Cyber Security: Protecting your business survey stats

Size: px
Start display at page:

Download "Cyber Security: Protecting your business survey stats"

Transcription

1 Cyber Security: Protecting your business survey stats Researched and authorised by Pitmans LLP in partnership with techuk. Report prepared in January 2014 by Philip James, Partner and Rob Jarrett, Solicitor. Copyright Pitmans LLP All rights reserved.

2 Disclaimer Please note that whilst every effort has been made to ensure this report is accurate and error free, it is based on the responses received to our survey and may only represent a small cross section of businesses. As such, this report may contain errors and it should not be relied upon or used for any commercial reason without Pitmans prior approval.

3 Contents Executive Summary p3 Part I Summary Report p5 Part II Cyber Security p8 Part III Bring your Own Device (BYOD) p16 Part IV Remote Working p18 Part V Insurance p20 Part VI Social Media p23 Commentary by techuk p25 Key Contacts p27 Pitmans LLP 47 Castle Street Reading Berkshire, RG1 7SR 1 Crown Court 66 Cheapside London, EC2V 6LR 2

4 Executive Summary The vast majority of respondents (over 85%) feel that cyber security is a concern for their business. Over 70% of respondents feel that cyber security is a high priority for senior management with more than 50% of businesses having C-suite level responsibility for cyber security policies and capabilities. Businesses feel their main cyber security threat is anything that disrupts business as usual, including hacking, viruses, malware, loss of data and unauthorised access to data, files and company information. Over two thirds of companies undertake cyber security risk assessments with firms in the Thames Valley more pro-actively than those nationally. Over 70% of Managing Directors are unsure as to how their businesses would tackle further cyber breaches. In addition, only were confident to very confident in their ability to manage a cyber-attack. periodically test their crisis management and emergency response strategies, of which just over half (53%) have implemented related policies and procedures. 3

5 The majority of businesses can work remotely (over 90%) although their biggest concern is data and system security. Most businesses (81%) have minimum security requirements for remote working. Although many companies see cyber security as a concern, very few have insurance in place to deal with cyber breaches with only 7% investing in stand-alone cyber security insurance. A significant number of respondents were unaware of their company s cyber risk insurance, previous breaches or their potential future response to an online attack. Only 13% of businesses require their third party suppliers to have specific cyber insurance. 75% of businesses allow use of social media at work with two thirds aware of a specific policy for staff. Only one third of companies monitor use of social media or have policies in place to prevent defamatory statements being posted by staff. 4

6 Part 1: Summary Report Pitmans LLP reviewed their annual survey to assess the changing business conditions, primarily in respect of cyber security in the UK between 2012 and 2013 to which over 200 business leaders participated. This report summarises their responses and is valid to 23 December Respondents by geographical split: The survey was completed by an even split of Thames Valley based and non-thames Valley based businesses and is therefore representative of a wide variety of industry sectors. Unless otherwise stated, results mentioned include those from all survey respondents. Thames Valley based respondents: 47% (2013) n-thames Valley based respondents: 53% (2013) Geographical split of respondents by sector: Finance Technology & Telecoms Accountancy Business Consultancy Property Automotive Hospitality Insurance Construction & Engineering Marketing Sport/Leisure Energy Legal Pharma Banking Other Charity Public Sector Healthcare Recruitment Retail Transport 10% 30% 5

7 Respondents by company turnover: 50% 30% 10% Less than 25m 25m 100m From those who disclosed their turnover (94%), it is clear that the respondents to the survey represented companies of a variety of sizes, with 30% of respondents representing companies whose revenue was more than 100m. Respondents by job title: More than 100m MD/CEO/Chairman Director Finance Partner Marketing & BD Legal Human Resources Manager Other % % of survey respondents were Managing Directors or CEOs. 21% were Directors. 34% were senior management or above. Those in a Financial role made up a further 6% of respondents. The remaining 66% of survey respondents comprised of HR, Finance, Legal, Marketing & BD and other management level positions. 30 6

8 Respondents by number of employees: 50% 30% 10% More than 250 Over half of respondents represented companies employing more than 250 employees. These respondents accounted for 51%. 35% of those participating in the survey represented SMEs (more than 10 but less than 250 staff). Micro (less than 10 employees) firms participated. 7

