It only takes one data breach to cause significant, long-term damage to the reputation of your business. In recent years Cyber Security has become one of the most important parts of successful IT strategies.
Cyber Security is also an implied necessity of GDPR, the NCSC say “The GDPR requires that personal data must be processed securely using appropriate technical and organisational measures. The Regulation does not mandate a specific set of cyber security measures but rather expects you to take ‘appropriate’ action. In other words you need to manage risk. What is appropriate for you will depend upon your circumstances as well as the data you are processing and therefore the risks posed, however there is an expectation you have minimal, established security measures in place. The security measures must be designed into your systems at the outset (referred to as Privacy by Design) and maintained effective throughout the life of your system.” ref: https://www.ncsc.gov.uk/GDPR
Your data needs to be protected against more than just external hackers and internal security risks. Don’t forget that badly configured systems can leak data and that malware can steal or encrypt data – both are significant threats nowadays. One of the most common methods seen is the phishing of user credentials, especially of those with administrator rights.
Data needs to be encrypted both on hard drives (known as Data At Rest) and whilst being transmitted across a network (known as Data In Transit). For a small business this can often be easily achieved fairly easily with a few changes, whereas a large multi-national organisation could face quite a complex challenge, possibly even requiring dedicated hardware solutions.
Traditional firewalls alone cannot protect your data. Todays next generation of firewalls are known as Unified Threat Management (UTM) security appliances, they also provide intrusion detection, anti-malware, anti-spam, content filtering and VPN capabilities in one integrated package.
Larger organisations should invest in a SIEM (Security Information Event Management) platform. A SIEM collects event logs from your servers, network hardware and security appliances and will automatically identify and alert you to hacking attempts, breaches, user account issues, malware and other types of security incidents.
Whether a small business or large corporation, we can review your current security infrastructure and make recommendations and changes to improve the protection it provides or, if necessary, we can design you a newer, up to date replacement.