Implementing Cyber Security Controls

Take these steps to put the right security controls in place for your business. If you use third-party managed IT services, check your contracts and service level agreements and ensure that whoever handles your systems and data has these security controls in place.

Malware protection: 

  • install anti-virus solutions on all systems
  • keep your software and web browsers up to date
  •  consider restricting access to inappropriate websites to lessen the risk of being exposed to malware
  • create a policy governing when and how security updates should be installed

Network security: 

  • increase protection of your networks, including wireless networks, against external attacks
  •  use firewalls, proxies, access lists and similar measures

Secure configuration:

  • maintain an inventory of all IT equipment and software
  • identify a secure standard configuration for all existing and future IT equipment used by your business
  • change any default passwords

Managing user privileges: 

  • restrict staff and third-party access to IT equipment, systems and information to the minimum required
  • keep items physically secure to prevent unauthorised access

WFH (working from home): 

  • ensure that sensitive data is encrypted when stored or transmitted online so that data can only be accessed by authorised users

Removable media: 

  • restrict the use of removable media such as USB drives, CDs, DVDs and secure digital cards
  • protect any data stored on such media to prevent data being lost and malware from being installed

Monitoring: 

  • monitor the use of all equipment and IT systems
  • collect activity logs and ensure that you have the capability to identify any unauthorised or malicious activity

We recommend sourcing a local IT service provider for the best results.

 

.

.

.

If you plan to buy a product or service for your business in the next 12 months please complete the form below.