8

Click here to load reader

Cyber Security Challenges and Strategies

Embed Size (px)

Citation preview

Page 1: Cyber Security Challenges and Strategies

Cyber Threat Environment

Cyber threats

Data theft

Data ransom

Data distortion

Data destruction/

loss

Hijacking

Page 2: Cyber Security Challenges and Strategies

All Businesses are TargetsEvery single business is a target and needs to be aware

of Cyber Threats that Exist

3 Main Reasons;

1. There is a direct financial goal

2. Data is Valuable

3. Maximum Social Damage

Page 3: Cyber Security Challenges and Strategies

Cyber Event Consequences? Potential consequences: production/service disruption, ransom cost, business loss, recovery cost, reputational damage, loss of customers, litigation, fines, reputation repair cost (marketing)

$ $ $ $

Page 4: Cyber Security Challenges and Strategies

What can you do?Whilst no one solution is entirely effective, there are

measures that can limit your risk and exposure.

But First, You need to understand where the risk lies in your business.

Page 5: Cyber Security Challenges and Strategies

Where do I Start?To simplify the process of identifying and managing security & Cyber risks to your business there are 4

distinctive areas to look at;

1. Data

2. Identity

3. The Gateway

4. External Access & Mobility

Page 6: Cyber Security Challenges and Strategies

4 Focus Points

Page 7: Cyber Security Challenges and Strategies

3 StepsWe utilise a standard 3 Step risk management approach

when it comes to Cyber. This is focused on the 4 core components within your business technology landscape

Page 8: Cyber Security Challenges and Strategies

3 Strategies to Implement Now

What can you do right now to increase the level of protection to your business

1. BACKUP - First and Foremost – Have quality backup systems in place with off-site storage

2. UPDATE & SECURE - Ensure your Computers are up to date and protected with Updates and Anti-virus – Even your MAC – Protect your internet gateway with advanced content control to unknown/suspect sites

3. EDUCATE - Educate yourself and Your Team on what to look out for and don’t open every email you receive!