SlideShare a Scribd company logo
1 of 16
With the increased risk of some sort of
cyber-attack over the past few years, it is
now more important than ever to look over
your computer network and identify the
risks within your organisation.
There is a link at the end of this deck to
the associated blog and webinar
recording
I.T Support Consultancy
Who am I?
Matthew Parsons – Director – Surf Tech IT
Working in IT Services for 14 Years
Information Security | Protecting your business
• Identifying Risks
• Assessing your assets
• Securing your information
• ISO 27001 : Information Security
Identifying Risks
• Everything / Everyone within your business is a risk
• Hardware
• Laptops, Desktops, Phones, External Hard drive
• Software
• E-Mail, Cloud Solutions i.e Office 365
• Employees
Assessing your assets
Risk/Asset Threat Likelihood Severity Rating
Assessing your assets
Risk/Asset Threat Likelihood Severity Rating
Laptop Stolen/Lost 2 2 4
Email Security Compromised 2 2 4
Employees Release of unauthorised data 2 3 6
Rating = Likelihood x Severity
Assessing your assets
Risk/Asset Threat Likelihood Severity Rating
Laptop Stolen/Lost 2 2 4
Email Security Compromised 2 2 4
Employees Release of unauthorised data 2 3 6
Rating = Likelihood x Severity
Rating
Low 1 to 4
Medium 5 to 10
High 11+
Control Action
Risk/Asset Control Likelihood Severity Rating
Laptop Company policy not to store
customer data on local drive
2 1 2
Email Complex passwords, change
password every 90 days and enable
two factor authentication
1 2 2
Employees Employment contract states the
release to information classified as
'confidential' will result in
disciplinary action
1 3 3
Rating = Likelihood x Severity
Rating
Low 1 to 4
Medium 5 to 10
High 11+
Control Action
Other Control Actions may include:
• Additional hardware appliances (such as Firewalls, Web Filtering)
• Additional software (such as Anti-Virus, AntiSpam)
• Computer policies (Locking down users abilities on computers, what software can be installed)
Why assess these threats?
• If you can identify the threats to your business, access the risk it may cause and identify it as a high risk.
You will be able to make changes within your business to best protect your data and customer data
ISO 27001 | Information Security
ISO 27001 is a standard created by the International Organisation for Standardisation (ISO) for implementing
an Information Security Management System (ISMS).
ISO 27001 is not required by every industry, but if you can incorporate just a few elements of ISO 27001 in to your
business it should assist in protecting your important data.
We work with businesses to assess these risks for them and then advise how any potential risk can be addressed
and minimized.
As an IT Support and Solutions provider our customers depend on us to keep their data safe. Our clients like
the reassurance knowing that our systems and processes are audited, when you partner with a company
like us we have the complete control of your IT systems.
Thank you for listening!
Any Questions?!?
BizSmart aims to help business owners of small and medium
sized businesses to create value and scale their businesses
through sound practical business support by providing insight,
Clarity combined with a real determination to help you succeed.
You can access webinars and presentations like this and more
besides through our SmartRoom service here
You can read the associated blog
and listen to a live recording of this
presentation by clicking here
You can read Matthew’s profile here
SPECIAL OFFER ....... Work with an IT company that strives
to be the best.
If you’d like to take advantage of the knowledge and
experience at SurfTech IT, but are concerned about potential
costs, or the time and disruption involved in upgrading your
systems, please book a complimentary consultation to talk
through your options.
You can get in touch via email
atinfo@surftechit.co.uk or call 0330 120
0295, quoting BizSmart Lunch & Learn
Webinars.
•Need a sounding board for your ideas?
•Need to know what to prioritise?
•Want someone to challenge your assumptions?
BizSmart –
Where Smart people go to surround themselves with other
Smart people, to gain business success.

More Related Content

What's hot

File (26)
File (26)File (26)
File (26)lilfato
 
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
from shadow IT to empowered IT-asanka 2014 08-gartner catalystfrom shadow IT to empowered IT-asanka 2014 08-gartner catalyst
from shadow IT to empowered IT-asanka 2014 08-gartner catalystWSO2
 
6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconf6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconfFreshservice
 
The Perks Of IT Outsourcing
The Perks Of IT OutsourcingThe Perks Of IT Outsourcing
The Perks Of IT OutsourcingNathan Miller
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesDavid Castro
 
Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0itSMF UK
 
The Business Value of Shadow IT
The Business Value of Shadow ITThe Business Value of Shadow IT
The Business Value of Shadow ITCloud Sherpas
 
eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...
eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...
eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...eFolder
 
