SlideShare a Scribd company logo
1 of 23
How to cyber protect your
business for free
A guide to the official advice and tools available for free
By Kevin Else, Director, Click and Protect
www.clickandprotect.co
Agenda
• Brief introduction to Click and Protect
• Guidance
• Training tools
• Toolkits
• Free monitoring
• Q/A
Click and Protect
• Run by Cyber Security Partners
• £200/month for a security expert on call
• See www.clickandprotect.co for info
Guidance
National Cyber Security Centre
• First port of call
• “Helping to make the UK the safest
place to live and work online”
• No matter what size your organisation
https://www.ncsc.gov.uk/section/advice-guidance/all-topics
Guidance
National Cyber Security Centre
• Information tailored by size of
organisation
• Information for business people and
cyber professionals
• News and guidance
https://www.ncsc.gov.uk/section/information-for/small-medium-sized-organisations/
Guidance
Information Commissioner’s Office
• Independent authority
• Data protection and privacy
• Information to help meet data
protection obligations—no matter
what size your organisation
https://ico.org.uk/for-organisations/
Guidance
National Cyber Resilience Centres
• Set up by Home Office
• Unites police, private sector and
academia
• Across England and Wales
• Free membership
https://nationalcrcgroup.co.uk/regional-centres/
Training
Centre for Protection of National
Infrastructure (CPNI)
• Awareness videos & resources
https://www.cpni.gov.uk/security-campaigns/think-you-link
Training
National Cyber Security Centre
• Online training for staff
• Fundamentals of cyber security
https://www.ncsc.gov.uk/training/v4/Top+tips/Web+package/content/index.html#/
Training
National Cyber Security Centre
• Assess your business resilience
• Practice before an attack happens
https://www.ncsc.gov.uk/information/exercise-in-a-box/
Training
Barclays
• Digital skills training
• Not just cyber security
https://digital.wings.uk.barclays/our-digital-courses/digital-skills-for-business/cyber-security-for-business/
Training
Information Commissioner’s Office
• Offers training material they use for
their own staff
• Videos
• Posters and handouts
https://ico.org.uk/for-organisations/posters-stickers-and-e-learning/
Toolkits
National Cyber Security Centre
• Designed to encourage discussion
• Uses business language
https://www.ncsc.gov.uk/collection/board-toolkit
Toolkits
British Retail Consortium
• Plain English guide to cyber security
• Potential threats
• Responsibilities
• Resources
• Protections to consider
• How to recover after an attack
• Specific retail advice – but useful for
most businesses
https://brc.org.uk/media/676134/cyber-resilience-toolkit-for-retail.pdf
Toolkits
Information Commissioner’s Office
• How well do you comply with the law?
• How could you improve?
https://ico.org.uk/for-organisations/sme-web-hub/checklists/assessment-for-small-business-owners-and-sole-traders
Tools
Get Safe Online
• Check for scam sites – before using
them
• Checks against multiple lists
• Provides report, so you can decide
https://www.getsafeonline.org/business/checkawebsite/
Tools
GoPhish
• Set up a phishing simulation
• Send out practice phishing emails
• Help train your staff in spotting attacks
https://getgophish.com/
Monitoring
Cyberalarm
• UK Police and Home Office
• Identifies suspicious data being sent
• Scans your system for vulnerabilities
• Reports on findings
https://www.cyberalarm.police.uk/
Monitoring
NCSC Early Warning
• Checks your external network
information against datasets
• Notifies you of potential issues
• Enables you to respond quickly
• Reduces risk of successful attacks
https://www.ncsc.gov.uk/information/early-warning-service
Monitoring
Have I been Pwned
• Check if your data has been breached:
• Email
• Phone
• Password
• Find out if your data is available online
• Get notified if it happens in the future
https://haveibeenpwned.com/
Q&A
What are your cyber security issues?
Thank You
If you would like a copy of the slides please fill out
our signup sheet at our stand, just behind you at
B716.
clickandprotect.co
contactus@clickandprotect

More Related Content

Similar to How to cyber protect your business for free

Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterPeter Jones
 
It4 ccommunityi tresources
It4 ccommunityi tresourcesIt4 ccommunityi tresources
It4 ccommunityi tresourcesVoscur Staff
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for BusinessBente Larsen
 
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...Erik Ekholm
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnJohn Moran
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Erik Ekholm
 
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudThree Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudAcquia
 
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBMLéo Lemordant
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018Ray Bugg
 

Similar to How to cyber protect your business for free (20)

Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
It4 ccommunityi tresources
It4 ccommunityi tresourcesIt4 ccommunityi tresources
It4 ccommunityi tresources
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for Business
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Brochure EBRC 2016
Brochure EBRC 2016Brochure EBRC 2016
Brochure EBRC 2016
 
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudThree Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
 
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
Digital destinations: Be inspired by best practice
Digital destinations: Be inspired by best practice Digital destinations: Be inspired by best practice
Digital destinations: Be inspired by best practice
 

More from Cyber Security Partners

CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023Cyber Security Partners
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsCyber Security Partners
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceCyber Security Partners
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Cyber Security Partners
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxCyber Security Partners
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxCyber Security Partners
 
'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a TwistCyber Security Partners
 

More from Cyber Security Partners (9)

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

How to cyber protect your business for free

  • 1. How to cyber protect your business for free A guide to the official advice and tools available for free By Kevin Else, Director, Click and Protect www.clickandprotect.co
  • 2. Agenda • Brief introduction to Click and Protect • Guidance • Training tools • Toolkits • Free monitoring • Q/A
  • 3. Click and Protect • Run by Cyber Security Partners • £200/month for a security expert on call • See www.clickandprotect.co for info
  • 4. Guidance National Cyber Security Centre • First port of call • “Helping to make the UK the safest place to live and work online” • No matter what size your organisation https://www.ncsc.gov.uk/section/advice-guidance/all-topics
  • 5. Guidance National Cyber Security Centre • Information tailored by size of organisation • Information for business people and cyber professionals • News and guidance https://www.ncsc.gov.uk/section/information-for/small-medium-sized-organisations/
  • 6. Guidance Information Commissioner’s Office • Independent authority • Data protection and privacy • Information to help meet data protection obligations—no matter what size your organisation https://ico.org.uk/for-organisations/
  • 7. Guidance National Cyber Resilience Centres • Set up by Home Office • Unites police, private sector and academia • Across England and Wales • Free membership https://nationalcrcgroup.co.uk/regional-centres/
  • 8. Training Centre for Protection of National Infrastructure (CPNI) • Awareness videos & resources https://www.cpni.gov.uk/security-campaigns/think-you-link
  • 9. Training National Cyber Security Centre • Online training for staff • Fundamentals of cyber security https://www.ncsc.gov.uk/training/v4/Top+tips/Web+package/content/index.html#/
  • 10. Training National Cyber Security Centre • Assess your business resilience • Practice before an attack happens https://www.ncsc.gov.uk/information/exercise-in-a-box/
  • 11. Training Barclays • Digital skills training • Not just cyber security https://digital.wings.uk.barclays/our-digital-courses/digital-skills-for-business/cyber-security-for-business/
  • 12. Training Information Commissioner’s Office • Offers training material they use for their own staff • Videos • Posters and handouts https://ico.org.uk/for-organisations/posters-stickers-and-e-learning/
  • 13. Toolkits National Cyber Security Centre • Designed to encourage discussion • Uses business language https://www.ncsc.gov.uk/collection/board-toolkit
  • 14. Toolkits British Retail Consortium • Plain English guide to cyber security • Potential threats • Responsibilities • Resources • Protections to consider • How to recover after an attack • Specific retail advice – but useful for most businesses https://brc.org.uk/media/676134/cyber-resilience-toolkit-for-retail.pdf
  • 15. Toolkits Information Commissioner’s Office • How well do you comply with the law? • How could you improve? https://ico.org.uk/for-organisations/sme-web-hub/checklists/assessment-for-small-business-owners-and-sole-traders
  • 16. Tools Get Safe Online • Check for scam sites – before using them • Checks against multiple lists • Provides report, so you can decide https://www.getsafeonline.org/business/checkawebsite/
  • 17. Tools GoPhish • Set up a phishing simulation • Send out practice phishing emails • Help train your staff in spotting attacks https://getgophish.com/
  • 18. Monitoring Cyberalarm • UK Police and Home Office • Identifies suspicious data being sent • Scans your system for vulnerabilities • Reports on findings https://www.cyberalarm.police.uk/
  • 19. Monitoring NCSC Early Warning • Checks your external network information against datasets • Notifies you of potential issues • Enables you to respond quickly • Reduces risk of successful attacks https://www.ncsc.gov.uk/information/early-warning-service
  • 20. Monitoring Have I been Pwned • Check if your data has been breached: • Email • Phone • Password • Find out if your data is available online • Get notified if it happens in the future https://haveibeenpwned.com/
  • 21. Q&A What are your cyber security issues?
  • 22. Thank You If you would like a copy of the slides please fill out our signup sheet at our stand, just behind you at B716.