be the first thing to do. However, if you do receive such a notification, please ensure that it is genuinely from Microsoft - we have known scammers to spoof these "<a href="#unusual">Unusual sign-in activity</a>" emails too, as described earlier in this article.</p>
<p>If you do not use Microsoft, please check within your software to find out which security measures are in place for tracking sign-in activity.</p>
<h2>10. Exercise Caution When Using Video Conferencing</h2>
<p>Since the COVID-19 pandemic, the popularity of video conferencing tools such as Zoom, Google Meet and Microsoft Teams has increased significantly. This in turn has unfortunately led to a rise in cyber security issues. One such issue is "Zoombombing", where a Zoom meeting is gatecrashed by uninvited attendees.</p>
<p>Here are a few tips to keep your online meeting safe from intruders and other risks:</p>
<ul>
<li>Do not publish the meeting link publicly. Create a page on an events platform such as Eventbrite, so that attendees can register their interest beforehand. You can then vet the list of attendees and choose whom to share the link with.</li>
<li>Disable the "join before host" option. Allow attendees to wait in the Waiting Room before admitting them to the meeting.</li>
<li>Restrict sreen sharing to the host only.</li>
<li>When screen sharing, close all windows or tabs apart from the one that you intend to share.</li>
<li>Only record the meeting if it is absolutely necessary to do so. Inform all attendees that you will be recording it.</li>
<li>Do not share personal information via the video conferencing platform.</li>
<li>Consider using headphones if you are to make the call in a non-private space.</li>
<li>Keep your video conferencing software up to date.</li>
</ul>
<h2>11. Stay Informed About Cyber Security Issues</h2>
<p>There are many resources available online to help you stay up to date with the latest cyber security issues and tools to reduce your cyber risk. Here are a few to get you started:</p>
<ul>
<li><a href="https://www.ncsc.gov.uk/" target="_blank" rel="noopener noreferrer">The National Cyber Security Centre</a></li>
<li><a href="https://www.actionfraud.police.uk/" target="_blank" rel="noopener noreferrer">Action Fraud</a></li>
<li><a href="https://www.which.co.uk/consumer-rights/scams" target="_blank" rel="noopener noreferrer">Which? Consumer Rights: Scams</a></li>
</ul>
<h2>12. Get Cyber Essentials Certified</h2>
<p>Last, but not least, we recommend getting Cyber Essentials Certified. Cyber Essentials is a government-backed scheme which was developed in response to the growing problem of cyber crime. Getting certified demonstrates your commitment to cyber security best practices and gives you peace of mind that your organisation is protected from the most common cyber threats. The certification is available at two levels (Cyber Essentials and Cyber Essentials Plus). Once you have received the certification, you will receive a badge to be displayed on your website and other documents.</p>
<p>Our partners, <a href="https://thegdprcomplianceconsultancy.co.uk/" target="_blank" rel="noopener noreferrer">The GDPR Compliance Consultancy</a>, can help you through the process of getting certified with ease.</p>
<img class="screenshot" src="https://sybiltec.com/images/cybersecurity/cyber-essentials.png" alt="Cyber Essentials">
</div>
</div>
<div class="contact section">
<div class="container-1140">
<div class="row">
<div class="col-8">
<h3>Would You Like To Start A Project With Us?</h3>
<p>Click the contact button to get in touch with your requirements</p>
</div>
<div class="col-4">
<a class="btn-primary" href="https://sybiltec.com/contact/">Contact Us</a>
</div>
</div>
</div>
</div>
<div class="footer section">
<div class="container-1140">
<div class="row">
<div class="col-2-4">
<p><strong>Links</strong></p>
