BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few years, it is now more important than ever to look over your computer network and identify the risks within your organisation. In this webinar we’ll look at the basic principles to protect your data and also how you can take it one step further by assessing and minimising risk. There is a link at the end of this deck to the associated blog and webinar recording
I.T Support Consultancy
Who am I? Matthew Parsons – Director – Surf Tech IT Working in IT Services for 14 Years
Information Security | Protecting your business Identifying Risks Assessing your assets Securing your information ISO : Information Security
Identifying Risks Everything / Everyone within your business is a risk Hardware Laptops, Desktops, Phones, External Hard drive Software , Cloud Solutions i.e Office 365 Employees
Assessing your assets Risk/AssetThreatLikelihoodSeverityRating
Assessing your assets Risk/AssetThreatLikelihoodSeverityRating LaptopStolen/Lost224 Security Compromised224 EmployeesRelease of unauthorised data236 Rating = Likelihood x Severity
Assessing your assets Risk/AssetThreatLikelihoodSeverityRating LaptopStolen/Lost224 Security Compromised224 EmployeesRelease of unauthorised data236 Rating = Likelihood x Severity Rating Low1 to 4 Medium5 to 10 High11+
Control Action Risk/AssetControlLikelihoodSeverityRating Laptop Company policy not to store customer data on local drive 212 Complex passwords, change password every 90 days and enable two factor authentication 122 Employees Employment contract states the release to information classified as 'confidential' will result in disciplinary action 133 Rating = Likelihood x Severity Rating Low1 to 4 Medium5 to 10 High11+
Control Action Other Control Actions may include: Additional hardware appliances (such as Firewalls, Web Filtering) Additional software (such as Anti-Virus, AntiSpam) Computer policies (Locking down users abilities on computers, what software can be installed) Why assess these threats? If you can identify the threats to your business, access the risk it may cause and identify it as a high risk. You will be able to make changes within your business to best protect your data and customer data
ISO | Information Security ISO is a standard created by the International Organisation for Standardisation (ISO) for implementing an Information Security Management System (ISMS). ISO is not required by every industry, but if you can incorporate just a few elements of ISO in to your business it should assist in protecting your important data. We work with businesses to assess these risks for them and then advise how any potential risk can be addressed and minimized. As an IT Support and Solutions provider our customers depend on us to keep their data safe. Our clients like the reassurance knowing that our systems and processes are audited, when you partner with a company like us we have the complete control of your IT systems.
Thank you for listening! Any Questions?!?
BizSmart – Where Smart people go to surround themselves with other Smart people, to gain business success.