Jon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected PillarJon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected PillaritSMF UK
 
Fennec consulting profile
Fennec consulting profileFennec consulting profile
Fennec consulting profilef-fit
 
SQ_Capabilities - 2015
SQ_Capabilities - 2015SQ_Capabilities - 2015
SQ_Capabilities - 2015Matt Ritter
 
Workplace-as-a-Service Presentation
Workplace-as-a-Service PresentationWorkplace-as-a-Service Presentation
Workplace-as-a-Service PresentationDanny Runnels
 
Why Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch TechnologiesWhy Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch TechnologiesAcTouch Technologies
 
How technology powers an agile business. A guide for small businesses.
How technology powers an agile business. A guide for small businesses.How technology powers an agile business. A guide for small businesses.
How technology powers an agile business. A guide for small businesses.Nexon Asia Pacific
 
Exhaust into Fuel: Turning Data into a Strategic Business Asset
Exhaust into Fuel: Turning Data into a Strategic Business AssetExhaust into Fuel: Turning Data into a Strategic Business Asset
Exhaust into Fuel: Turning Data into a Strategic Business AssetSirius
 
SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019nexthink
 
Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...Digital Workplace Group
 

What's hot (20)

Face of Art Technologies Ltd Company Presentation
Face of Art Technologies Ltd Company PresentationFace of Art Technologies Ltd Company Presentation
Face of Art Technologies Ltd Company Presentation
 
File (26)
File (26)File (26)
File (26)
 
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
from shadow IT to empowered IT-asanka 2014 08-gartner catalystfrom shadow IT to empowered IT-asanka 2014 08-gartner catalyst
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
 
Takesupport
TakesupportTakesupport
Takesupport
 
6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconf6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconf
 
The Perks Of IT Outsourcing
The Perks Of IT OutsourcingThe Perks Of IT Outsourcing
The Perks Of IT Outsourcing
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
 
Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0
 
The Business Value of Shadow IT
The Business Value of Shadow ITThe Business Value of Shadow IT
The Business Value of Shadow IT
 
eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...
eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...
eFolder Partner Chat webinar — Making the Transition from Break-Fix to Manage...
 
Jon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected PillarJon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected Pillar
 
Fennec consulting profile
Fennec consulting profileFennec consulting profile
Fennec consulting profile
 
SQ_Capabilities - 2015
SQ_Capabilities - 2015SQ_Capabilities - 2015
SQ_Capabilities - 2015
 
Workplace-as-a-Service Presentation
Workplace-as-a-Service PresentationWorkplace-as-a-Service Presentation
Workplace-as-a-Service Presentation
 
Why Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch TechnologiesWhy Cloud ERP is Important for Business - AcTouch Technologies
Why Cloud ERP is Important for Business - AcTouch Technologies
 
How technology powers an agile business. A guide for small businesses.
How technology powers an agile business. A guide for small businesses.How technology powers an agile business. A guide for small businesses.
How technology powers an agile business. A guide for small businesses.
 
WebPulse Technologies Pvt. Ltd. Company Profile
WebPulse Technologies Pvt. Ltd. Company ProfileWebPulse Technologies Pvt. Ltd. Company Profile
WebPulse Technologies Pvt. Ltd. Company Profile
 
Exhaust into Fuel: Turning Data into a Strategic Business Asset
Exhaust into Fuel: Turning Data into a Strategic Business AssetExhaust into Fuel: Turning Data into a Strategic Business Asset
Exhaust into Fuel: Turning Data into a Strategic Business Asset
 
SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019SLA to XLA Workshop, Edinburgh 2019
SLA to XLA Workshop, Edinburgh 2019
 
Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...Technology Lab June 2020 - Where to begin in your digital transformation jour...
Technology Lab June 2020 - Where to begin in your digital transformation jour...
 

Viewers also liked

Uses March 2017 - Eide, Industrial Clutches and Brakes Manufacturer
Uses March 2017 - Eide, Industrial Clutches and Brakes ManufacturerUses March 2017 - Eide, Industrial Clutches and Brakes Manufacturer
Uses March 2017 - Eide, Industrial Clutches and Brakes ManufacturerEIDE - Embragues electromagneticos
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology ChallengesInfinity Technologies
 
Applications of web scraping in the business world
Applications of web scraping in the business worldApplications of web scraping in the business world
Applications of web scraping in the business worldPromptCloud
 
13 03 21 livre blanc islamophobie_rapport 2012
13 03 21 livre blanc islamophobie_rapport 201213 03 21 livre blanc islamophobie_rapport 2012
13 03 21 livre blanc islamophobie_rapport 2012LeSoir.be
 
