Cyber Defences
RANSOMEWARE
There is no defence against the malware known as Ransomeware. There are now many many attempts at defence, but ANYTHING attached to the internet is vulnerable.
UPDATE: it may be a defence against phishing to activate your firewall’s “family” protection which can block access to “bad” web sites. It’s unlikely to be foolproof, but very much better than nothing.
UPDATE 2: It has become more common to defeat attacks with good backup and restores processes; so now crooks will say “ok, so you survived that, well done. If you do not pay us x,000,000 we will publish all your data on the dark web”. That means exposure to identity theft and much else. So this is a “heads up” to take great care what unencrypted personal or indeed business data available to steal. Note I said “unencrypted”; explore keeping your data or at least some of it encrypted - it’s called “encryption at rest” I believe.
Search Here: https://duckduckgo.com/?q=encryption+at+rest&t=brave&ia=web
Therein lies the key
Forgive the intended pun, which is that ransomeware works by demanding payment for a decryption “key” and we are looking for the “key” to defending against these attacks.
There is only one defence that cannot be attacked, which is:
OFFLINE COPIES / BACKUPS.
OFFLINE means disconnected from the internet and in the event, not attached to computers at all. Think of the ancient “floppy disk” and more corporately offline “tape backups”.
Crucial to all discussions about “offline backups/copies” is how long, how many days back in time these go. For example a simple daily backup will fail by being overwritten by the ransomed data. My last update said this malware is typically resident for several days, two or three, while it carries out its work before declaring itself and demanding the ransom - which demand is usually very polite. Apparently this malware can be in place for months before it activates/attacks so watch out what you restore. Restore data not programs.
I do like the idea of ransomeware detection software that works by placing “honeypot” (i.e. attractive to the malware) files which it then monitors for encryption so as to provide early warning. It is however an ongoing battle, so offline is the current established defence. Problem is of course one does lose data even if “only” a few days worth.
Large businesses have dedicated departments to engage in active defences, so I am speaking only in the context of small businesses who do not have any or much of a budget for cyber defence. Indeed there are some small businesses who could drop their computers and lose everything and it would not be any loss. We have to consider our position and make choices accordingly.
LAN
Defences
Offline Defence list
CAVEAT
I think it is safe to say nothing in my ideas is free. However, the costs are generally one time, such as buying say 14 SD cards, or if annual then also useful in other regards such as cloud storage services like sync and dropbox etc.
Hard disk drives
HDDs vary from one to 12 or more terrabytes. Note that “archive” designated disks are designed to be written to as archives so are cheaper sometimes, but not for desktop or NAS type daily use. Remember these are OFFline which means disconnected and sitting on a safe shelf somewhere (off-site being ideal, but that is another defence story)
SD Cards
250gb Like HDs these are increasing in size. Except for the smallest drives their use requires careful selection of one’s critical data.
Dropbox 3TB et al
Dropbox 3 terrabytes. Sync.com, Google Drive, Apple iCloud Drive, Tresorit and others. SOME and by no means all offer data recovery from a point back in time. Have great care how far back in time and different “memberships” have different “rewind” times.
S3 Immutable Storage
https://en.wikipedia.org/wiki/Amazon_S3
https://en.wikipedia.org/wiki/Immutable_object
IMMUTABLE is the critical word here. It means the data can be written (saved) only once and cannot be overwritten. Changes are saved as “incremental” later additions. This means the earlier saved data cannot be overwritten by ransomeware encryption. This assumes the account itself cannot be deleted or disabled by the ransomeware malware.
Tape backups
These can be expensive, but offer large data storage which is kept offline.
Backup software to immutable storage
CASE STUDY - mostly about data sizes and storage sizes.
Describing a real life scenario.
This user has a LAN consisting of several computers, mobile devices and NAS drives.
While calling these “backups” (which they are) these are simple copies of files, they are not stored using any dedicated backup software. This means they can be tested directly by checking files are not corrupted. Untested backups that turn out to be corrupted in some way are the cause of many a failed disaster recovery. TEST YOUR BACKUPS.