9 Part 2: Cyber Security Is cyber security a concern for your company? 87% of survey respondents agreed cyber security was a concern for their company. Of those confirming that cyber security was a concern for their business, respondents were evenly spread across the country. Does your company consider cyber security an IT department issue or a senior management issue? 100% 80% IT Department Senior Management 70% of survey respondents stated their company viewed cyber security as a senior management issue. 30% of survey respondents stated their company viewed cyber security as an IT department issue. Despite location, survey respondents felt cyber security was a senior management issue. 8

10 How high a priority is cyber security to senior management? 50% 30% 10% Very high High Low t a priority 39% of survey respondents stated that cyber security was a very high priority; of which 43% of Managing Directors who took part in the survey agreed. 15% of survey respondents felt cyber security was a low priority to senior management, with 3% considering cyber security no priority at all to senior management. All MDs and FDs considered cyber security to be a high to very high priority for their business. Is there an individual at board level who has responsibility for your company s cyber security policies and capabilities? 9 of respondents confirmed that their firm has an individual at board level responsible for their company s cyber security policies and capabilities. 28% of survey respondents stated their company had no individual at board level who took responsibility for cyber security. Only 12% of respondents stated unknown, highlighting that most staff are aware that their company has an individual that is responsible for its cyber security policies.

11 Does your company have a specific budget to address cyber security? 23% of survey respondents stated their company has a specific budget to address cyber security. However, more than 50% stated their company didn t account for cyber security in its budget. Does your company ensure employees are aware of cyber security of your company s data and IT infrastructure? 100% 80% 70% of survey respondents confirm their company ensures employees are aware of cyber security, whereas 30% of companies don t. Many companies ensure their employees are kept aware of cyber security through policies and staff training. Internal communication is also a key component in keeping staff up to date with cyber security. 10

12 What do you perceive to be the main threats to the security of your company s data and IT infrastructure? The main threat to survey respondents was anything that disrupted business as usual, this included: Hacking Viruses Malware Loss of data Unauthorised access to data, files and company information A small number of survey respondents felt their security could be at threat through improper use of their company s IT by an employee. Of survey respondents, a significant number of Managing Directors felt viruses and hacking were the main threats to the security of their company s data and IT infrastructure. If your company has cyber security policies and/or systems to identify cyber security breaches; do you consider these sufficient to protect your business? t applicable 65% of survey respondents felt they had sufficient systems in place to protect their business, whereas 15% felt their systems were inappropriate to prevent breaches occurring. of survey respondents had no cyber security policies or systems in place to identify cyber security breaches. 92% of Managing Directors consider their cyber security policies and systems sufficient to protect their business. 11

13 Does your company carry out cyber security risk assessments? 66% of survey respondents carry out cyber security risk assessments, compared to 34% of survey respondents who do not. If yes, are these risk assessments managed internally or externally? 100% 80% Internally Externally 27% of survey respondents manage cyber security risks assessments externally. 73% of respondents manage cyber security risks assessments internally. 12

14 Does your company have crisis management/ emergency response strategies in place should a cyber breach occur? 100% 80% 53% of survey respondents confirmed they had a response strategy in place should a cyber breach occur. 30% of respondents stated their business had no emergency response in place should a cyber breach occur. Does your company periodically test its crisis management/emergency response strategies? Only 38% of businesses periodically test their crisis management/emergency response strategies. of survey respondents stated that they did not periodically test their crisis management/ emergency response strategies and 22% of survey respondents were unaware if they had response strategies. 54% of Managing Directors that contributed to the survey confirmed their company tested their response strategies. 13

15 How confident are you in your company s crisis management/emergency response abilities should a cyber breach occur? 100% 80% Very confident Confident Over half of survey respondents felt confident in their company s abilities to deal with a cyber breach. 26% of survey respondents were not confident in their company s crisis management/ emergency response abilities. 38% of Managing Directors are very confident in their abilities to respond should a breach occur. Has your company suffered a cyber security breach? t confident 13% of survey respondents stated they have suffered a cyber security breach. More than half of survey respondents stated they have not experienced a cyber security breach. 38% of respondents felt that company failed to effectively deal with the breach. 47% of respondents perceived that their company dealt well to very well with the breach. 14

16 Would your company take a different approach were it to suffer a further breach? 100% 80% 24% of survey respondents would take a different approach if they were to suffer a further breach. 17% of survey respondents were satisfied with their approach. Of survey respondents, an overwhelming 59% were unsure whether they would take a different approach if they were to suffer a further breach. 66% of Managing Directors are unaware of whether their company would take a different approach for future breaches. 15

