Cyber Threat Environment
Cyber threats
Data theft
Data ransom
Data distortion
Data destruction/
loss
Hijacking
All Businesses are TargetsEvery single business is a target and needs to be aware
of Cyber Threats that Exist
3 Main Reasons;
1. There is a direct financial goal
2. Data is Valuable
3. Maximum Social Damage
Cyber Event Consequences? Potential consequences: production/service disruption, ransom cost, business loss, recovery cost, reputational damage, loss of customers, litigation, fines, reputation repair cost (marketing)
$ $ $ $
What can you do?Whilst no one solution is entirely effective, there are
measures that can limit your risk and exposure.
But First, You need to understand where the risk lies in your business.
Where do I Start?To simplify the process of identifying and managing security & Cyber risks to your business there are 4
distinctive areas to look at;
1. Data
2. Identity
3. The Gateway
4. External Access & Mobility
4 Focus Points
3 StepsWe utilise a standard 3 Step risk management approach
when it comes to Cyber. This is focused on the 4 core components within your business technology landscape
3 Strategies to Implement Now
What can you do right now to increase the level of protection to your business
1. BACKUP - First and Foremost – Have quality backup systems in place with off-site storage
2. UPDATE & SECURE - Ensure your Computers are up to date and protected with Updates and Anti-virus – Even your MAC – Protect your internet gateway with advanced content control to unknown/suspect sites
3. EDUCATE - Educate yourself and Your Team on what to look out for and don’t open every email you receive!