Teeth whitening top 10 tips.
Teeth whitening  top 10 tips.Teeth whitening  top 10 tips.
Teeth whitening top 10 tips.Noor. J
 
[Save themusicfoundation]
[Save themusicfoundation][Save themusicfoundation]
[Save themusicfoundation]Dino, llc
 
Vanden broele Academy
Vanden broele AcademyVanden broele Academy
Vanden broele AcademyEngagor
 
Boletín 21/03/2017
Boletín 21/03/2017Boletín 21/03/2017
Boletín 21/03/2017Openbank
 
Your style at powerpoint is dead
Your style at powerpoint is deadYour style at powerpoint is dead
Your style at powerpoint is deadAhmed Sabek
 
Overview: Space Radiation Environment
Overview: Space Radiation EnvironmentOverview: Space Radiation Environment
Overview: Space Radiation EnvironmentTimo A. Stein
 
Sintesis informativa 21 de marzo 2017
Sintesis informativa 21 de marzo 2017Sintesis informativa 21 de marzo 2017
Sintesis informativa 21 de marzo 2017megaradioexpress
 
スタートアップ期におけるリーン×超高速開発手法について
スタートアップ期におけるリーン×超高速開発手法についてスタートアップ期におけるリーン×超高速開発手法について
スタートアップ期におけるリーン×超高速開発手法についてTECHFUND
 
มอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกา
มอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกามอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกา
มอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกาไชยยา มะณี
 

Viewers also liked (20)

Uses March 2017 - Eide, Industrial Clutches and Brakes Manufacturer
Uses March 2017 - Eide, Industrial Clutches and Brakes ManufacturerUses March 2017 - Eide, Industrial Clutches and Brakes Manufacturer
Uses March 2017 - Eide, Industrial Clutches and Brakes Manufacturer
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
Applications of web scraping in the business world
Applications of web scraping in the business worldApplications of web scraping in the business world
Applications of web scraping in the business world
 
13 03 21 livre blanc islamophobie_rapport 2012
13 03 21 livre blanc islamophobie_rapport 201213 03 21 livre blanc islamophobie_rapport 2012
13 03 21 livre blanc islamophobie_rapport 2012
 
Teeth whitening top 10 tips.
Teeth whitening  top 10 tips.Teeth whitening  top 10 tips.
Teeth whitening top 10 tips.
 
[Save themusicfoundation]
[Save themusicfoundation][Save themusicfoundation]
[Save themusicfoundation]
 
Vanden broele Academy
Vanden broele AcademyVanden broele Academy
Vanden broele Academy
 
Boletín 21/03/2017
Boletín 21/03/2017Boletín 21/03/2017
Boletín 21/03/2017
 
Your style at powerpoint is dead
Your style at powerpoint is deadYour style at powerpoint is dead
Your style at powerpoint is dead
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Overview: Space Radiation Environment
Overview: Space Radiation EnvironmentOverview: Space Radiation Environment
Overview: Space Radiation Environment
 
Sintesis informativa 21 de marzo 2017
Sintesis informativa 21 de marzo 2017Sintesis informativa 21 de marzo 2017
Sintesis informativa 21 de marzo 2017
 
Eigen schul1.....
Eigen schul1.....Eigen schul1.....
Eigen schul1.....
 
スタートアップ期におけるリーン×超高速開発手法について
スタートアップ期におけるリーン×超高速開発手法についてスタートアップ期におけるリーン×超高速開発手法について
スタートアップ期におけるリーン×超高速開発手法について
 
มอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกา
มอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกามอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกา
มอค.3คณิตและสถิติในชีวิตประจำวัน ญาติกา
 

Similar to Information security and protecting your business

Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Managementguest64c5c
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsThe TNS Group
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Pte Ltd
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_BrochureCarolyn Tarrant
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf
 
Help Now Guardian Workstation
Help Now Guardian WorkstationHelp Now Guardian Workstation
Help Now Guardian WorkstationHelp Now, LLC
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1Keith Shaffer
 

Similar to Information security and protecting your business (20)

Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
IT Support Services - BrainCave Soft.pdf
IT Support Services - BrainCave Soft.pdfIT Support Services - BrainCave Soft.pdf
IT Support Services - BrainCave Soft.pdf
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013
 
Help Now Guardian Workstation
Help Now Guardian WorkstationHelp Now Guardian Workstation
Help Now Guardian Workstation
 
