SlideShare a Scribd company logo
How to improve your cyber security;
affordable, practical advice for
businesses.
© Crown copyright 2020
Photographs produced with permission from third parties. NCSC information
licensed for re-use under the Open Government Licence
(http://www.nationalarchives.gov.uk/doc/open-government-licence).
Information correct at time of publication – March 2020
Organisations can carry out the following actions in
accordance with the guidance contained in the Small
Business Guide
Implementing these actions will significantly reduce the
chance of you becoming a victim of cyber crime. To find
out more, please visit ncsc.gov.uk/smallbusiness
Find out more
For further information,
or to contact us, please visit:
www.ncsc.gov.uk
@ncsc
Cyber Security
Small Business Guide Actions
Small
Business
Guide
Collection
Training and
awareness actions
These actions should be carried out by staff
responsible for implementing staff training
and awareness. Every member of the team
(including board members) needs enough
knowledge to understand how cyber security
impacts on their area of focus.
Ensure all applications on devices are up to
date and automatic updates have been set to
download as soon as they are released.
Schedule regular manual checks on updates.
Set up encryption on all office equipment.
Use products such as Bitlocker for Windows using
a Trusted Platform Module (TPM) with a PIN,
or FileVault (on mac OS).
Provide secure physical storage (e.g a locked
cupboard) for your staff to write down and store
	passwords.
Create a Cyber Security training plan that you can
use for all staff.
Include details of your ‘Password’ policy explaining
how to create a non-predictable.
Include how to spot the obvious signs of phishing.
Include details of your reporting process if staff
suspect phishing.
Include details on how your business operates and
how they deal with requests via email.
Include details of Wi-Fi hotspot vulnerabilities
and how to use alternative options (e.g VPN/
Mobile network).
Technical actions
Switch on your Firewall.
Install and turn on Anti-virus software.
Block access to physical ports for staff who do not
need them.
Consider making a password manager available to
your staff to secure their passwords. Review the star
ratings before choosing one from an app store.
Ensure data is being backed up to a backup 		
platform e.g. portable hard drive and/or the cloud.
Set automated back-up periods relevant to the
needs of the business.
Switch on password protection for all available
devices. Change default passwords on all 		
internet-enabled devices as per password policy.
Install and turn on tracking applications for all
available devices e.g. Find my iPhone.
Enable two-factor authentication for all important
accounts (e.g email).
Apply restrictions to prevent users downloading 3rd
party apps.
Install the latest software updates on all devices
and switch on automatic updates with periodic 		
	checks.
These actions should be carried out by technical staff
responsible for the setup and configuration of devices,
networks and software.
Policy actions
Identify and record essential data for
regular backups.
Create a password policy.
Decide what access controls your users need so
they can access only the information and systems
required for their job role.
Decide what staff need access to USB drives
Sign up to threat alerts and read cyber local
advice e.g. briefing sheets/threat reports from
	www.actionfraud.police.uk/signup.
Create an inventory of approved USB drives and
their issued owners, and review whether the 		
ownership is necessary periodically.
These actions should be carried out by staff
responsible for determining the overall cyber 		
security policy.

More Related Content

Similar to NCSC_SBG_Actions.pdf

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
mccormicknadine86
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
SameerShaik43
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
Hajer alriyami
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Onsite Helper
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Bahaa Abdul Hussein
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
Vijay Νavgire
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
deanmtaylor1545
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
David Sweigert
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness
ManageEngine, Zoho Corporation
 

Similar to NCSC_SBG_Actions.pdf (20)

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness10 Tips to Guard Your Network during March Madness
10 Tips to Guard Your Network during March Madness
 

More from Policypros.co.uk

22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf
22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf
22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf
Policypros.co.uk
 
indg398.pdf
indg398.pdfindg398.pdf
indg398.pdf
Policypros.co.uk
 
indg69.pdf
indg69.pdfindg69.pdf
indg69.pdf
Policypros.co.uk
 
indg73.pdf
indg73.pdfindg73.pdf
indg73.pdf
Policypros.co.uk
 
BusinessPlanPack_FINAL.pdf
BusinessPlanPack_FINAL.pdfBusinessPlanPack_FINAL.pdf
BusinessPlanPack_FINAL.pdf
Policypros.co.uk
 
ukpga_20180013_en.pdf
ukpga_20180013_en.pdfukpga_20180013_en.pdf
ukpga_20180013_en.pdf
Policypros.co.uk
 
indg36.pdf
indg36.pdfindg36.pdf
indg36.pdf
Policypros.co.uk
 
indg453.pdf
indg453.pdfindg453.pdf
indg453.pdf
Policypros.co.uk
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
Policypros.co.uk
 
AMLGuidance2020.pdf
AMLGuidance2020.pdfAMLGuidance2020.pdf
AMLGuidance2020.pdf
Policypros.co.uk
 

More from Policypros.co.uk (10)

