It only takes one data breach to cause significant, long-term damage to the reputation of your business. In recent years Cyber Security has become one of the most important elements of successful IT strategies.
According to the National Cyber Security Council cyber security is an implied necessity of the GDPR:
“The GDPR requires that personal data must be processed securely using appropriate technical and organisational measures. The Regulation does not mandate a specific set of cyber security measures but rather expects you to take ‘appropriate’ action. In other words you need to manage risk. What is appropriate for your organisation will depend upon your circumstances as well as the type of data that you are processing and therefore the risks posed, however there is an expectation you have minimal, established security measures in place. The security measures must be designed into your systems at the outset (referred to as Privacy by Design) and maintained effective throughout the life of your system.” ref: https://www.ncsc.gov.uk/GDPR
Your data needs to be protected against more than just external hackers and internal security risks. Don’t forget that badly configured systems can leak data and that malware can steal or encrypt data – both are significant threats. One of the most common methods we see is the phishing of user credentials, especially of those with administrator rights.
Data needs to be encrypted both on hard drives (known as Data At Rest) and whilst being transmitted across networks (known as Data In Transit). For a small business this can often be achieved fairly easily with just a few changes, whereas a large multi-national organisation could face quite a complex challenge, possibly even requiring dedicated hardware solutions.
Traditional firewalls alone cannot protect your data; todays next generation of firewalls are known as Unified Threat Management (UTM) security appliances which, additionally, provide intrusion detection, anti-malware, anti-spam, content filtering and VPN capabilities in one integrated package.
Larger organisations should consider investing in a SIEM (Security Information Event Management) platform. A SIEM collects real-time event logs from your servers, network hardware and security appliances and will automatically identify and alert you to hacking attempts, breaches, user account issues, malware and other types of security incidents.
Whether a small business or large corporation, we can review your current security infrastructure and make recommendations and changes to improve the protection it provides.