Cyber Security Policies – A Must Have or a Nice to Have
Trust H2 to deliver solutions that are Appropriate, Affordable and Accreditable

Cyber Security Policies – A Must Have or a Nice to Have

How important are policies and processes in comparison with technology, when it comes to Cyber Security and its sister discipline, data protection.? The clue is that in Cyber Security we refer to People, Process and Technology, in that order.?

Top of this list is People, and I’ve written extensively about how important cyber awareness training is for all, managers and employees alike.? This piece is all about policies and processes.? First and foremost, policies have to be relevant to the organisation and not just downloaded from the internet, with maybe a few modifications, before applying a tick in the box and moving on.? Policies have to mean something and have a purpose.? Many organisations I go to either have some very scant policies or actually, none at all.?

I often talk about risk in terms of cyber security and how managing that risk is extremely important.? And that means understanding what those risks actually are, and then taking steps to mitigate them.? When I talk about this, I can often see the wheels turning and the audience thinking yet more tech and how much is that going to cost them.? Well, it’s very often the case that technology is not the answer.? There are many risks where a good policy, promulgated to, and understood by all, can save the company money.?

A good example, which I have used before, is that of a fairly common scam that tends to costs SMEs between 5 and 50K depending upon the size of business.? How this is achieved is that the scammer or let’s call him/her what he/she is, the criminal, spends some time profiling the company, using various social engineering techniques to work out how the company is organised and who is who.? You may be surprised as to how much of that information is freely available on the company website, companies house and other sources. Having discovered who the boss is, and who looks after invoice payments, the criminal then ‘spoofs’ the bosses email.? Email spoofing, in simple terms, is sending an email purporting to come from someone else.? So, it arrives allegedly from the boss, but actually it’s from the scammer.? Such an email is sent to the person who pays invoices, with an invoice attached, saying please pay this as a matter of urgency.? This happened recently to someone I know, and when it arrived in the accounts department it didn’t look kosher to the payments clerk, who replied to the email asking if the boss was sure.? Of course, she got an email back saying yes, I’m sure.? She paid it and the company lost over 30K.? The accounts clerk was clearly switched on but she made a basic error, because she didn’t know any different.? If she had sent a fresh email to the boss querying the invoice, it would have gone to the boss who could have stopped the transaction.? Instead, she replied to the email and her reply went back to the scammer.? A policy which dictates fresh emails rather than using the reply function, and known to all, would have saved the company a lot of money.?

Policies and attendant processes are essential for the protection of company data and the bottom line, company money.? What needs to be covered and in what depth, depends on the risks that the company is facing, and will differ company to company depending on its type.? In broad terms, and as an absolute minimum, the following are required:?

·????? Overarching IT security policy – often this only needs to say very clearly what responsibilities employees have in regard to security and data protection, lay down a requirement and responsibility for cyber awareness training, and state that all employees are to be cognisant of all the policies and must sign to say that they have read and understood them.? And most importantly, it must be signed off at board level making it clear that this is a crucial requirement.

·????? IT Acceptable Use Policy – what is, and what is not, an acceptable use for company IT.

·????? IT Email Policy

·????? IT password policy

·????? IT Mobile working policy – essential for mobile workers who may be tempted to work from a coffee shop, and of course, working from home.? This latter might be a separate policy or can be part of the mobile working policy.

·????? Data Protection Policies – a whole other subject.

·????? Social media policy – this can be really important.? Probably 100% of your employees will have a social media presence and will use it daily. How important is it that they don’t associate themselves with the company on their private social media?? Depends on the person but it could be damaging in reputational terms.? The company might also do some digital marketing on social media.? Who is, and who is not, allowed to get involved with that function must be stipulated.?

This is not an exhaustive list.? It depends very much on risks that needs mitigating.? They will also be accompanied by processes to support the policy.?

Does this resonate with you.? If you’d like to know more, we’d like to help.?

H2 provides affordable and flexible one-off and ongoing data protection and cyber risk protection services.

To learn more about the services we provide please click here?https://www.hah2.co.uk/

Please feel free to give us a call or email.

T: 0845 5443742

M: 07702 019060

E:?[email protected]

Trust H2 – Making sure your information is secure

要查看或添加评论,请登录

H2 Cyber Risk Advisory Services的更多文章

社区洞察

其他会员也浏览了