SlideShare a Scribd company logo
How to cyber protect your
business for free
A guide to the official advice and tools available for free
By Kevin Else, Director, Click and Protect
www.clickandprotect.co
Agenda
• Brief introduction to Click and Protect
• Guidance
• Training tools
• Toolkits
• Free monitoring
• Q/A
Click and Protect
• Run by Cyber Security Partners
• £200/month for a security expert on call
• See www.clickandprotect.co for info
Guidance
National Cyber Security Centre
• First port of call
• “Helping to make the UK the safest
place to live and work online”
• No matter what size your organisation
https://www.ncsc.gov.uk/section/advice-guidance/all-topics
Guidance
National Cyber Security Centre
• Information tailored by size of
organisation
• Information for business people and
cyber professionals
• News and guidance
https://www.ncsc.gov.uk/section/information-for/small-medium-sized-organisations/
Guidance
Information Commissioner’s Office
• Independent authority
• Data protection and privacy
• Information to help meet data
protection obligations—no matter
what size your organisation
https://ico.org.uk/for-organisations/
Guidance
National Cyber Resilience Centres
• Set up by Home Office
• Unites police, private sector and
academia
• Across England and Wales
• Free membership
https://nationalcrcgroup.co.uk/regional-centres/
Training
Centre for Protection of National
Infrastructure (CPNI)
• Awareness videos & resources
https://www.cpni.gov.uk/security-campaigns/think-you-link
Training
National Cyber Security Centre
• Online training for staff
• Fundamentals of cyber security
https://www.ncsc.gov.uk/training/v4/Top+tips/Web+package/content/index.html#/
Training
National Cyber Security Centre
• Assess your business resilience
• Practice before an attack happens
https://www.ncsc.gov.uk/information/exercise-in-a-box/
Training
Barclays
• Digital skills training
• Not just cyber security
https://digital.wings.uk.barclays/our-digital-courses/digital-skills-for-business/cyber-security-for-business/
Training
Information Commissioner’s Office
• Offers training material they use for
their own staff
• Videos
• Posters and handouts
https://ico.org.uk/for-organisations/posters-stickers-and-e-learning/
Toolkits
National Cyber Security Centre
• Designed to encourage discussion
• Uses business language
https://www.ncsc.gov.uk/collection/board-toolkit
Toolkits
British Retail Consortium
• Plain English guide to cyber security
• Potential threats
• Responsibilities
• Resources
• Protections to consider
• How to recover after an attack
• Specific retail advice – but useful for
most businesses
https://brc.org.uk/media/676134/cyber-resilience-toolkit-for-retail.pdf
Toolkits
Information Commissioner’s Office
• How well do you comply with the law?
• How could you improve?
https://ico.org.uk/for-organisations/sme-web-hub/checklists/assessment-for-small-business-owners-and-sole-traders
Tools
Get Safe Online
• Check for scam sites – before using
them
• Checks against multiple lists
• Provides report, so you can decide
https://www.getsafeonline.org/business/checkawebsite/
Tools
GoPhish
• Set up a phishing simulation
• Send out practice phishing emails
• Help train your staff in spotting attacks
https://getgophish.com/
Monitoring
Cyberalarm
• UK Police and Home Office
• Identifies suspicious data being sent
• Scans your system for vulnerabilities
• Reports on findings
https://www.cyberalarm.police.uk/
Monitoring
NCSC Early Warning
• Checks your external network
information against datasets
• Notifies you of potential issues
• Enables you to respond quickly
• Reduces risk of successful attacks
https://www.ncsc.gov.uk/information/early-warning-service
Monitoring
Have I been Pwned
• Check if your data has been breached:
• Email
• Phone
• Password
• Find out if your data is available online
• Get notified if it happens in the future
https://haveibeenpwned.com/
Q&A
What are your cyber security issues?
Thank You
If you would like a copy of the slides please fill out
our signup sheet at our stand, just behind you at
B716.
clickandprotect.co
contactus@clickandprotect

More Related Content

Similar to How to cyber protect your business for free

Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
javed75
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
MalikMumtaz6
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
BalaMurali958529
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
Peter Jones
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
jolag93795
 
It4 ccommunityi tresources
It4 ccommunityi tresourcesIt4 ccommunityi tresources
It4 ccommunityi tresources
Voscur Staff
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for Business
Bente Larsen
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Brochure EBRC 2016
Brochure EBRC 2016Brochure EBRC 2016
Brochure EBRC 2016
Marie-Astrid Heyde
 
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Erik Ekholm
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
John Moran
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
Marc Gallardo
 
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Erik Ekholm
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
Norfolk Chamber of Commerce
 
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudThree Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Acquia
 
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
Léo Lemordant
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
Cyber Security Partners
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
Ray Bugg
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
EarthElemental
 
Digital destinations: Be inspired by best practice
Digital destinations: Be inspired by best practice Digital destinations: Be inspired by best practice
Digital destinations: Be inspired by best practice
The Digital Hub - Bournemouth University
 

Similar to How to cyber protect your business for free (20)

Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
It4 ccommunityi tresources
It4 ccommunityi tresourcesIt4 ccommunityi tresources
It4 ccommunityi tresources
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for Business
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Brochure EBRC 2016
Brochure EBRC 2016Brochure EBRC 2016
Brochure EBRC 2016
 
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
Skapa: International Online Marketing for West Sweden Chamber of Commerce, Ma...
 