Video and photos take the most space = TERABYTES
Massive volume of tera bytes of videos and photographs. These by their nature are fixed and do not change, therefore after organising them in suitable fashion they can be saved to one preferably more hard disks and stored both off-site and locally, in suitable packaging bearing in mind the shelf life of unused hard disks up to ten years. He uses a disk cataloguing app to keep track of what is stored where, including all the other backups we mention. This is really like we used to use floppy disks 40 years ago, but those stored only 360k (kilo bytes)
Next come old files, archives and the like = GIGABYTES
Even if over a tera byte I still view this as in giga byte territory. Over a decade or two these can occupy significant amounts of space and they belong on the same type of unchanging storage as the Videos and photos above, but separate because they have a possible probability of being needed, not least for earlier versions of the same work files, data corruption being by far the most usual reason for needing to refer to backups.
Live data - several gigabytes “only” 250gb SD Cards
This is where the SD cards come in to play. These are the tiny things we see in mobile phones (NOT Apple) and cameras. Current sizes rise to 250 gigabytes at the time of writing and increasing. So our case study has 14 250gb SD cards and copies to one every day or two, so not necessarily every day at all. This is because given a ransom attack takes say two or three days taking a copy so even taking a copy every day will require going back at least three days to find clean data, bearing in mind we have cloud storage as our first line defence in any case.
Whole system backups to 6tb HDDs
He has six 6TB hard disks and “standard” backup software operating with hourly incremental backups. Every few days he switches to the next disk. They are in a “caddy” so can be inserted and removed at will by hand.
Whole data cloud backups such as dropbox
This means the likes of dropbox and Sync. However in their business forms so not a mere 5 gigabytes. Subscriptions will be required also to ensure sufficient “rewind” history to offer comfort. 30 days can be standard but I prefer 180 days or a year. Our case study has all data synchronised to dropbox with a 180 day rewind facility.
Whole system backups to S3 Immutable storage.
and finally, recently implemented Arq backups to Backblaze S3 compatible immutable storage. These “whole systems” differ from the above backups to hard disks because they have very long lists of excluded file types and folders. They do not include the archives of photos and videos.
CASE STUDY NOTES
Beware reliance on duplicated backups
I once had both fail with physical hard disk failure. However, these were in daily use. One lesson I took from that was to consider using different manufacturer’s disks - though granted I don’t currently do that. I do still find disks in use fail with monotonous regularity, when my only remaining backup would be the original data. These days the likes of dropbox, Gdrive and Sync et al offer a defence against this, as ordinary backup copies, but these vary a lot as regards the ability to “rewind in time”. Apple appears to offer none at all. None of this considers GDPR.
SD Cards 250gb comment
I have seen bigger ones up to two terabytes, but have no information about their reliability. If this live data is much bigger then small hard drives and indeed SSDs are relatively cheap, it’s just that they take more space. I see on a quick search 2.5” HDDs of one TB costing around £35. That competes well with SD cards. However, SD cards can be carried about in a person’s wallet (thus off-site). That said I used to keep one backup copy in my car door pocket, so depending where I was in the car depended how “off site” it was. That was back in the 1980s long before modern day problems. I had a fire safe with backups in it and it was stolen by a burglar (screw it down!). You just never know so multiple types are a must.
Cost types
Physical storage costs a one-off £x per unit and no more. So this is the first 4 types listed opposite. Budget may affect how many of each, but over time suitable numbers should be attainable.
The last two require online subscriptions and licence payments for the software. Of these two the synchronising cloud storage has many other daily useful advantages whereas the S3 storage is straight ransomeware defence cost.
Veeam_Ransomware_Retrospective.indd
Successful backups are the last line of defense for cyberattacks and can be the deciding factor to prevent considerable downtime, data loss and paying a costly ransom.
and from VEEAM to quote:
Veeam_Ransomware_Retrospective.indd
Mitigating ransomware attacks
End-user education (20%), bolstering backup storage resiliency (19%) and securing internet access (16%) are the top choices of ransomware mitigation globally. Similar results are seen from a geo perspective where NA, LATAM and EMEA/MEA are more apt to invest in detection, while NA was more likely to use additional network monitoring for mitigation.
