SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Financial Adviser
Cyber Information Security
What you need to know
IP Sentinel – watching over your intellectual property

ACT NOW
You are responsible for some of the most valuable data in the world. That of your clients’.
It is imperative that you know how to process, protect and manage that information.
The penalties for not doing so can run into the millions and ruin the reputation of your business.
The Financial Conduct Authority (‘FCA’), The Information Commissioner and your PI Insurer all have
requirements you have to meet.
Do you know what your responsibilities are?
Do you understand the threats to the information you hold?
Do you know how to protect yourself?
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

What is Information?
As an adviser you have ‘Identifying Data’ for each and every one of your clients

•

Name, address, email, contact telephone

You also have so much more due to AML & KYC requirements

•

Copies of passport, driving licence, utility bill, bank statements

You could have even more that that

•

Bank account details, investment histories, insurance policy details

This information is valuable to your clients
Your servers probably hold enough information for criminals to steal the identity of every one of your
clients
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

You are responsible for client information
The Financial Conduct Authority

•
•
•

FCA Principle 2
FCA Principle 3
Rule 3.2.6R in the Senior Management Arrangements, Systems and Controls sourcebook
(SYSC)

The Information Commissioner

•

Data Protection Act 1998 and 2003

The PI Insurer

•

Whilst you may have cover in place for a limited third party loss relating to cyber security, it is
unlikely that your existing cover will reinstate any losses to your own business
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

How do you process information?
To manage your client accounts and information

•
•
•
•

Do you have a manual process that is largely paper based?
Or is your process largely email, spreadsheets and word documents?
Or an Intranet workflow integrated with an online Customer Relationship Management (CRM) system
Or a Vendor provided Practice management solution?

Most probably part of your process is outsourced to a vendor or service provider, maybe as part of a
network arrangement.
Would you know if information had gone missing?
What would you do if you discovered that it had?
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Where do you keep information?
Your clients have given you their information. Do you know where that information is
now?
• On your laptop/PC
• Or in hard copy in a locked filing cabinet in
your office
• Or stored in a document archive offsite
• Or stored as an attachment in your email

•
•
•
•
•

Or saved as a spreadsheet on a file server
Or in a vendor supplied application
Or in the “cloud”
Or hosted on a vendor service
Or on a 3rd party backup service

Probably a little of all of the above
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

How do you protect information?
•

Who should and who actually does have access to
client information?

•

Do you trust them? Does their employment contract
cover their responsibilities?

•
•
•

Who is responsible for Data Protection?
Who is responsible for dealing with a Data loss? Hack
attack? Computer crash?
Who is responsible for Employees joining and leaving,

as well as examining what they bring or take with
them?

•
•
•

Do you encrypt the data? If so how?

•

Do you audit your policies & their implementation
regularly?

How do you communicate? WiFi? iDevice? Laptop?
Do you have an IT policy on passwords? User access
levels?

IP Sentinel can provide you with a solution
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Your Strategy
Carry on as you are - Sorry that’s not going to work for too long
• The FCA have stated Data Protection is one of their key focus areas. There’s EU legislation on the way to make
sure you do something. It’s all over the news.

Buy Cyber Liability Insurance – Deals with the finance aspects only

•
•

It’s not cheap!
Doesn’t help your reputation or replace your clients.

Let my IT department manage this problem

•
•

Data Protection is a whole business issue
It is a specialist area

If you think you need to do more, IP Sentinel can help
info@ip-sentinel.com
http://ip-sentinel.com
IP Sentinel – watching over your intellectual property

Engage IP Sentinel
IP Sentinel is a specialist in Cyber and Information Security in the Adviser and DFM marketplace.
We provide a 4 step program to help you protect your important data and work towards satisfying the Regulators.

Step 1: Recognition
Step 2: Prevention
Step 3: Monitoring & Mitigation
Step 4: Response & Recovery
Regardless of your size or business model you have a duty to protect your client data. If you have any questions about your
responsibilities,
call us today on 01825 701870
Or email info@ip-sentinel.com
Or visit our website http://ip-sentinel.com

info@ip-sentinel.com
http://ip-sentinel.com

Mais conteúdo relacionado

Destaque

Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 AnnyZhu315
 
IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913Mohsen Memarzadeh
 
Bluerise introductory presentation
Bluerise introductory presentationBluerise introductory presentation
Bluerise introductory presentationBluerise
 
Mobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioMobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioHolly Dowden
 
Producer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successProducer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successjareddroy
 
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...Sarah Cohen
 
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemCES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemBen Grossman
 
Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Chuck Bowen
 
Portland Visitor's Guide
Portland Visitor's GuidePortland Visitor's Guide
Portland Visitor's GuideMarshallRosario
 
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupUsing Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupFlexera
 
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc.
 

Destaque (14)

Run For Freedom 2012
Run For Freedom 2012Run For Freedom 2012
Run For Freedom 2012
 
Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014 Capital Link's Monthly CEF & ETF Newsletter - February 2014
Capital Link's Monthly CEF & ETF Newsletter - February 2014
 
Hurricane preparedness white paper
Hurricane preparedness white paperHurricane preparedness white paper
Hurricane preparedness white paper
 
IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913IntJEnvHealthEng1150-5515334_151913
IntJEnvHealthEng1150-5515334_151913
 
Bluerise introductory presentation
Bluerise introductory presentationBluerise introductory presentation
Bluerise introductory presentation
 
Mobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer PortfolioMobile apps and services from mPortal - Our Customer Portfolio
Mobile apps and services from mPortal - Our Customer Portfolio
 
Producer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to successProducer Recruiting: FIVE steps to success
Producer Recruiting: FIVE steps to success
 
Konduko institutional
Konduko institutionalKonduko institutional
Konduko institutional
 
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
The Librarian Says "Turn Your Cellphones on!": Piloting mobile polling in inq...
 
