29
How Organizations Can Avoid Data Breaches And Thus Meet Their Security Obligations

How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Embed Size (px)

Citation preview

Page 1: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

How Organizations Can Avoid Data Breaches And Thus Meet Their Security Obligations

Page 2: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Stay on top of security developments by following these five pieces of advice

Page 3: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

With cyber attacks becoming increasingly common in the present day, it is vital for companies to ensure that

they keep their data safe from breaches

Page 4: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

1 KEEP YOUR IT INFRASTRUCTURE IN GOOD HEALTH

Page 5: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Knowing and understanding your IT infrastructure is an essential first step for

keeping it safe and sound

Page 6: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Get to know what types of software you are using and what new updates or patches are

available

Page 7: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Get to know what types of software you are using and what new updates or patches are

available

Install new security and safety features as soon as they become available

Page 8: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

If a data breach does occur and you have fulfilled all of your legal obligations under the Data Protection Act, then it is unlikely that you

will have to pay a penalty

Monitor your IT infrastructure at all times to make sure that you catch any

attempted breaches

Page 9: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)
Page 10: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Monitoring IT security should be a 24/7 job as attacks can happen at any time

Page 11: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Put in place encryption policies

Page 12: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Put in place encryption policies

Intrusion detection and

prevention programs

Regular automatic

assessments

Backup programs

Page 13: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

A key method of cyber attackers is to send you a malicious file to download as an email attachment

Stop new files from downloading automatically until they have been

checked manually

Page 14: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

3 EDUCATE ALL COMPANY MEMBERS ABOUT IT SECURITY

Page 15: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Get everyone on board when it comes to monitoring the security of your IT

infrastructure

Page 16: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Train employees to encrypt their information and to recognize attempted

cyber attacks

Page 17: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Train employees to encrypt their information and to recognize attempted

cyber attacks

Create a set of employee

regulations

Page 18: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

One very good policy to implement here is data minimization: this means only sharing data with the minimum number of top level

employees

A single lost laptop can result in a huge data breach

Page 19: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

4HAVE A DETAILED PLAN ABOUT WHAT TO DO IN THE EVENT OF A DATA BREACH

Page 20: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Plans about how to respond to suspicious activity

Page 21: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Set up real time alerts which enable you to identify threats

Page 22: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

If there is a data breach, the relevant part of the system should be shut down following the advice of an IT professional. This will best preserve evidence of

the breach which can be analyzed in order to improve future security

Integrate prevention and response strategies into your day to day

operations

Page 23: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

5 BE SMART ABOUT WHO YOU HIRE

Page 24: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Hiring an IT professional (or a team of professionals) to keep your IT

infrastructure safe is a very good idea

Page 25: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Think of this additional hire as an investment rather than a loss of

money

Page 26: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Do not just look close to home, either: tap in to the global talent pool to ensure that you hire the perfect

person for the job

Think of this additional hire as an investment rather than a loss of

money

Page 27: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Hiring a dedicated person, or group of people, to deal with your company’s cyber security, moreover, is very good for business

Many security professionals can work remotely for much of the time

Page 28: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)

Show the world that you care a lot about keeping all of your customers’ and also any business partners’ data safe and secure at all times

Visit Our Article

Page 29: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)