To better mitigate ransomware vulnerabilities, customers are now focused on bolstering backup storage resiliency, through immutability, investing in end-user education and securing internet access.
MY OPINION
See above where it says “immutability?” It has seemed to me for some time that aside from totally offline (that means disconnected sitting on a shelf) this is the ONLY type of backup defence that can be viewed as likely to be effective. It looks like the experession “backup resiliency” (which means nothing at all unless defined) is used to mean “immutability”. Ok adding in to it expressions like “education” and “securing access” are not in my view backup methods, they are defences, for sure, but they are not part of backups. So my whole paragraph here reduces all online defences that are capable of being effective are solely only and nothing else except immutabilty. That means copying your data to a W O R M drive. And no one can have rights to that drive, bceause if someone physically steals it all is for nought. So it needs to be off site and in the cloud so no one actually knows where it is. In reality this leaves small businesses etc with Amazon S3 type storage as the only
current provider I am aware of. Backblaze offers compatible resources.
All of that said I think what surprises me is the absence from common knowledge about immutable storage
W O R M stands for Write Once Read Many; so once written it can be read but never deleted (written again). That means “immutable”. I plan to have another look at Veeam, but I THINK they are not aimed at small biz.
August 25, 2025
Core Systems And Their Integrations
Sage Business Cloud
• Sage Business Cloud can integrate with a range of third-party applications for various business functions. It has built-in integrations for:
• Bank feeds (automatically sync transactions)
• Payroll (e.g., Xero Payroll, QuickBooks Payroll)
• Inventory management (e.g., TradeGecko, Zoho Inventory)
• POS systems (e.g., Lightspeed, Vend, Square POS)
• CRM (e.g., HubSpot, Salesforce)
• E-commerce platforms (e.g., Shopify, WooCommerce, Magento)
Sage Business Cloud also supports integration via API, which allows it to connect to additional third-party tools not already listed.
QuickBooks
• QuickBooks has a broad integration ecosystem and works well with many other tools:
• Bank feeds for automatic syncing of transactions.
• Payroll integrations (e.g., Xero Payroll, Gusto, QuickBooks Payroll).
• Inventory management (e.g., TradeGecko, Zoho Inventory).
• POS systems (e.g., Lightspeed, Vend, Square POS).
• CRM (e.g., HubSpot, Salesforce).
• E-commerce (e.g., Shopify, WooCommerce, Magento).
Additionally, QuickBooks has an extensive marketplace of integrations and API support to connect with other third-party services.
Xero
• Xero supports integrations across various business areas:
• Accounting and bookkeeping (it’s already an accounting tool).
• Payroll software (e.g., Xero Payroll, QuickBooks Payroll).
• Inventory management (e.g., TradeGecko, Zoho Inventory).
• POS systems (e.g., Lightspeed, Vend, Square POS).
• CRM tools (e.g., HubSpot, Salesforce).
• E-commerce platforms (e.g., Shopify, WooCommerce, Magento).
Like Sage and QuickBooks, Xero has open API support, enabling it to integrate with many other systems.
TradeGecko
• TradeGecko (now QuickBooks Commerce) is a comprehensive inventory and order management system. It integrates with:
• Accounting systems (e.g., QuickBooks, Xero, Sage Business Cloud).
• POS systems (e.g., Lightspeed, Vend, Square POS).
• CRM tools (e.g., HubSpot, Salesforce).
• E-commerce platforms (e.g., Shopify, WooCommerce, Magento).
TradeGecko offers API access for further integrations with other third-party applications, making it highly flexible.