17 Part 3: Bring Your Own Device Does your company allow use of personal devices for work purposes? 100% 80% 58% of companies allow of use personal devices for work purposes. Do you know what proportion of your staff use a personal device for company work? 45% of respondents confirmed they know what proportion of their staff use a personal device for company work. Of these, 21% stated that all of their staff use a personal device for work purposes. Only 22% stated that less than a quarter use a personal device for company work. 4% of survey respondents stated half of their employees use a personal device for company work. 16

18 Does your company have a BYOD policy governing use of devices? 43% of survey respondents were aware of BYOD policy governing use of devices, whereas 36% of survey respondents stated their company does not have a BYOD policy. 21% of survey respondents were unaware whether their company had a BYOD policy governing use of devices. What restrictions on access/storage are in place? Unlimited access for devices Access only to non-sensitive systems and data Access but with IT control over devices, apps and stored data Access, but no local storage of data on devices Other 34% of survey respondents stated they had access but with IT control over devices, apps and stored data. of respondents confirmed that they have access but with no local storage of data on devices. of respondents have access only to nonsensitive systems and data. 19% of respondents stated they have unlimited access for devices. 17

19 Part 4: Remote Working Does your company allow remote working? Over 90% of all survey respondents confirmed their companies allowed remote working, regardless of their location. What is your company s biggest concern in relation to remote working? Data/system security Employee supervision Employee productivity Employee welfare (i.e. loneliness /isolation) Other The main concern for survey respondents is data and system security () when working remotely. of Managing Directors concurred with this. 29% of survey respondents felt employee productivity was a concern in relation to working remotely. Only 17% felt that employee welfare was a concern. 18

20 Does your company have minimum security requirements for remote working i.e. virus protection software? 81% of respondents confirmed their companies have minimum security requirements to support remote working. 12% stated they do not have the minimum security requirements for remote working. Only 7% of survey respondents stated they were unsure whether their company has minimum levels of security in place. 19

21 Part 5: Insurance Does your company have cyber insurance (either as part of a general policy or a specific, separate cyber policy)? 100% 80% Almost half (49%) of survey respondents stated they did not know if their company had cyber insurance. 16% confirmed that their company does have cyber insurance. 35% of survey respondents stated their company do not have cyber insurance. 69% of Managing Directors that took part in this survey were unsure whether their company had cyber insurance. Only 8% of MDs were aware if their company had appropriate insurance to cover cyber threats. 20

22 If so, is this insurance included as part of a general traditional policy or is it part of a separate, stand-alone cyber insurance policy? 100% 80% Part of general insurance Stand-alone cyber insurance For those who confirmed they had insurance, 36% of survey respondents said they had cyber insurance as part of their general insurance. Only 7% had independent cyber Insurance. What is the minimum cover of your stand-alone cyber insurance cover? Between 1m and 5m Between 5m and 10m 80% of survey respondents were unaware of the minimum cover of the stand-alone cyber insurance cover. 16% of respondents said the minimum cover of their stand-alone cyber insurance cover was between 1 million and 5 million. Only 4% have minimum cover between 5 million and 10 million. 21

23 Does your stand-alone cyber insurance cover third party suppliers? 100% 80% 89% of survey respondents were unaware whether their company s stand-alone cyber insurance covered third party suppliers. Only 2% of survey respondents confirmed their stand-alone cyber insurance covered third party suppliers. 9% of respondents confirm their stand-alone cyber insurance cover third party suppliers. Do you require your key suppliers to have specific cyber insurance? Almost half of all respondents (49%) were unaware if having specific cyber insurance was a requirement for their key suppliers. 38% do not require key suppliers to have specific cyber insurance. 13% of respondents felt it necessary for their key supplier to have appropriate cyber insurance. 22

24 Part 6: Social Media Does your company allow employees to use social media at work for personal and/or work purposes? 100% 80% 75% of respondents confirmed their companies allowed them to use social media at work for personal and work purposes, whereas 25% do not. Does your company have a social media policy governing acceptable use and compliance with law? 64% of survey respondents confirmed their company has a social media policy governing acceptable use of social media which is in compliance with the law. 28% of survey respondents confirmed their company does not have a social media policy. 23

