Small businesses: What you need to know about cyber security
|
|
|
- Roy Parsons
- 10 years ago
- Views:
Transcription
1 Small businesses: What you need to know about cyber security March 2015
2 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right... 5 Taking a risk management approach: Understanding the risks to your business... 6 How you can manage the risks... 7 Planning... 8 Implementing... 9 Reviewing Scenario: small business loses important contract Protect your business with Cyber Essentials Where to get more information, help and advice
3 What you need to know about cyber security You ve worked hard to build your business and make it a success. You re probably using a range of IT equipment and using the internet to advertise your business and sell online. The internet brings huge business opportunities and benefits, but it also brings risks. Every day there are cyber attacks on UK companies like yours, attempting to steal your information and money, or disrupt your business. It is increasingly important to manage these risks to take advantage of the internet whilst protecting your business. In 2014, 60% of small businesses experienced a cyber breach The average cost of the worst breach was 65, ,000 You can keep your business safe and protect against online threats by putting some simple measures in place. This guide shows you how. GET THE BASICS RIGHT Make sure you get the basics right by always downloading software updates, using strong passwords and deleting suspicious s. For more on how to get the basics right, see page 5. TAKE A RISK MANAGEMENT APPROACH ADOPT CYBER ESSENTIALS By understanding the risks to your business and managing them effectively, you can help to ensure all aspects of your business are protected against online threats. For more on how to take a risk management approach, see page 6. Cyber Essentials shows you how your business can protect against the common cyber threats seen online. Gaining the Cyber Essentials badge demonstrates your business takes this seriously. For more on Cyber Essentials, see page Small businesses: what you need to know about cyber security
4 Why you need to know about cyber security Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction. Good cyber security can enhance the reputation of your business and open up new commercial opportunities. Most companies now use the internet to do business, to advertise and sell, find new markets, customers and staff, communicate with customers and suppliers, and carry out financial transactions. The internet brings huge business opportunities and benefits. But it also brings risks. Every day there are attacks on the IT systems of UK companies like yours, attempting to steal your information and money, or disrupt your business. You can never be totally safe, but most online attacks can be prevented or detected with basic security practices for your staff, processes and IT systems. These security practices are as important as locking your doors or putting your cash in a safe. You can manage your online security in the same way you would protect any other aspect of your business. With more customers demanding that their suppliers are secure, this is becoming a business necessity. This guidance provides you with a good practice foundation for business owners and managers. You ll find links to other sources of good advice at the end of this booklet if you need them. You don t need to be an IT expert to improve your security. Simple measures can make all the difference. Take the simple steps set out in this booklet and your business will benefit. You can save money through adopting an efficient risk management approach - plan, implement and review. You can gain a competitive advantage by being seen to take security seriously gaining the Cyber Essentials badge will help you do this. Good security can be an enabler for a thriving business: you will be protecting your assets, your reputation, your customers, and your peace of mind. 4 Small businesses: what you need to know about cyber security
5 Getting the basics right Taking some simple actions and practising safe behaviours will reduce the risk of online threats to your business. Download software updates Download software and app updates as soon as they appear. They contain vital security upgrades that keep your devices and business information safe. Visit for further advice on updates. Use strong passwords Use strong passwords made up of at least three random words. Using lower and upper case letters, numbers and symbols will make your passwords even stronger. Visit for further advice on passwords. Delete suspicious s Delete suspicious s as they may contain fraudulent requests for information or links to viruses. Visit for further advice on suspicious s. Use anti-virus software Your computers, tablets and smartphones can easily become infected by small pieces of software known as viruses or malware. Install internet security software like anti-virus on all your devices to help prevent infection. Visit for further advice on security software. Train your staff Make your staff aware of cyber security threats and how to deal with them. The Government offers free online training courses tailored for you and your staff which take around 60 minutes to complete. Visit to find out more and take the course. For further simple tips on how to protect your business, visit 5 Small businesses: what you need to know about cyber security
6 Taking a risk management approach: Understanding the risks to your business What is directly at risk? Your money, your information, your reputation, your IT equipment and your ITbased services. Information is an asset that can take many forms: client lists, customer databases, your financial details, your customers financial details, deals you are making or considering, your pricing information, product designs or manufacturing processes. There is a risk to your IT services and information wherever they are stored, whether held on your own systems and devices, or on third-party hosted systems (i.e. in the cloud ). Who could pose a threat to these assets? Current or former employees, or people you do business with. Compromising your information by accident, through negligence, or with malicious intent. Criminals. Out to steal from you, compromise your valuable information or disrupt your business because they don t like what you do. Business competitors. Wanting to gain an economic advantage. What form could the threat take? Theft or unauthorised access of computers, laptops, tablets, mobiles. Remote attack on your IT systems or website. Attacks to information held in third party systems e.g. your hosted services or company bank account. Gaining access to information through your staff. What impact could an attack have? Financial losses from theft of information, financial and bank details or money. The average cost of the worst security breach is between 65,000 and 115,000. Financial losses from disruption to trading and doing business especially if you are dependent on doing business online. The worst breaches can result in a business being put of action for up to 10 days. Losing business from bad publicity & damage to your reputation & customer base. Costs from cleaning up affected systems and getting them up and running. Costs of fines if personal data is lost or compromised. Damage to other companies that you supply or are connected to. How bad could it be? A single successful attack could seriously damage your business. 6 Small businesses: what you need to know about cyber security
