2016 Cyber Security Checklist For Organisations PDF
2016 Cyber Security Checklist For Organisations PDF
When a big business is hacked you hear about it on the news – in the past year companies including TalkTalk and Carphone Warehouse hit the headlines when
they fell victim to data breaches – but what you don’t hear so much about is when small firms are attacked. Historically cyber criminals haven’t targeted
smaller firms but since last year there has been a huge rise in these attacks and in a recent Government Security Breaches Survey 74% of small organisations
reported a security breach last year (2015)
It is impossible to make a modern business network 100% secure but there are certain measures that should be taken to help to mitigate the risks. Our
recommendations below are based around the requirements for the Government’s Cyber Essentials Scheme plus a few additional recommendations of our
own.
This is list of suggestions provided free of charge by Micro Plus Computers. This is a list of our top recommendations but you should make your own decisions
as to which of these you implement and add others that are applicable to your business. This information is supplied as-is and may be considered as part of
your overall data security and cyber security processes. Please feel free to use this as a starting point and build it up for your own organisation. Bear in mind
that your organisation should have a separate data protection policy and internet and email usage policy that may already cover some of these points or could
be updated to include some of the following.
If you need any assistance in implementing any of these suggestions or would like information as to how any of these standards can be enforced rather than
voluntary then please contact Micro Plus Computers via email [email protected]
You should also consider where these might be applicable to any third party contractors that work with your organisation that have access to your IT systems
(for example external technical support, software companies, accountants, photo copier companies, CCTV maintenance, premises access controls, telephone
companies)
Guest WiFi access to be implemented for visitors and employee owned devices
Employee owned devices that can access company email or information will require malware software
All network servers must have a daily automated backup solution with backup data stored securely offsite (encrypted)
Encryption of all sensitive data stored on mobile devices and removable storage devices
Do not allow staff to use file sharing or cloud storage services for company data such as DropBox, OneDrive, Google Drive, iCloud – unless they are
authorised by and secured for your organisation.
Staff should not be permitted to use personal social media accounts on organisation-owned devices or on any devices connected to the network
unless specifically authorised to do so.
Aside from all of the talk about hackers and external attacks, still the greatest threat to any organisation’s network and data security is its employees. It’s not
just the disgruntled staff members or those about to leave to set up in competition that you need to be aware of – the most common data breaches are caused
unintentionally by uninformed staff members.
Please make use of our separate list of suggestions for making your staff aware of cyber security risks.
If you would like a copy, please email [email protected] and ask for our Staff Awareness Cyber Security Checklist