25 Does your company monitor employees use of social media? 100% 80% 48% of survey respondents confirmed their company does not monitor employees use of social media, whereas 33% of companies do. 19% of respondents were unaware whether their company monitor their use of social media. Does your company have a reputation management strategy should an employee post something defamatory/offensive? 43% of survey respondents said their companies do not have a reputation management strategy. 35% of respondents confirmed they have a strategy should an employee post something defamatory or offensive. 24

26 Commentary by techuk It is no wonder that so many companies said cyber security was a concern for them. The potential cost of an attack can be very high for businesses, Government estimates the average costs of a breach to a small or medium business was 35-65k in 2013 rising to up to 850,000 for larger enterprises. Damage goes wider than the cost of response time and business disruption: theft of IP, loss of data, business and reputation can all take much longer to rebuild at a much greater cost. Conversely, companies can capitalise on strong cyber security and cyber risk management, turning it into a competitive advantage. Knowing your data assets, for example, enables you to fully exploit them whilst having a strong reputation for keeping customer data secure can build confidence and business. Businesses understand that they are at risk from cyber attack but employees are not always aware where the risk lies. Recent research by techuk and Symantec found that 71% of respondents thought the IT department was at risk from cyber attack but only 31% thought the HR department was a target and 34% the sales department. However, targeted attacks against employees working in sales and with confidential information surged by 42% in the last year. Successful mitigation of cyber risk will require everyone to take responsibility for it. 25

27 The enterprise is expanding as companies adopt cloud solutions and increasing numbers of employees work on mobile devices including personal ones. The proportion of companies letting employees use their own devices rose from 63% to 80% in the last year whilst up to a quarter of IT spending by 2015 will be on service-enabled software. This new landscape will present challenges in securing the enterprise, McAfee for example observed a 33% rise in the volume of malware aimed at the android platform last year whilst growth in malware targeting PCs remained flat. Nearly of respondents to this survey said their company allowed employees to use personal devices but they were not aware of any policies governing use. CIOs will need to work quickly to overcome new security challenges if they are to derive maximum benefit from the new technology landscape. Ruth Davis Head of Cyber, Justice and Emergency Services techuk Comments from CBI Cyber attacks are now in the same league as other mainstream business risks and should be taken seriously in boardrooms across the UK. The good news is that more businesses are becoming aware of the threat, but the findings suggest a complacency amongst businesses that will need to change as more and more businesses operate across borders and head online. Part of the answer is in collaboration, with more businesses working with other firms, and with government, to provide safe, flexible ways of sharing information on cyber attacks and the solutions to overcome and mitigate the risk. Steve Rankin Regional Director CBI 26

28 Pitmans Cyber Risk Management Team Philip James Partner T: E: Tim Clark Partner T: E: William Richmond-Coggan Partner T: E: Philip Smith Director T: E: Richard Devall Partner T: E: Mark Symons Partner T: E: Rob Jarrett Solicitor T: E: 25 e: t:

Impact of Data Breaches

Impact of Data Breaches Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Are you being served? How can Security as a Service serve you? WHITE PAPER. Commissioned by SecureData Conducted by Vanson Bourne Published July 2013

Are you being served? How can Security as a Service serve you? WHITE PAPER. Commissioned by SecureData Conducted by Vanson Bourne Published July 2013 Are you being served? How can Security as a Service serve you? Commissioned by Conducted by Vanson Bourne Published July 2013 Part 1. Executive summary Businesses are starting to implement cloud technologies

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification Cyber Essentials Scheme Protect your business from cyber threats and gain valuable certification Why you need it Cybercrime appears in the news on an almost daily basis - but it s not just the large and

More information

Corporate Security in 2016.

Corporate Security in 2016. Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried

More information

Cyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen

Cyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen Cyber Security : preventing and mitigating incidents Alexander Brown Robert Allen 07 & 08 October 2015 Cyber Security context of the threat The magnitude and tempo of [cyber security attacks], basic or

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world

More information

Guidance on data security breach management

Guidance on data security breach management ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Guides & Advice. Our Employment Service

Guides & Advice. Our Employment Service Guides & Advice Our Employment Service Our Employment Team With a strong reputation in the region our Employment team provides expert advice to organisations and individuals on all aspects of the employment

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Cyber Essentials Scheme. Summary

Cyber Essentials Scheme. Summary Cyber Essentials Scheme Summary June 2014 Introduction... 3 Background... 4 Scope... 4 Assurance Framework... 5 Next steps... 6 Questions about the scheme?... 7 2 Introduction The Cyber Essentials scheme

