SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
SME Business Guidance Series 
Cyber Security 
Provided by: 
Bennett Christmas Insurance Brokers Ltd 
www.bennettchristmas.com 
The content of this guide is of general interest only and not intended to apply to specific circumstances. It does 
not purport to be a comprehensive analysis of all matters relevant to its subject matter. It does not address all 
potential compliance issues with UK, EU or any other regulations. The content should not, therefore, be regarded 
as constituting legal advice and not be relied upon as such. It should not be used, adopted or modified without 
competent legal advice or legal opinion. In relation to any particular problem which they may have, readers are 
advised to seek specific advice. Further, the law may have changed since first publication and the reader is 
cautioned accordingly. Design © 2013 Zywave, Inc. All rights reserved. 
Contains public sector information published by the BIS and licensed under the Open Government Licence v1.0.
Many small business owners have taken advantage of online business tools, such as advertising, 
carrying out financial transactions and communicating with customers and suppliers. However, 
this increase in usage also brings new and more complex risks into the equation. Every day 
throughout the United Kingdom, attacks on security and IT systems try to steal private 
information or disrupt businesses. According to a recent study by the Department for Business, 
Innovation and Skills, 87 per cent of small business respondents experienced a security breach 
within the past year. 
Understanding Your Risks 
As a small business owner, you need to protect your computer-based equipment, data and 
information from unauthorised access. While it is almost impossible to prevent all risks, the 
majority of risks can be prevented with basic security practices. It does not have to cost a lot of 
money, nor do you have to be an IT expert to implement these practices. Even by taking basic 
measures, you can protect your assets, reputation and customers and help your business thrive. 
Common Types of Attacks 
Cyber attacks typically target your business’s information and IT-based services and equipment. 
Information commonly stolen includes client lists, transactions, databases, financial details, 
pricing information and personal data. This can occur through theft or unauthorised access of 
equipment, remote attacks on the IT system or your website, and attacks on information held 
on third-party systems, such as a cloud-based system. 
Sources of the Attacks 
Cyber attacks don’t just come from outside parties (criminals and competitors) trying to steal 
from or disrupt your business—they can also come from current or former employees. 
Employees have access to privileged information and can compromise it by accident, through 
negligence or with malicious intent. Even leaving a laptop unattended for a few minutes can 
pose a threat. 
Consequences of the Attacks 
One single attack could seriously damage your business and can cause significant financial losses 
and costs. Financial losses may occur when financial and bank details are taken, everyday 
business is disrupted or even when business is lost due to a damaged reputation. A poor 
reputation can shrink your customer base. There are also significant costs involved with a 
successful cyber attack. Costs include cleaning up and restoring equipment, IT systems, 
networks and websites. The Information Commissioner’s Office could fine you for 
noncompliance with the Data Protection Act. Attacks can also damage other companies you are 
associated with, such as suppliers or business partners. 
Managing Your Risks 
Managing your cyber risks can be accomplished in three simple steps: planning, implementation 
and review. The following pages provide principle assessment questions and a checklist for each 
step. 
2 | Small Business Cyber Security
3 | Small Business Cyber Security 
Step 1: Planning 
1. What information assets are critical to your business? What kind of 
risks could they be exposed to? 
Assessment 2. What legal and compliance requirements is your business subject to? 
Questions 
3. How could you continue to do business if you were attacked? How 
could you manage these risks on an ongoing basis? 
Planning Checklist 
Make information security part of your normal business risk management procedures. 
Consider whether your business could be a target for an attack. Ask your suppliers, major 
customers or similar businesses if they have been attacked, so you can learn from their 
experiences. 
Know whether you need to comply with personal data protection legislation, such as the 
Data Protection Act and Payment Card Industry compliance. 
Identify financial and information assets critical to your business. Identify essential IT 
services, such as online payment. Evaluate all IT equipment, including mobile and 
personal IT devices. Understand the risks to all of these things by considering how they 
are currently managed and stored, and who has access to them. 
Assess the level of password protection required to access equipment and online services 
by staff, third parties and customers. Determine whether more security is needed. 
Ensure all staff is properly trained and understands their role in cyber security. 
Decide whether additional investments or expert advice is needed to properly protect 
your business. If so, seek appropriate advice. 
Determine who can provide assistance if you are attacked or if online services are 
disrupted. Define recovery procedures and plan how to keep your business running in the 
event of an attack.
4 | Small Business Cyber Security 
Step 2: Implementation 
1. Do you have the right security controls in place to protect your 
information, equipment, IT system and outsourced services? 
2. Does your staff know what their responsibilities are? Are they aware 
of best practices? 
Assessment 
Questions 
3. How will you deal with an attack or threat? How will you get your 
business running again? Who can you turn to for assistance? 
Implementation Checklist 
Put the proper security controls in place for your business. If third-party IT services are used, check 
your contracts and service level agreements, and ensure that security controls are in place. 
Install malware protection or anti-virus solutions on all systems and keep all software up 
to date. Restrict access to inappropriate websites. Create a security update policy 
detailing how and when updates are to be installed. 
Protect your networks, including wireless ones, with firewalls, proxies, access lists and 
other measures. 
Identify a standard secure configuration for all IT equipment. Maintain an inventory of all 
equipment and software. Change any default passwords. 
Manage user privileges and restrict access (staff and third-party) to the minimum 
required. Keep equipment physically secured to prevent unauthorised access. 
For home and mobile workers, ensure that sensitive data is encrypted when stored or 
transmitted online so that data can only be accessed by authorised users. 
Restrict the use of removable media such as USB drives, CDs, DVDs and secure digital 
cards. Protect any data stored on such media to prevent losing data and to prevent 
malware from being installed. 
Monitor use of all equipment and IT systems, collect activity logs and make sure you 
know how to identify unauthorised or malicious activity.
5 | Small Business Cyber Security 
Step 3: Review 
1. Are you reviewing and testing the effectiveness of your control 
measures? 
2. Are you actively monitoring and acting on the information received? 
Assessment 
Questions 
3. Are you keeping up with the latest cyber risks and threats? 
Review Checklist 
Periodically review your security and respond to any changes or problems you identify. 
Test, monitor and improve your security controls on a regular basis to manage any 
changes to your level of risk. 
Remove any software or equipment that is no longer needed. This will ensure sensitive 
information stored on it will be disposed of. 
Review and manage changes to user access. 
If attacked, ensure that the response includes removing on-going threats (such as 
malware), understanding the cause of the incident and addressing any gaps in your 
security that were identified. 
Report online fraud and attack to the police via the Action Fraud website at 
www.actionfraud.police.uk/report_fraud. You may also need to notify customers and 
suppliers if their data has been compromised or lost.