<p><a href="https://sybiltec.com/about/">About</a></p>
<p><a href="https://sybiltec.com/blog/">Blog</a></p>
<p><a href="https://sybiltec.com/faqs/">FAQs</a></p>
<p><a href="https://sybiltec.com/sitemap/">Sitemap</a></p>
<p><a href="https://sybiltec.com/privacy-notice/">Privacy Notice</a></p>
<p><a href="https://sybiltec.com/terms-and-conditions/">Terms and Conditions</a></p>
</div>
<div class="col-2-4">
<p><strong>Services</strong></p>
<p><a href="https://sybiltec.com/ecommerce-websites/">E-commerce Websites</a></p>
<p><a href="https://sybiltec.com/website-review/">Website Review</a></p>
<p><a href="https://sybiltec.com/small-business-web-design/">Web Design</a></p>
<p><a href="https://sybiltec.com/website-maintenance/">Website Maintenance</a></p>
<p><a href="https://sybiltec.com/training/">Workshops</a></p>
<p><a href="https://sybiltec.com/leaflet-design/">Leaflet Design</a></p>
</div>
<div class="col-2-4">
<p><strong>Some Areas We Cover</strong></p>
<p><a href="https://sybiltec.com/website-design/">Web Design in Bexley</a></p>
<p><a href="https://sybiltec.com/web-design-surrey/">Web Design in Surrey</a></p>
<p><a href="https://sybiltec.com/free-workshops-greenwich-borough/">Workshops in Greenwich</a></p>
</div>
<div class="col-2-4">
<p><strong>Get in Touch</strong></p>
<p><a href="mailto:[email protected]?subject=Website Enquiry">[email protected]</a><br>
The Engine House<br>2 Veridion Way<br>Erith DA18 4AL</p>
<p>
<a href="https://www.uksmallbusinessdirectory.co.uk/bid/284687/" rel="noopener noreferrer" target="_blank"><img src="https://www.uksmallbusinessdirectory.co.uk/links/uksbd-100.png" alt="Business Directory"></a>
</p>
</div>
<div class="col-2-4">
<p><strong>Awards</strong></p>
<img src="https://sybiltec.com/images/awards/best-sme-focused-web-design-agency-2024.webp" alt="SME News Best SME-Focused Web Design Agency 2024">
<img src="https://sybiltec.com/images/awards/digital-services-customer-service-excellence-award-2024.webp" alt="SME News Digital Services Customer Service Excellence Award 2024">
</div>
</div>
</div>
<div class="container-1140 center padding-top padding-bottom">
<a href="https://www.linkedin.com/in/sybil-m" target="_blank" rel="noopener noreferrer">
<i class="fa-brands fa-linkedin"></i></a>
<a href="https://instagram.com/sybiltec/" target="_blank" rel="noopener noreferrer">
<i class="fa-brands fa-instagram"></i></a>
<a href="https://www.pinterest.co.uk/sybiltec/" target="_blank" rel="noopener noreferrer">
<i class="fa-brands fa-pinterest"></i></a>
<a href="https://www.facebook.com/sybiltec" target="_blank" rel="noopener noreferrer">
<i class="fa-brands fa-facebook"></i></a>
<a href="https://x.com/sybiltec" target="_blank" rel="noopener noreferrer">
<i class="fa-brands fa-x-twitter"></i></a>
<a href="https://www.tiktok.com/@sybiltec" target="_blank" rel="noopener noreferrer">
<i class="fa-brands fa-tiktok"></i></a>
</div>
<div class="copyright section center"><p>Copyright ©
<span id="year"></span> Sybiltec Web Design. ICO registration reference: ZB744424</p>
</div>
</div>
<script>
function myFunction() {
var x = document.getElementById("myTopnav");
if (x.className === "topnav") {
x.className += " responsive";
} else {
x.className = "topnav";
}
}
/* When the user clicks on the button,
toggle between hiding and showing the dropdown content */
function toggleDropdown() {
document.getElementById("myDropdown").classList.toggle("show");
console.log("click");
}
// Close the dropdown if the user clicks outside of it
window.onclick = function(event) {
if (!event.target.matches('.dropbtn')) {
var dropdowns = document.getElementsByClassName("dropdown-content");
var i;
for (i = 0; i < dropdowns.length; i++) {
var openDropdown = dropdowns[i];
if (openDropdown.classList.contains('show')) {
openDropdown.classList.remove('show');
}
}
}
}
document.getElementById("year").innerHTML = new Date().getFullYear();
</script>
</body>
</html>