More information

Global Corporate IT Security Risks: 2013

Global Corporate IT Security Risks: 2013 Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

The Yorkshire SME Internet Connectivity and Business Growth Survey 2015

The Yorkshire SME Internet Connectivity and Business Growth Survey 2015 The Yorkshire SME Internet Connectivity and Business Growth Survey 2015 Foreword by David Tindall This survey took place in May 2015, when Talk Straight joined forces with Yorkshire Business Insider to

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives Cyber Risk as a Component of Business Risk: Communicating with the C-Suite Jigar Kadakia DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily

More information

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs Small Business Cybersecurity Dos and Don ts September 25, 2015 Dover Downs Helping Businesses Grow and Succeed For Over 30 Years Statistics 2 Results from the Cybersecurity Readiness Survey 25% of Respondents

More information

How To Protect Your Business From A Cyber Attack

How To Protect Your Business From A Cyber Attack Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It

More information

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers

More information

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

MONTHLY WEBSITE MAINTENANCE PACKAGES

MONTHLY WEBSITE MAINTENANCE PACKAGES MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Assurance Framework January 2015 December 2013 Contents Introduction... 3 Change from June 2014 version... 3 Overview... 4 Stage Definitions... 5 Stage 1 Cyber Essentials: verified

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

Guidance on data security breach management

Guidance on data security breach management Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction

More information

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT

More information

Study of the Impact of cyber crime on businesses In canada

Study of the Impact of cyber crime on businesses In canada Study of the Impact of Cyber Crime on businesses in Canada 2 Introduction The International Cyber Security Protection Alliance (ICSPA) www.icspa.org, has conducted a study on the impact of cyber crime

More information

Cyber Security Issues - Brief Business Report

Cyber Security Issues - Brief Business Report Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete

More information

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31 THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

July 2013 Leading business advisers. Irish Information Security and Cybercrime Survey 2013.

July 2013 Leading business advisers. Irish Information Security and Cybercrime Survey 2013. July 2013 Leading business advisers Irish Information Security and Cybercrime Survey 2013. Contents Executive summary 3 Key observations 4 About the survey 5 Key findings the numbers 6 Snapshot view 7

More information

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

Global IT Security Risks

Global IT Security Risks Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

Why cybersecurity is a strategic issue

Why cybersecurity is a strategic issue Why cybersecurity is a strategic issue Is your business one hack away from disaster? By Syed Ali, Vishy Padmanabhan and Jim Dixon Syed Ali is a principal with Bain & Company in Chicago. Vishy Padmanabhan

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT. October 2013. Sponsored by:

INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT. October 2013. Sponsored by: 2013 INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT & October 2013 & INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT: The Third Annual Survey on the Current State of and Trends in Information

More information

FEELING VULNERABLE? YOU SHOULD BE.

FEELING VULNERABLE? YOU SHOULD BE. VULNERABILITY ASSESSMENT FEELING VULNERABLE? YOU SHOULD BE. CONTENTS Feeling Vulnerable? You should be 3-4 Summary of Research 5 Did you remember to lock the door? 6 Filling the information vacuum 7 Quantifying

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Data Security Breach Management - A Guide

Data Security Breach Management - A Guide DATA PROTECTION (JERSEY) LAW 2005 GUIDANCE ON DATA SECURITY BREACH MANAGEMENT GD21 2 DATA PROTECTION (JERSEY) LAW 2005: GUIDANCE ON DATA SECURITY BREACH MANAGEMENT Introduction Organisations which process

More information

Defensible Strategy To. Cyber Incident Response

Defensible Strategy To. Cyber Incident Response Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Save costs, deliver flexible working and manage the risks Gary Shipsey Managing Director 25 September 2014 Agenda Bring Your Own Device (BYOD) and your charity and how to avoid the

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

Protecting and promoting patients interests licensing providers of NHS services

Protecting and promoting patients interests licensing providers of NHS services Protecting and promoting patients interests licensing providers of NHS services Your response to the consultation You may re-use the text of this document (not including logos) free of charge in any format

More information

Critical Information Protection & Security Questions for the Board to ask. January 2016

Critical Information Protection & Security Questions for the Board to ask. January 2016 Critical Information Protection & Security Questions for the Board to ask January 2016 Introduction Board Directors have a number of roles and responsibilities. Asking the right questions of those managing

More information

Big Data for Law Firms DAMIAN BLACKBURN

Big Data for Law Firms DAMIAN BLACKBURN Big Data for Law Firms DAMIAN BLACKBURN PUBLISHED BY IN ASSOCIATION WITH Big data means big business By Simon Briskman, partner, technology & outsourcing group, Field Fisher Waterhouse LLP BIG DATA is

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015 Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

Is your Organization SAFE?