7 How you can manage the risks PLANNING 1. What information assets are critical to your business? 2. What kinds of risk could they be exposed to? 3. What legal and compliance requirements is your business subject to? 4. How could you continue to do business if you were attacked? 5. How can you manage these risks on an ongoing basis? See Planning on p.8 for simple steps to take IMPLEMENTING 1. Have you put in place the right security controls to protect your equipment, information, IT system and outsourced IT services? 2. Do your staff know what their responsibilities are? Do they know what good practice looks like? 3. If you are attacked or something goes wrong, how will you deal with it and get back to business? Who will you turn to for help? See Implementing on p.9 for simple steps to take REVIEWING 1. Are you reviewing and testing the effectiveness of your controls? 2. Are you monitoring and acting on the information you receive from them? 3. Do you know what the latest threats are? See Reviewing on p.10 for simple steps to take 7 Small businesses: what you need to know about cyber security
8 Planning Take these steps to make information security part of your normal business risk management procedures. Consider whether your business could be a target - this will indicate the level of risk your business is exposed to. Ask around to see whether any of your suppliers, major customers or similar businesses in your area have been attacked, so you can learn from their experiences. Know whether you need to comply with personal data protection legislation and Payment Card Industry compliance (see p.13 for links to further information). Identify the financial and information assets that are critical to your business, and the IT services you rely on, such as the ability to take payments via your website. Assess all the IT equipment within your business, including mobile and personal IT devices. Understand the risks to all of these things by considering how they are currently managed and stored, and who has access to them. Assess the level of password protection required to access your equipment and/or online services by your staff, third parties and customers, and whether it is enough to protect them. Ensure that your staff have appropriate awareness training, so that everyone understands their role in keeping the business secure. Decide whether you need to make an investment, or seek expert advice, to get the right security controls in place for your business. You could seek advice from accredited security consultants, internet and managed service providers or even your web designer if they have the capability. Consider who you could turn to for support if you are attacked, or if your online services are disrupted in some way. Define what your recovery procedures would be, and how you could keep your business running, particularly if you trade online. You may like to consider whether cyber insurance could protect your business against any impacts resulting from a cyber attack. 8 Small businesses: what you need to know about cyber security
9 Implementing Take these steps to put the right security controls in place for your business. If you use third-party managed IT services, check your contracts and service level agreements, and ensure that whoever handles your systems and data has these security controls in place. Malware protection: install anti-virus solutions on all systems, and keep your software and web browsers up to date. Consider restricting access to inappropriate websites to lessen the risk of being exposed to malware. Create a policy governing when and how security updates should be installed. Network security: increase protection of your networks, including wireless networks, against external attacks through the use of firewalls, proxies, access lists and other measures. Secure configuration: maintain an inventory of all IT equipment and software. Identify a secure standard configuration for all existing and future IT equipment used by your business. Change any default passwords. Managing user privileges: restrict staff and third-party access to IT equipment, systems and information to the minimum required. Keep items physically secure to prevent unauthorised access. Home and mobile working, including use of personal devices for work: ensure that sensitive data is encrypted when stored or transmitted online so that data can only be accessed by authorised users. Removable media: restrict the use of removable media such as USB drives, CDs, DVDs and secure digital cards, and protect any data stored on such media to prevent data being lost and malware from being installed. Monitoring: monitor use of all equipment and IT systems, collect activity logs, and ensure that you have the capability to identify any unauthorised or malicious activity. 9 Small businesses: what you need to know about cyber security
10 Reviewing Take these steps to review your security and respond to any changes or problems you identify, including attacks or disruption to business. Test, monitor and improve your security controls on a regular basis to manage any change in the level of risk to your IT equipment, services and information. Remove any software or equipment that you no longer need, ensuring that no sensitive information is stored on it when disposed of. Review and manage any change in user access, such as the creation of accounts when staff arrive and deletion of accounts when they leave. If your business is disrupted or attacked, ensure that the response includes removing any ongoing threat such as malware, understanding the cause of the incident and, if appropriate, addressing any gaps in your security that have been identified following the incident. If you fall victim to online fraud or attack, you should report the incident to the police via the Action Fraud website. You may need to notify your customers and suppliers if their data has been compromised or lost (see p.13 for links to further information). 10 Small businesses: what you need to know about cyber security
11 Scenario: small business loses important contract What was the impact? The company lost out on the contract. Without this work, it was impossible to maintain the full workforce and half of the employees were made redundant. This news was picked up by the local media, leading to lasting reputational damage and further loss of business. 11 Small businesses: what you need to know about cyber security