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan FinnDefending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudThree Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
 
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
[Meetup 4] Nuit de la Blockchain, Anna Shugol, IBM
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
Digital destinations: Be inspired by best practice
Digital destinations: Be inspired by best practice Digital destinations: Be inspired by best practice
Digital destinations: Be inspired by best practice
 

More from Cyber Security Partners

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
Cyber Security Partners
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
Cyber Security Partners
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
Cyber Security Partners
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Cyber Security Partners
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
Cyber Security Partners
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
Cyber Security Partners
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
Cyber Security Partners
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
Cyber Security Partners
 
'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist
Cyber Security Partners
 

More from Cyber Security Partners (9)

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist'Life's a Breach' Cyber Security Murder Mystery With a Twist
'Life's a Breach' Cyber Security Murder Mystery With a Twist
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

How to cyber protect your business for free

  • 1. How to cyber protect your business for free A guide to the official advice and tools available for free By Kevin Else, Director, Click and Protect www.clickandprotect.co
  • 2. Agenda • Brief introduction to Click and Protect • Guidance • Training tools • Toolkits • Free monitoring • Q/A
  • 3. Click and Protect • Run by Cyber Security Partners • £200/month for a security expert on call • See www.clickandprotect.co for info
  • 4. Guidance National Cyber Security Centre • First port of call • “Helping to make the UK the safest place to live and work online” • No matter what size your organisation https://www.ncsc.gov.uk/section/advice-guidance/all-topics
  • 5. Guidance National Cyber Security Centre • Information tailored by size of organisation • Information for business people and cyber professionals • News and guidance https://www.ncsc.gov.uk/section/information-for/small-medium-sized-organisations/
  • 6. Guidance Information Commissioner’s Office • Independent authority • Data protection and privacy • Information to help meet data protection obligations—no matter what size your organisation https://ico.org.uk/for-organisations/
  • 7. Guidance National Cyber Resilience Centres • Set up by Home Office • Unites police, private sector and academia • Across England and Wales • Free membership https://nationalcrcgroup.co.uk/regional-centres/
  • 8. Training Centre for Protection of National Infrastructure (CPNI) • Awareness videos & resources https://www.cpni.gov.uk/security-campaigns/think-you-link
  • 9. Training National Cyber Security Centre • Online training for staff • Fundamentals of cyber security https://www.ncsc.gov.uk/training/v4/Top+tips/Web+package/content/index.html#/
  • 10. Training National Cyber Security Centre • Assess your business resilience • Practice before an attack happens https://www.ncsc.gov.uk/information/exercise-in-a-box/
  • 11. Training Barclays • Digital skills training • Not just cyber security https://digital.wings.uk.barclays/our-digital-courses/digital-skills-for-business/cyber-security-for-business/
  • 12. Training Information Commissioner’s Office • Offers training material they use for their own staff • Videos • Posters and handouts https://ico.org.uk/for-organisations/posters-stickers-and-e-learning/
  • 13. Toolkits National Cyber Security Centre • Designed to encourage discussion • Uses business language https://www.ncsc.gov.uk/collection/board-toolkit
  • 14. Toolkits British Retail Consortium • Plain English guide to cyber security • Potential threats • Responsibilities • Resources • Protections to consider • How to recover after an attack • Specific retail advice – but useful for most businesses https://brc.org.uk/media/676134/cyber-resilience-toolkit-for-retail.pdf
  • 15. Toolkits Information Commissioner’s Office • How well do you comply with the law? • How could you improve? https://ico.org.uk/for-organisations/sme-web-hub/checklists/assessment-for-small-business-owners-and-sole-traders
  • 16. Tools Get Safe Online • Check for scam sites – before using them • Checks against multiple lists • Provides report, so you can decide https://www.getsafeonline.org/business/checkawebsite/
  • 17. Tools GoPhish • Set up a phishing simulation • Send out practice phishing emails • Help train your staff in spotting attacks https://getgophish.com/
  • 18. Monitoring Cyberalarm • UK Police and Home Office • Identifies suspicious data being sent • Scans your system for vulnerabilities • Reports on findings https://www.cyberalarm.police.uk/
  • 19. Monitoring NCSC Early Warning • Checks your external network information against datasets • Notifies you of potential issues • Enables you to respond quickly • Reduces risk of successful attacks https://www.ncsc.gov.uk/information/early-warning-service
  • 20. Monitoring Have I been Pwned • Check if your data has been breached: • Email • Phone • Password • Find out if your data is available online • Get notified if it happens in the future https://haveibeenpwned.com/
  • 21. Q&A What are your cyber security issues?
  • 22. Thank You If you would like a copy of the slides please fill out our signup sheet at our stand, just behind you at B716.