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach ThemCES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
CES 2013: Who Attends CES & How Brands, Marketers & Exhibitors Can Reach Them
 
Water Law and Policy in the U.S.
Water Law and Policy in the U.S.Water Law and Policy in the U.S.
Water Law and Policy in the U.S.
 
Portland Visitor's Guide
Portland Visitor's GuidePortland Visitor's Guide
Portland Visitor's Guide
 
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer SetupUsing Chained .MSI Packages to Componentize Your Windows Installer Setup
Using Chained .MSI Packages to Componentize Your Windows Installer Setup
 
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound AthletesC.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
C.H.A.M.P.S. Inc. Marketing Service For College Bound Athletes
 

Último

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Adviser & DFM Cyber & Information security

  • 1. Financial Adviser Cyber Information Security What you need to know
  • 2. IP Sentinel – watching over your intellectual property ACT NOW You are responsible for some of the most valuable data in the world. That of your clients’. It is imperative that you know how to process, protect and manage that information. The penalties for not doing so can run into the millions and ruin the reputation of your business. The Financial Conduct Authority (‘FCA’), The Information Commissioner and your PI Insurer all have requirements you have to meet. Do you know what your responsibilities are? Do you understand the threats to the information you hold? Do you know how to protect yourself? info@ip-sentinel.com http://ip-sentinel.com
  • 3. IP Sentinel – watching over your intellectual property What is Information? As an adviser you have ‘Identifying Data’ for each and every one of your clients • Name, address, email, contact telephone You also have so much more due to AML & KYC requirements • Copies of passport, driving licence, utility bill, bank statements You could have even more that that • Bank account details, investment histories, insurance policy details This information is valuable to your clients Your servers probably hold enough information for criminals to steal the identity of every one of your clients info@ip-sentinel.com http://ip-sentinel.com
  • 4. IP Sentinel – watching over your intellectual property You are responsible for client information The Financial Conduct Authority • • • FCA Principle 2 FCA Principle 3 Rule 3.2.6R in the Senior Management Arrangements, Systems and Controls sourcebook (SYSC) The Information Commissioner • Data Protection Act 1998 and 2003 The PI Insurer • Whilst you may have cover in place for a limited third party loss relating to cyber security, it is unlikely that your existing cover will reinstate any losses to your own business info@ip-sentinel.com http://ip-sentinel.com
  • 5. IP Sentinel – watching over your intellectual property How do you process information? To manage your client accounts and information • • • • Do you have a manual process that is largely paper based? Or is your process largely email, spreadsheets and word documents? Or an Intranet workflow integrated with an online Customer Relationship Management (CRM) system Or a Vendor provided Practice management solution? Most probably part of your process is outsourced to a vendor or service provider, maybe as part of a network arrangement. Would you know if information had gone missing? What would you do if you discovered that it had? info@ip-sentinel.com http://ip-sentinel.com
  • 6. IP Sentinel – watching over your intellectual property Where do you keep information? Your clients have given you their information. Do you know where that information is now? • On your laptop/PC • Or in hard copy in a locked filing cabinet in your office • Or stored in a document archive offsite • Or stored as an attachment in your email • • • • • Or saved as a spreadsheet on a file server Or in a vendor supplied application Or in the “cloud” Or hosted on a vendor service Or on a 3rd party backup service Probably a little of all of the above info@ip-sentinel.com http://ip-sentinel.com
  • 7. IP Sentinel – watching over your intellectual property How do you protect information? • Who should and who actually does have access to client information? • Do you trust them? Does their employment contract cover their responsibilities? • • • Who is responsible for Data Protection? Who is responsible for dealing with a Data loss? Hack attack? Computer crash? Who is responsible for Employees joining and leaving, as well as examining what they bring or take with them? • • • Do you encrypt the data? If so how? • Do you audit your policies & their implementation regularly? How do you communicate? WiFi? iDevice? Laptop? Do you have an IT policy on passwords? User access levels? IP Sentinel can provide you with a solution info@ip-sentinel.com http://ip-sentinel.com
  • 8. IP Sentinel – watching over your intellectual property Your Strategy Carry on as you are - Sorry that’s not going to work for too long • The FCA have stated Data Protection is one of their key focus areas. There’s EU legislation on the way to make sure you do something. It’s all over the news. Buy Cyber Liability Insurance – Deals with the finance aspects only • • It’s not cheap! Doesn’t help your reputation or replace your clients. Let my IT department manage this problem • • Data Protection is a whole business issue It is a specialist area If you think you need to do more, IP Sentinel can help info@ip-sentinel.com http://ip-sentinel.com
  • 9. IP Sentinel – watching over your intellectual property Engage IP Sentinel IP Sentinel is a specialist in Cyber and Information Security in the Adviser and DFM marketplace. We provide a 4 step program to help you protect your important data and work towards satisfying the Regulators. Step 1: Recognition Step 2: Prevention Step 3: Monitoring & Mitigation Step 4: Response & Recovery Regardless of your size or business model you have a duty to protect your client data. If you have any questions about your responsibilities, call us today on 01825 701870 Or email info@ip-sentinel.com Or visit our website http://ip-sentinel.com info@ip-sentinel.com http://ip-sentinel.com