Integration Systems and Their Cross-Compatibility:
The other systems (e.g., Lightspeed, HubSpot, Shopify, Salesforce, etc.) are third-party tools that are commonly used in conjunction with the core systems for specific business functions. Many of them have extensive integration capabilities as well, allowing them to connect with not only the core systems listed but also other tools you may use. Here’s an overview of some of the integrations’ integration capabilities:
POS Systems (e.g., Lightspeed, Vend, Square POS)
• These can integrate with accounting systems like QuickBooks, Xero, or Sage.
• They can also work with inventory management (e.g., TradeGecko, Zoho Inventory).
• Many POS systems also support APIs or middleware (e.g., Zapier, Integromat) to integrate with other platforms, enhancing flexibility.
CRM Systems (e.g., HubSpot, Salesforce)
• CRMs can integrate with accounting systems (e.g., Xero, QuickBooks, Sage).
• They can also connect to POS systems (e.g., Lightspeed, Vend).
• HubSpot and Salesforce also support API integrations for connecting with a range of other platforms beyond accounting and POS systems.
• E-commerce platforms often integrate with inventory management systems (e.g., TradeGecko, Zoho Inventory).
• They can also integrate with accounting systems (e.g., QuickBooks, Xero, Sage).
• Shopify, for example, has a rich marketplace of integrations and APIs to connect with third-party tools across various categories.
Cloud Storage and Document Management (e.g., Google Workspace, Microsoft OneDrive)
• These can integrate with accounting systems (e.g., Sage Business Cloud, Xero, QuickBooks).
• Also compatible with POS systems, CRM systems, and e-commerce platforms for document sharing and management.
Conclusion:
• The core systems (Sage Business Cloud, QuickBooks, Xero, and TradeGecko) are all highly integrable with a wide variety of other tools (e.g., POS systems, inventory management, CRM systems, e-commerce platforms).
• Many of these third-party integrations also have API capabilities or use middleware solutions like Zapier or Integromat, providing additional flexibility for connecting with other systems.
• Cloud-based solutions generally support more integrations compared to traditional systems, which is why they are being considered for this business.
Flexible, scalable systems that can connect all aspects of the business while keeping things cloud-based and cost-effective.
August 25, 2025
Contract Acceptance
or when does a document arrive and where from? Isn’t it just obvious?
PAPER DOCUMENTS
A letter is presumed delivered three days after being posted and in contract law “acceptance” is at the time of posting.
https://en.wikipedia.org/wiki/Posting_rule
Note the above says US Law but is also British law and gives English case law further down.
A post office “certificate of posting” is a very good idea. One can wryly note this does NOT certify the contents (or lack of) of the envelope.
Sending it “signed for” is sometimes wise. I advocate also sending a like copy by normal unsigned for post, so if there is no one there to sign for it, a copy will nevertheless land on the doormat. Get a “certificate of posting” of course.
Certain documents have to be delivered to the person so this is where the famous “you have been served” comes from.
https://www.moneyclaimsuk.co.uk/process-serving.aspx
interesting reading (I have NOT verified that site and I do not know them).
FAX The location of the above physically posted document contract acceptance is the destination (country) location of the document.
The location of the FAXED document contract acceptance is the departure location of the document i.e. where the sending fax machine is located. Certain international matters are deeply affected by WHERE the contract was accepted.
EMAIL
No rules. Yet. However, unless challenged in court they are being accepted as true evidence - I like to think such things are checked for authenticity as a matter of course. I await due recognition in law and case law. If it has happened already I have not yet seen it. I could surmise that if email is treated the same as fax (electronic transmission\ then the fax rule will apply; which would be a fundamental shift in how we are doing business, albeit in a very subtle and usually not relevant way. It makes sense to me that acceptance should be wherever one happens to be at that time, not where someone else (the other party) is. That said, acceptance when on holiday might then be capable of being interesting.
SMS / IM / Social media / Telex / Teletype
Ditto.
Instant transmission further research Q1
Q1 The principle in law appears to be “the instantaneous communication advantage”.
