Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 27 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Five steps to protect your company from cyber threats

by The Gurus
December 16, 2015
in News, Videos
Share on FacebookShare on Twitter

In this video from BAE Systems, Chief Product Officer Neal Watkins highlights five things companies and senior executives should be looking for in a strong defence against cyber attack, providing a straightforward, easy to digest check list for non-technical managers who are looking to understand the threats that face their business.
Flight check your company’s cyber security
Today our personal lives, society’s essential services and just about every business is online, and that means cyber threats are a fact of life.
Companies face an ongoing and persistent threat from criminals operating in cyberspace, who see the online world as one they can exploit with low risk and high reward. But for businesses, an attack can destroy reputations and hit finances hard, while non-compliance can lead to heavy penalties.
Are you doing enough to secure your organisation? Here are key considerations to take into account to ensure your business is well defended and prepared for cyber attack.
 

  1. Understand the cyber risk

Businesses grow. They need new technology and innovation. But this brings risk, whether it’s through third parties, contractors or changes in the supply chain.
Understand where your business is and make sure your cyber security strategy is taking all movements into account. Review and update it constantly – don’t be caught out by new risks.
 

  1. Have the right security controls

Your business is likely to have vulnerabilities. These could be straightforward enough to be fixed with a code change, or it might need a lot more work. But you need to be prepared to make big decisions if you view them as critical.
And don’t forget, the perimeter is gone – the security controls of yesterday won’t work. You need the security controls of today – protecting all the end points with integrated, configured and patched security controls.
 

  1. Balance business and risk

Data is power and systems run through the heart of most businesses. At the absolute minimum, business directors need to understand what the most critical assets are and key areas of vulnerability.
Businesses need to have the courage to make the right decision that balances security risk against commercial necessity and does the right thing by the business and customers in the long term.
Leaders must discuss what cyber risk they are prepared to take and how much they want to invest to manage it. There needs to be the courage in making the difficult decisions on what systems and services are protected, and at what level.
 

  1. Build a defensive culture with Security by Design

Security needs to be ingrained into the company culture. It isn’t a checklist, but something which should be ever-present. Security by Design involves everybody making sure they are working securely, whatever role in the company they have.
Whether an employee is writing code in an application, delivering a service or responding to a customer, there needs to be accountability. And analytics can help in discovering where the vulnerabilities are.
 

  1. Prepare a response

No security is completely effective, and there is always a chance of a successful attack. What makes the difference between a full blown crisis and a problem to be tackled is the plan you have in place to respond and repair. There needs to be a thorough, rehearsed and tested response plan known to clients and employees, across systems and processes.
The way people respond will have a major effect on operational impact and loss of productivity, as well as customer confidence. With the right planning, there’s absolutely no need to make a bad situation worse.
 

FacebookTweetLinkedIn
Tags: advisoryaviationbaeBreachbusiness riskchecklistcontrolsCyber AttackinfosecplanResponserisksecuritysecurity by designsecurity riskstrategy
ShareTweetShare
Previous Post

Morrisons faces the largest ever data breach claim in UK court

Next Post

How to calculate ROI and justify your cybersecurity budget

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information