22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf
22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf
22-TFG-UK-Trade-Finance-Guide-SpreadLayout.pdf
 
indg398.pdf
indg398.pdfindg398.pdf
indg398.pdf
 
indg69.pdf
indg69.pdfindg69.pdf
indg69.pdf
 
indg73.pdf
indg73.pdfindg73.pdf
indg73.pdf
 
BusinessPlanPack_FINAL.pdf
BusinessPlanPack_FINAL.pdfBusinessPlanPack_FINAL.pdf
BusinessPlanPack_FINAL.pdf
 
ukpga_20180013_en.pdf
ukpga_20180013_en.pdfukpga_20180013_en.pdf
ukpga_20180013_en.pdf
 
indg36.pdf
indg36.pdfindg36.pdf
indg36.pdf
 
indg453.pdf
indg453.pdfindg453.pdf
indg453.pdf
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
AMLGuidance2020.pdf
AMLGuidance2020.pdfAMLGuidance2020.pdf
AMLGuidance2020.pdf
 

Recently uploaded

Showcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdfShowcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdf
MarianAndreaSTana
 
Best Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to SuccessBest Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to Success
Intelisync
 
Michael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdfMichael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdf
Michael Oikonomou
 
Create a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdfCreate a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdf
andreakaterasco
 
How To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine BusinessHow To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine Business
Charlie McDermott
 
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, FloridaDining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
The Sarasota Collection Home Store
 
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota CollectionOffice Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
The Sarasota Collection Home Store
 
How to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdfHow to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdf
Trims Creators
 
Get To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdfGet To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdf
Salma Karina Hayat
 
Textile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdfTextile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdf
jeffmilton96
 
Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
Chandrakant Divate
 

Recently uploaded (11)

Showcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdfShowcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdf
 
Best Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to SuccessBest Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to Success
 
Michael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdfMichael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdf
 
Create a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdfCreate a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdf
 
How To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine BusinessHow To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine Business
 
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, FloridaDining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
 
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota CollectionOffice Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
 
How to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdfHow to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdf
 
Get To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdfGet To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdf
 
Textile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdfTextile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdf
 
Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
 

NCSC_SBG_Actions.pdf

  • 1. How to improve your cyber security; affordable, practical advice for businesses. © Crown copyright 2020 Photographs produced with permission from third parties. NCSC information licensed for re-use under the Open Government Licence (http://www.nationalarchives.gov.uk/doc/open-government-licence). Information correct at time of publication – March 2020 Organisations can carry out the following actions in accordance with the guidance contained in the Small Business Guide Implementing these actions will significantly reduce the chance of you becoming a victim of cyber crime. To find out more, please visit ncsc.gov.uk/smallbusiness Find out more For further information, or to contact us, please visit: www.ncsc.gov.uk @ncsc Cyber Security Small Business Guide Actions Small Business Guide Collection
  • 2. Training and awareness actions These actions should be carried out by staff responsible for implementing staff training and awareness. Every member of the team (including board members) needs enough knowledge to understand how cyber security impacts on their area of focus. Ensure all applications on devices are up to date and automatic updates have been set to download as soon as they are released. Schedule regular manual checks on updates. Set up encryption on all office equipment. Use products such as Bitlocker for Windows using a Trusted Platform Module (TPM) with a PIN, or FileVault (on mac OS). Provide secure physical storage (e.g a locked cupboard) for your staff to write down and store passwords. Create a Cyber Security training plan that you can use for all staff. Include details of your ‘Password’ policy explaining how to create a non-predictable. Include how to spot the obvious signs of phishing. Include details of your reporting process if staff suspect phishing. Include details on how your business operates and how they deal with requests via email. Include details of Wi-Fi hotspot vulnerabilities and how to use alternative options (e.g VPN/ Mobile network). Technical actions Switch on your Firewall. Install and turn on Anti-virus software. Block access to physical ports for staff who do not need them. Consider making a password manager available to your staff to secure their passwords. Review the star ratings before choosing one from an app store. Ensure data is being backed up to a backup platform e.g. portable hard drive and/or the cloud. Set automated back-up periods relevant to the needs of the business. Switch on password protection for all available devices. Change default passwords on all internet-enabled devices as per password policy. Install and turn on tracking applications for all available devices e.g. Find my iPhone. Enable two-factor authentication for all important accounts (e.g email). Apply restrictions to prevent users downloading 3rd party apps. Install the latest software updates on all devices and switch on automatic updates with periodic checks. These actions should be carried out by technical staff responsible for the setup and configuration of devices, networks and software. Policy actions Identify and record essential data for regular backups. Create a password policy. Decide what access controls your users need so they can access only the information and systems required for their job role. Decide what staff need access to USB drives Sign up to threat alerts and read cyber local advice e.g. briefing sheets/threat reports from www.actionfraud.police.uk/signup. Create an inventory of approved USB drives and their issued owners, and review whether the ownership is necessary periodically. These actions should be carried out by staff responsible for determining the overall cyber security policy.