Is your Organization SAFE? Is your Organization SAFE? About Enterprise Risk Management (ERM) About The Presenter Mike Sanchez, Senior Vice President at ERM Captain, USMC (Ret.) COBIT 5 Certified Possesses over 20 years of experience

More information

Understanding Security Complexity in 21 st Century IT Environments:

Understanding Security Complexity in 21 st Century IT Environments: Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

Solicitors. Specialist Solicitor Accountants. Newsletter Winter 2015. Simon Bladen Legal Partner. Introduction

Solicitors. Specialist Solicitor Accountants. Newsletter Winter 2015. Simon Bladen Legal Partner. Introduction Solicitors Specialist Solicitor Accountants Newsletter Winter 2015 Introduction Welcome to our final newsletter of 2015. It has been an interesting year for the sector and as such we have tried to cover

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Data Protection Compensation Claims. White Paper

Data Protection Compensation Claims. White Paper Data Protection Compensation Claims White Paper April 2015 Executive Summary The recent Vidal-Hall v Google case marks a dramatic change in Data Protection law. For the first time, the courts made a definitive

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Commissioned by: Conducted by: In association with:

Commissioned by: Conducted by: In association with: INFORMATION SECURITY BREACHES SURVEY 2014 technical report Commissioned by: The Department for Business, Innovation and Skills (BIS) is building a dynamic and competitive UK economy by: creating the conditions

More information

MANAGING DIGITAL RISKS IN THE RETAIL WORLD

MANAGING DIGITAL RISKS IN THE RETAIL WORLD Risk Insight WILLIS RETAIL PRACTICE MANAGING DIGITAL RISKS IN THE RETAIL WORLD The retail sector has been revolutionised by developments in the digital world, opening up a whole new way to access consumers

More information

The Internet and Corporate Reputation

The Internet and Corporate Reputation The Internet and Corporate Reputation What you need to know Windfall Media How the internet is affecting the corporate reputation of AIM quoted companies Online reputation The power of search engines and

More information

Healthcare Security: Improving Network Defenses While Serving Patients

Healthcare Security: Improving Network Defenses While Serving Patients White Paper Healthcare Security: Improving Network Defenses While Serving Patients What You Will Learn Safeguarding the privacy of patient information is critical for healthcare providers. However, Cisco

More information

EHS Privacy and Information Security

EHS Privacy and Information Security EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

State of the Phish 2015

State of the Phish 2015 Introduction The threat is real Phishing continues to pose a growing threat to the security of industries of every kind from financial organizations to government contractors to healthcare firms. Though

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience. MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred

More information

MANAGED WORKSTATIONS: Keeping your IT running

MANAGED WORKSTATIONS: Keeping your IT running MANAGED WORKSTATIONS: Keeping your IT running What state are your PCs in? Systems running slowly? PCs or laptops crashing for no reason? Too much time trying to resolve simple IT issues? Out-of-date software?

More information

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Is cyber security now too hard for enterprises? Executive Summary Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2

More information

Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers

Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers Breaching Bad: New Cyber Security Risks & Regulations Affecting Suppliers At All Tiers Securing the Infrastructure April 2015 Stan Stahl, Ph.D. President Citadel Information Group Phone: 323.428.0441 Stan@Citadel-Information.com

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

33500 POLICY USE OF SOCIAL MEDIA

33500 POLICY USE OF SOCIAL MEDIA Version: 1.2 Last Updated: 15/06/15 Review Date: 25/06/18 ECHR Potential Equality Impact Assessment: Low 1. About This Policy 1.1. This policy describes how Hampshire Constabulary s use of social media

More information

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About

More information

Digital Leaders Survey

Digital Leaders Survey Contents 1. Key findings 3 2. Top three management issues 4 3. Top three IT topics or trends 5 4. Additional resources needed to address the issues prioritised 6 5. Skills gaps 7 6. Concerns about future

More information