8 Benefits of Outsourcing Your IT
8 Benefits of Outsourcing Your IT8 Benefits of Outsourcing Your IT
8 Benefits of Outsourcing Your IT
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1
 

More from BizSmart Select

How to Develop Your Marketing Cookbook
How to Develop Your Marketing CookbookHow to Develop Your Marketing Cookbook
How to Develop Your Marketing CookbookBizSmart Select
 
Top 10 ways to Overcome Procrastination
Top 10 ways to Overcome ProcrastinationTop 10 ways to Overcome Procrastination
Top 10 ways to Overcome ProcrastinationBizSmart Select
 
Tax Tips for Business Owners
Tax Tips for Business OwnersTax Tips for Business Owners
Tax Tips for Business OwnersBizSmart Select
 
How to Use Engagement Marketing
How to Use Engagement MarketingHow to Use Engagement Marketing
How to Use Engagement MarketingBizSmart Select
 
How to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business ProcessesHow to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business ProcessesBizSmart Select
 
Tax Efficient Planning for Business Owners
Tax Efficient Planning for Business OwnersTax Efficient Planning for Business Owners
Tax Efficient Planning for Business OwnersBizSmart Select
 
How to Find Your Hedgehog!
How to Find Your Hedgehog!How to Find Your Hedgehog!
How to Find Your Hedgehog!BizSmart Select
 
What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?BizSmart Select
 
How to be More productive, in 10 steps!
How to be More productive, in 10 steps!How to be More productive, in 10 steps!
How to be More productive, in 10 steps!BizSmart Select
 
What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?BizSmart Select
 
Continuous improvement for Small Businesses
Continuous improvement for Small BusinessesContinuous improvement for Small Businesses
Continuous improvement for Small BusinessesBizSmart Select
 
Stressing about GDPR? Key Facts
Stressing about GDPR? Key FactsStressing about GDPR? Key Facts
Stressing about GDPR? Key FactsBizSmart Select
 
How to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and MarketingHow to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and MarketingBizSmart Select
 
How to measure the success of my social media
How to measure the success of my social mediaHow to measure the success of my social media
How to measure the success of my social mediaBizSmart Select
 
Tax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business OwnersTax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business OwnersBizSmart Select
 
How to use Emotional Marketing
How to use Emotional MarketingHow to use Emotional Marketing
How to use Emotional MarketingBizSmart Select
 
How to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible supportHow to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible supportBizSmart Select
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityBizSmart Select
 
How to Review Employee Performance
How to Review Employee PerformanceHow to Review Employee Performance
How to Review Employee PerformanceBizSmart Select
 

More from BizSmart Select (20)

How to Develop Your Marketing Cookbook
How to Develop Your Marketing CookbookHow to Develop Your Marketing Cookbook
How to Develop Your Marketing Cookbook
 
Top 10 ways to Overcome Procrastination
Top 10 ways to Overcome ProcrastinationTop 10 ways to Overcome Procrastination
Top 10 ways to Overcome Procrastination
 
Tax Tips for Business Owners
Tax Tips for Business OwnersTax Tips for Business Owners
Tax Tips for Business Owners
 
How to Use Engagement Marketing
How to Use Engagement MarketingHow to Use Engagement Marketing
How to Use Engagement Marketing
 
How to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business ProcessesHow to Improve Efficiency in Your Business/ Improving Your Business Processes
How to Improve Efficiency in Your Business/ Improving Your Business Processes
 
Tax Efficient Planning for Business Owners
Tax Efficient Planning for Business OwnersTax Efficient Planning for Business Owners
Tax Efficient Planning for Business Owners
 
How to Find Your Hedgehog!
How to Find Your Hedgehog!How to Find Your Hedgehog!
How to Find Your Hedgehog!
 
What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?What is the Enterprise Finance Loan Guarantee Scheme?
What is the Enterprise Finance Loan Guarantee Scheme?
 
How to be More productive, in 10 steps!
How to be More productive, in 10 steps!How to be More productive, in 10 steps!
How to be More productive, in 10 steps!
 
What's at your Core?
What's at your Core?What's at your Core?
What's at your Core?
 
What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?What's your Why? Your Core Purpose?
What's your Why? Your Core Purpose?
 
