Click me
Transcribed

8 Steps to setting up a risk management strategy - cyber security for your business

CYBER SECURITY FOR BUSINESS 8 steps to setting up a risk management strategy NETWORK FIREWALL AND THREAT PROTECTION • Protect your networks from attack. • Defend the network perimeter. • Filter our unauthorised access and malicious content. • Monitor and test security controls EMAIL FILTERING AND MEDIA CONTROLS • Produce policies and establish anti-malware defences. • Produce a policy to control all access to removable media. • Limit types and use. • Scan all media for malware before importing onto corporate systems. 3 MONITORING • Continuously monitor network and systems. • Establish a monitoring strategy. • Produce supporting policies. • Analyse logs for unusual activity that could indicate an attack. MANAGE USER PRIVILEGES • Establish effective management processes. • Limit the number of privileged accounts. • Limit user privileges and monitor activity. • Control access to activity and logs. DATA ENCRYPTION AND CONFIGURATION • Encrypt all data. • Apply security patches. • Ensure secure configuration of systems are maintained. Create a system inventory and define a baseline for all devices. USER EDUCATION AND AWARENESS • Produce security policies covering acceptable and secure use of systems. • Provide staff training. • Maintain awareness of cyber risks. • Update staff training and awareness regularly. 7 HOME AND MOBILE WORKING • Develop a mobile working policy • Train allstaff to adhere to set policies. • Apply the secure baseline and build to all devices. • Protect data in transit and at rest. ((-)) 8 INCIDENT MANAGEMENT • Establish an incident response and disaster recovery capability. Test your incident management plans. • Provide specialist training. • Report criminal incidents to law enforcement. Get Our Updates: f /TheAnalystAgency THE ANALYST AGENCY, LLC 50 Fountain Plaza, Suite 1400 Buffalo, NY 14202 (716) 771-0620 [email protected] lanalystagency THE ANALYST AGENCY Our Eyes On Your Growth O/stevenczyrny

8 Steps to setting up a risk management strategy - cyber security for your business

shared by britneychristine on Oct 13
0 views
0 shares
0 comments
The biggest advantage is that the best in IT security cyber security solutions can provide comprehensive digital protection to your business. This will allow your employees to surf the internet as and...

Category

Business
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size