Here is one view
https://www.grin.com/document/302312
and another written by a law student:
Quoted from here https://www.lawteacher.net/free-law-essays/contract-law/contractual-acceptance-by-email.php
Instantaneous communication
It is notable, that the postal rule is often not active when it comes to instantaneous communication (Beale, 2014: 2-049).
For instance, telephone and telex communication is not covered (Entores Ltd v Miles Far East Corp. [1955] 2 Q.B. 327; Brinkibon Ltd v Stahag Stahl und Stahlwarengesellschaft mbH [1983] 2 A.C. 34; N.V. Stoomv Maats “De Maas” v Nippon Yusen Kaisha (The Pendrecht) [1980] 2 Lloyd’s Rep. 56, 66; Gill & Duffus Landauer Ltd v London Export Corp GmbH [1982] 2 Lloyd’s Rep. 627).
The reason why the postal rule is not, generally, applied in cases with instantaneous forms of communication is that in such situations the offeree normally knows straight away that delivery has failed and can, therefore, make alternative arrangements to ensure that his acceptance is properly communicated (Entores Ltd v Miles Far East Corp.; Brinkibon Ltd v Stahag Stahl und Stahlwarengesellschaft mbH; Beale, 2014: 2-050).
This is contrasted to the situation, in which an offeree who uses post may find himself, since he may be unaware of the failure of delivery until it is too late to accept; before the offer expires or is revoked (Beale, 2014: 2-050). [Ed
The way “fax communication” is approached, could shed some light on how email should be approached. The sender of a fax knows immediately whether the fax has been received, which could place faxes in the instant communications bracket (Beale, 2014: 2-051). Indeed, it has been held that faxes are “instantaneous communication” (JSC Zestafoni Nikoladze Ferroalloy Plant v Ronly Holdings Ltd [2004] EWHC 245 (Comm), [2004] 2 Lloyd’s Rep. 335) and that if the sender knew that his fax was not delivered in full or at all, the mere sending of a fax could not amount to acceptance (JSC Zestafoni Nikoladze Ferroalloy Plant v Ronly Holdings Ltd). While a fax might appear to be delivered properly, it may have arrived in an illegible format; therefore, it has been argued that, in such cases a fax may constitute valid acceptance (as the instantaneous communication advantage is nullified) (Beale, 2014: 2-051). It has been argued that the same logic should apply to email acceptance (Beale, 2014:
2-051). Q1
E-mail as non-instantaneous communication Q1
Q1 Whether or not the Postal rule should apply to email communication arguably turns on whether or not it is qualitatively instantaneous, that is to say, whether it displays the characteristic of instantaneous communication which would make it unfair for the Postal rule to apply (such as the ability to instantly know if receipt has occurred).
On the point of whether e-mail is instantaneous, it has been said that it is
‘almost’ instantaneous (Counts and Martin, 1996: 1086),
‘more or less’ instantaneous (Carter, 2002: 03-360 and 03-390),
‘nearly’ instantaneous (Burnstein, 1996: 76),
‘virtually’ instantaneous (Carter and Harland, 2007: 232) and
‘absolutely’ instantaneous (Norman, 1996: 86).
(Ed The law(yers) tend to not be very “tech” - though one wonders if this is when it suits their argument. Ever since the dawn of the internet the modus operandi have always been “never assume anything has arrived”, because there are endless technical reasons why it may not have. Modern system defences involve a vast array of checks which if failed, will cause the message to not be delivered and this is in addition to all the reasons a system simply fails to work as designed. There is no guarantee a “bounce message” will be sent.)
Furthermore, the high court - see next Q1
The High Court Q1
Q1 High Court held; the Postal rule should not apply to email communication since such communication was ‘instantaneous’
(David Baxter Edward Thomas and Peter Sandford Gander v BPE Solicitors (a firm) [2010] EWHC 306 (Ch)). Q1
about the High Court judgement Q1
Q1 However, some commentators (Ed such as me) point out that “instantaneousness” may not be the correct way to approach the issue(Mik, 2009: 17). It has been argued, the way some commentators approach “instantaneousness” is linguistically illogical since “instantaneous” should by definition mean no delay whatsoever; therefore qualifications such as “almost” or “nearly” allow for the possibility of delay, which means that “instantaneousness” is the wrong term to use (Mik, 2009: 16-18).
