10 Steps to Cyber Security [video]

Aug 23, 2019 | Article, Cyber

The National Cyber Security Centre (NCSC) produced a helpful guide that outlines ’10 Steps to Cyber Security’ that every organisation should be taking. We have summarised the guidelines into a short video. You can access the full report here.

The 10 steps, quoted directly from an NCSC infographic, are as follows:

 

Set up Your Risk Management Regime

Assess the risks to your organisation’s information and systems with the same vigour you would for legal, regulatory, financial or operational risks. To achieve this, embed a Risk Management Regime across your organisation, supported by the Board and senior managers.

 

Managing User Privileges

Establish effective management processes and limit the number of privileged accounts. Limit user privileges and monitor user activity. Control access to activity and audit logs.

 

Incident Management

Establish an incident response and disaster recovery capability. Test your incident management plans. Provide specialist training. Report criminal incidents to law enforcement.

 

Monitoring

Establish a monitoring strategy and produce supporting policies. Continuously monitor all systems and networks. Analyse logs for unusual activity that could indicate an attack.

 

Home and Mobile Working

Develop a mobile working policy and train staff to adhere to it. Apply the secure baseline and build to all devices. Protect data both in transit and at rest.

 

Secure Configuration

Apply security patches and ensure the secure configuration of all systems is maintained. Create a system inventory and define a baseline build for all devices.

 

Removable Media Controls

Produce a policy to control all access to removable media. Limit media types and use. Scan all media for malware before importing onto the corporate system.

 

Malware Prevention

Produce relevant policies and establish anti-malware defences across your organisation.

 

User Education and Awareness

Produce user security policies covering acceptable and secure use of your systems. Include in staff training. Maintain awareness of cyber risks.

 

Network Security

Protect your networks from attack. Defend the network perimeter, filter out unauthorised access and malicious content. Monitor and test security controls.

News, Articles & Case Studies

Contact us

IBMVMwareVeeamCisco Ruckus Wireless HP Hewlett Packard EnterpriseMicrosoft   apple