12 Protect your business with Cyber Essentials Once you've got the basics right and taken the steps outlined in this booklet, you are well on your way to becoming Cyber Essentials certified, which demonstrates to your customers you have good cyber security protections in place. Cyber Essentials is a new Government-backed and industry supported scheme to help businesses protect themselves against the common cyber threats seen online. Government analysis shows the majority of online threats could be prevented if businesses put basic security measures in place. This booklet describes many of those measures. Cyber Essentials builds on this by clearly setting out the five key controls organisations should have in place to protect against common internetbased threats. The Cyber Essentials documents are free to download and any organisation, large or small, can use the guidance to implement these essential security controls. Businesses can self-assess against the criteria, or seek independent verification and gain the Cyber Essentials badge, which enables your company to advertise the fact that it adheres to a Government endorsed standard. There are two levels of assurance to provide flexibility and affordability: Cyber Essentials and Cyber Essentials Plus. Cyber Essentials is for all organisations, of all sizes, and in all sectors. This includes companies in the private sector, universities, charities, and public sector organisations. The Government encourages all organisations to adopt the requirements as appropriate to their business. From October 2014, Cyber Essentials is mandatory for all suppliers of central Government contracts which involve handling personal information and providing certain ICT products and services. Many large firms are now adopting Cyber Essentials and will increasingly expect the businesses in their supply chains to hold Cyber Essentials certification too. For more information and to use a quick, online self-assessment tool, visit: 12 Small businesses: what you need to know about cyber security
13 Where to get more information, help and advice Cyber Streetwise The Cyber Streetwise campaign provides free, simple advice to help you and your business stay safe online. Free online training course Responsible for Information is an information security training course for owners, managers and staff in small and medium sized businesses. It takes around 60 minutes and includes an introduction to protection against fraud and cyber crime. Action Fraud Report internet and cyber crime online and find guidance on preventing fraud at: Business is GREAT campaign Do More Online helps small businesses find customers and sell goods & services online: HM Government 5,000 Innovation Vouchers are available which can be used by firms for advice to help protect and grow their business by having good cyber security. Information on the Government s UK Cyber Security Strategy and programme: Get Safe Online Practical advice on all aspects of cyber protection for small businesses at: Payment Card Industry Security Standards Council Advice on online trading and payment account data security at: Information Commissioner s Office (ICO) Advice on your business personal data responsibilities and obligations at: plus guidance on IT security and further advice and tools for small businesses. 13 Small businesses: what you need to know about cyber security
14 Crown copyright 2015 You may re-use this information (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. Visit write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or This publication is available on our website at Any enquiries regarding this publication should be sent to: Department for Business, Innovation and Skills 1 Victoria Street London SW1H 0ET Tel: [email protected] If you require this publication in an alternative format, [email protected] or call URN BIS/15/ Small businesses: what you need to know about cyber security
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
Cyber Essentials Scheme. Summary
Cyber Essentials Scheme Summary June 2014 Introduction... 3 Background... 4 Scope... 4 Assurance Framework... 5 Next steps... 6 Questions about the scheme?... 7 2 Introduction The Cyber Essentials scheme
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Cyber Essentials Scheme
Cyber Essentials Scheme Assurance Framework January 2015 December 2013 Contents Introduction... 3 Change from June 2014 version... 3 Overview... 4 Stage Definitions... 5 Stage 1 Cyber Essentials: verified
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government
Guiding Principles on Cyber Security Guidance for Internet Service Providers and Government December 2013 Contents Contents... 2 Industry Contributors... 3 Introduction... 4 Section 1 - Internet Service
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)
Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS) What is PCI DSS? The 12 Requirements Becoming compliant with SaferPayments Understanding the jargon SaferPayments Be smart.
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0
NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security
Connect Smart for Business SME TOOLKIT
Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
SMALL BUSINESS REPUTATION & THE CYBER RISK
SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
Guidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
PS177 Remote Working Policy
PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
How To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour
SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)
ENISA s ten security awareness good practices July 09
July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Keeping your online health and social care records safe and secure
Keeping your online health and social care records safe and secure Keeping your online health and social care records safe and secure By 2015, everyone in England will have access to their GP medical records
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification
Cyber Essentials Scheme Protect your business from cyber threats and gain valuable certification Why you need it Cybercrime appears in the news on an almost daily basis - but it s not just the large and
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
The Human Component of Cyber Security
www.thalescyberassurance.com In this white paper Humans, their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions,
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
PCI Data Security Standard 3.0
SECURELY ENABLING BUSINESS PCI Data Security Standard 3.0 Training Strategies That Work Presented by Doug Hall May 20, 2014 AGENDA PCI DSS 3.0 Training Strategies That Work PCI DSS 3.0 Overview PCI Training
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
Insolvent Company Investigations. What we do
Insolvent Company Investigations What we do 1 Contents Introduction... 3 What can directors of insolvent companies do?... 4 What is unfit conduct?... 4 The law... 5 What can we investigate?... 5 Who can
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business
Qualification Specification Level 4 Certificate in Cyber Security and Intrusion For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Payment Card Industry Data Security Standards.
Payment Card Industry Data Security Standards. Your guide to protecting cardholder data Helping you manage the risk. Credit Card fraud and data compromises are an increasingly serious problem, costing
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Shredding. Security. Recycling
Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