This is because if one begins to consider, how much delay would render a communication non- instantaneous, then this becomes an issue of control (over the communication on the part of the sender/ offeree ) and not one of “instantaneousness” (Mik, 2009: 17). (Ed I agree)
If control is the operative factor, (Ed that is a very perspicacious point) then the Postal rule should apply, in situations where the sender loses control over the communication (cannot confirm successful delivery) at the point of sending (Mik, 2009: 18).
In terms of emails, it has been argued that email senders can determine whether delivery was successful; however, analysis of common email protocols has demonstrated a number of flaws on this argument. (Ed I’ll say!)
For instance, notifications of failed delivery (Ed i.e. a bounce message) are not automatic and depend on the sending system being set up to request them and the receiving system being set up to provide them (Mik, 2009: 19). Further, there are noted delays in the actual issuance of failed delivery messages (Mik, 2009: 19).
Moreover, even if one focuses on “instantaneousness” rather than control, email communication could hardly be called instantaneous, since it features many steps and relays (often across the globe) and there is often a notable delay between sending and receipt (Christensen, 2001) (Ed not to mention that email sending “SMTP” servers often do not send immediately). Q1
so in disagreement we have
the Singapore High Court judgement Q1
Q1 In line with this (Ed listed in the above ) reasoning and in stark contrast to the decision of the English High Court in Thomas v BPE Solicitors, Rajah JC of the Singapore High Court held in Chwee Kin Keong v Digilandmall.com Pte Ltd, [2004] 2 SLR 594; [2004] SGHC 71, that:
“… unlike a fax or a telephone call, it is not instantaneous. Emails are processed through servers, routers and internet service providers. Different protocols may result in messages arriving in an incomprehensible form. Arrival can also be immaterial unless a recipient accesses the email, but in this respect email does not really differ from mail that has not been opened.” (Digilandmall:97). Q1
Other messaging systems like instant messaging “im” (Whatsapp, Signal, Telegram and many others)
These DO indicate when an im message has been delivered, although how reliable that is for the purpose of court decisions I think remains to be seen. I might observe that like fax machines (most) im systems will not function without a mobile telephone number. That seems to make them akin to fax machines, that require a receiving telephone number with a fax machine attached and ready and wllling to answer 24/7. Given the absence of reliability of internet data connections, regardless of the particular im protocol, it seems to me any control over receipt is suspect. In fact I begin to wonder if any internet system that relies on technology in place of human beings is losing any reliable control over delivery. So if delivery is not “instantaneous” the postal rule must apply. Now if that were true, it gives new meaning to checking one’s messages when contract offer and acceptances are in play.
Back in the 1980s I remember a fax coming in giving 8 minutes notice of an overdraft being payable on that demand. Back then we had “telegraphic transfer” and so the settlement was made in time. How about if it was delivered by “instant message”? That thought chills me because fax machines are/were managed by everyone present in the location of the machine. Instant messages are managed solely by the owner (holder) of the mobile device (could be a digital pad (e.g. iPad) not a phone as such) who may or may not be at work that day or week etc. Fax machines are/were not mobile and not personal, in the same way a physical mail box is neither mobile nor personal (discuss).
Ok so a fax machine could be off or out of order, but then the sender is/was immediately informed by the fax send failure. In that case we the prospective sender would then often, using our wired telephone, call the recipient to say there was something wrong with their fax machine and typically they would fix it immediately. So fax is/was fixed location device direct to fixed location device, with immediate feedback. None of today’s devices are like that. They could be, but we would not know, and in an case they most probably are not. These days even fax send and receive can be using virtual fax machines that don’t exist in real life.
It seems technology cannot beat human delivery, hence process serving.
August 25, 2025