Continuous improvement for Small Businesses
Continuous improvement for Small BusinessesContinuous improvement for Small Businesses
Continuous improvement for Small Businesses
 
Stressing about GDPR? Key Facts
Stressing about GDPR? Key FactsStressing about GDPR? Key Facts
Stressing about GDPR? Key Facts
 
How to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and MarketingHow to Join the Dots between Sales and Marketing
How to Join the Dots between Sales and Marketing
 
How to measure the success of my social media
How to measure the success of my social mediaHow to measure the success of my social media
How to measure the success of my social media
 
Tax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business OwnersTax Efficient Investment Planning for (UK) Business Owners
Tax Efficient Investment Planning for (UK) Business Owners
 
How to use Emotional Marketing
How to use Emotional MarketingHow to use Emotional Marketing
How to use Emotional Marketing
 
How to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible supportHow to ensure your Virtual Assistant delivers Tangible support
How to ensure your Virtual Assistant delivers Tangible support
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber Security
 
How to Review Employee Performance
How to Review Employee PerformanceHow to Review Employee Performance
How to Review Employee Performance
 

Recently uploaded

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 

Recently uploaded (20)

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 

Information security and protecting your business

  • 1. With the increased risk of some sort of cyber-attack over the past few years, it is now more important than ever to look over your computer network and identify the risks within your organisation. There is a link at the end of this deck to the associated blog and webinar recording
  • 3. Who am I? Matthew Parsons – Director – Surf Tech IT Working in IT Services for 14 Years
  • 4. Information Security | Protecting your business • Identifying Risks • Assessing your assets • Securing your information • ISO 27001 : Information Security
  • 5. Identifying Risks • Everything / Everyone within your business is a risk • Hardware • Laptops, Desktops, Phones, External Hard drive • Software • E-Mail, Cloud Solutions i.e Office 365 • Employees
  • 6. Assessing your assets Risk/Asset Threat Likelihood Severity Rating
  • 7. Assessing your assets Risk/Asset Threat Likelihood Severity Rating Laptop Stolen/Lost 2 2 4 Email Security Compromised 2 2 4 Employees Release of unauthorised data 2 3 6 Rating = Likelihood x Severity
  • 8. Assessing your assets Risk/Asset Threat Likelihood Severity Rating Laptop Stolen/Lost 2 2 4 Email Security Compromised 2 2 4 Employees Release of unauthorised data 2 3 6 Rating = Likelihood x Severity Rating Low 1 to 4 Medium 5 to 10 High 11+
  • 9. Control Action Risk/Asset Control Likelihood Severity Rating Laptop Company policy not to store customer data on local drive 2 1 2 Email Complex passwords, change password every 90 days and enable two factor authentication 1 2 2 Employees Employment contract states the release to information classified as 'confidential' will result in disciplinary action 1 3 3 Rating = Likelihood x Severity Rating Low 1 to 4 Medium 5 to 10 High 11+
  • 10. Control Action Other Control Actions may include: • Additional hardware appliances (such as Firewalls, Web Filtering) • Additional software (such as Anti-Virus, AntiSpam) • Computer policies (Locking down users abilities on computers, what software can be installed) Why assess these threats? • If you can identify the threats to your business, access the risk it may cause and identify it as a high risk. You will be able to make changes within your business to best protect your data and customer data
  • 11. ISO 27001 | Information Security ISO 27001 is a standard created by the International Organisation for Standardisation (ISO) for implementing an Information Security Management System (ISMS). ISO 27001 is not required by every industry, but if you can incorporate just a few elements of ISO 27001 in to your business it should assist in protecting your important data. We work with businesses to assess these risks for them and then advise how any potential risk can be addressed and minimized. As an IT Support and Solutions provider our customers depend on us to keep their data safe. Our clients like the reassurance knowing that our systems and processes are audited, when you partner with a company like us we have the complete control of your IT systems.
  • 12. Thank you for listening! Any Questions?!?
  • 13. BizSmart aims to help business owners of small and medium sized businesses to create value and scale their businesses through sound practical business support by providing insight, Clarity combined with a real determination to help you succeed. You can access webinars and presentations like this and more besides through our SmartRoom service here You can read the associated blog and listen to a live recording of this presentation by clicking here You can read Matthew’s profile here
  • 14. SPECIAL OFFER ....... Work with an IT company that strives to be the best. If you’d like to take advantage of the knowledge and experience at SurfTech IT, but are concerned about potential costs, or the time and disruption involved in upgrading your systems, please book a complimentary consultation to talk through your options. You can get in touch via email atinfo@surftechit.co.uk or call 0330 120 0295, quoting BizSmart Lunch & Learn Webinars.
  • 15. •Need a sounding board for your ideas? •Need to know what to prioritise? •Want someone to challenge your assumptions?
  • 16. BizSmart – Where Smart people go to surround themselves with other Smart people, to gain business success.