Business Cybersecurity Strategy

In the last decade there have been a growing number of cyber-attacks on business. 

A huge range of organisations and companies around the world have been affected by the WannaCry ransomware cyber attack, described by the EU's law enforcement agency as "unprecedented".

From "cyberwar" to "hacktivism", there have been some of the major cyber-attacks over the past 10 years. The Petya ransomware attack which took place in June 2017 paralysed thousands of companies worldwide, and this attack reinforced the new EU cyber legislation. 

Firms that are breaching the EU’s General Data Protection Regulation (GDPR) next year could be fined up to €20m (£18m). 
This new law is now beginning to make cyber security a crucial issue for all businesses. 

However, we have found that on average, while 93% of businesses surveyed regard it as important, only 56% have established a formal cyber security strategy.

Business Responsibility
The Board is ultimately accountable for the protection of corporate systems. Therefore, they need to develop a cyber security policy, regularly audit their IT systems, educate their staff, review supplier contracts and incorporate about cyber insurance.

Analyse the Risks 
Directors need to ask themselves and all Board members: how confident are they that their business information assets are protected? Who might compromise their security? What forms might the threat take? What effects could an attack have? Have they had analysis of their business’s systems and had a report completed and how long ago was this done?  

Completing this work will help your business to implement suitable controls and determine what good practice looks like. Repeat the procedure regularly, continually reassessing the effectiveness of your measures. If a third party manages your IT services, review your agreements with it and ensure that those handling your data also apply these controls.

Understand and Follow the Law
Ensuring that your business follows the strict data protection principles outlined by the Information Commissioner’s Office (ico.org.uk) and enforced by the Data Protection Act 1998 will help to shield it from attacks, prosecutions, fines and reputational harm. 

These stipulate that the data held and processed by your firm must be kept securely; be used fairly and lawfully for specific, limited purposes; and not be moved outside the EEA without adequate protection. 
Also, planning and implementing the changes that your firm needs to make to comply with the GDPR now will ensure its readiness for the legislation when this comes into force in 2018.

Getting the Fundamentals Right
Applying basic, effective measures to protect your company’s systems will mitigate many of its cyber risks. You should download and install software updates as soon as these become available, as they often contain security patches. 
Similarly, use strong passwords; delete all suspicious emails, which could contain malware or be phishing attempts; and always use up-to-date anti-virus software.

One of the most crucial measure is to train all staff in these basics and keep them abreast of the latest threats. Human error is often at the root of a breach, the mere opening of an email attachment by an unwitting employee could cause one. 
You therefore need to develop a security-aware culture. The government’s Cyber Essentials scheme sets out five controls that would help to reduce cyber-attacks on your company.

Cyber Security Insurance
Insurance is not yet widely viewed as a cyber security measure. Indeed, only 22 per cent of business we have spoken to have taken out such cover for their firms. 

But products in this area can insure against a range of risks, including network security liability, data and software damage, business interruptions and reputational harm. 

Although some events, including the theft of intellectual property, remain uninsurable because the associated losses are hard to prove and/or quantify, insurance is likely to feature heavily in any effective cyber strategy in the near future.

Cyber Audit 
We think that the UK should take more of a lead in this area and that the UK government should have standards that should be implemented to enhance Cyber Essentials with a Cyber Audit regulation, which we think is very important once the UK leaves the EU.

The new Cyber Essentials should include a Cyber/IT Audit at least twice a year at unannounced times, training of staff four times a year using on-line training sessions and cyber security insurance policy which takes into account the GDPR regulations along with Cyber Essentials and a checking cyber Audit and all of this would  reduce the cyber security risks and should reduce the cost of a business cyber insurance policy. 

Please contact: Cyber Security Intelligence for more information.

Image: Alpha Stock Images / Nick Youngson

 

« The GDPR Deadline Is Near & Business Is Not Ready
Infraud Cybercrime Site: Dozens Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.

Vortacity Cyber

Vortacity Cyber

Vortacity is a boutique cybersecurity provider specializing in associations, nonprofits, and mission-based organizations.