Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

7 steps to secure your operations from cyber


Published on

Security of information for business matters. Here are some easy steps to keeping it tight.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

7 steps to secure your operations from cyber

  1. 1. Step 1 Security audit Before you protect your data it’s essential to know what data you have! Identify the datasets that need the most protection - such as those with regulatory compliance requirements (e.g. customer information). Locate every dataset. Is it on a server? In the cloud? Downloaded on to staff laptops and smartphones? Working with an IT professional to audit your systems will make this clear. Step 2 Staff awareness It’s vital to train staff to be security-aware because most data breaches are accidental. ...and many cyber attacks are achieved with the unwitting help of staff, e.g. persuading people to hand over passwords. And remember to explain to staff that certain online activities can jeopardise business data. Step 3 Encryption Encryption sounds more complex than it is. Your data can be encrypted, end to end, meaning that no business data is readable by those without the correct access credentials. This can be applied to information on a whole range of devices, so you can sleep soundly even when your finance manager’s laptop gets stolen or a salesperson leaves their smartphone on the train. Step 4 Backups When disaster does strike it’s important to have a recovery strategy. And you need a regular routine for backups, so systems can be rolled back in the event of a problem. Remember to test your backup arrangements. Step 5 Password policy A formal password policy will save you grief in the long term. Passwords should be long, a mixture of characters, cases and symbols and never shared between applications. Make sure your staff know this too. Consider forcing passwords to be changed periodically. Step 6 Software installation policy Don’t allow staff to install their own software on work PCs, without good reason. Whether it’s a useful service that will make work easier, or simply downloading stuff from the Internet, too much DIY threatens the integrity of the business’s data. Step 7 Access management To make things as simple as possible, don’t give people access to data they don’t need. And make sure your computers don’t run in ‘administrator’ mode. That way, any breaches that do occur will be less damaging. Takeaways A security audit is essential for discovering what data you have on which systems, and where. Staff need to know what data must be secure, and, most importantly, why it needs to be kept secure. Informed staff make better decisions. Backups and recovery are an essential part of data security. What will you do if you discover a breach? 7 StepsTo Secure Your Operations from Cyber Threats Security of information for business matters, but with breaches on the increase, it’s more important than ever to keep business data protected. Here are 7 easy steps to keeping it tight Get your guide to achieving full business continuity with your IT infrastructure. Download: Keeping the Lights On: The Business Leader’s Guide to Operations and IT Download the eGuide now!