Mais conteúdo relacionado

Mais procurados

5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementMafazo: Digital Solutions
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Tony Richardson CISSP
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat KeynoteJohn D. Johnson
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 

Mais procurados (19)

5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
Task 3
Task 3Task 3
Task 3
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 

Destaque

Screening volunteers for your organisation
Screening volunteers for your organisationScreening volunteers for your organisation
Screening volunteers for your organisationMark Bennett
 
Hegewald Center Graduate Party 6.6.14
Hegewald Center Graduate Party 6.6.14Hegewald Center Graduate Party 6.6.14
Hegewald Center Graduate Party 6.6.14ladybug5697
 
Are You Prepared - Extreme Heat
Are You Prepared - Extreme HeatAre You Prepared - Extreme Heat
Are You Prepared - Extreme HeatMark Bennett
 
presentation for diplom
presentation for diplompresentation for diplom
presentation for diplomkasjanov
 
กฎและกติกา มารยาท ยิมนาสติก
กฎและกติกา มารยาท ยิมนาสติกกฎและกติกา มารยาท ยิมนาสติก
กฎและกติกา มารยาท ยิมนาสติกAn-an VI'ndice
 
Theodor W. Adorno Minima Moralia
Theodor W. Adorno   Minima MoraliaTheodor W. Adorno   Minima Moralia
Theodor W. Adorno Minima MoraliaOncü Yıldız
 
Behavior based
Behavior basedBehavior based
Behavior basedasmhemu
 
Creating Abundant Communities: The second human potential movement
Creating Abundant Communities: The second human potential movementCreating Abundant Communities: The second human potential movement
Creating Abundant Communities: The second human potential movementLucian Tarnowski
 
An introduction to microcontrollers
An introduction to microcontrollersAn introduction to microcontrollers
An introduction to microcontrollersasmhemu
 
TIC TAC TOE
TIC TAC TOETIC TAC TOE
TIC TAC TOEasmhemu
 
Selection sort 1
Selection sort 1Selection sort 1
Selection sort 1asmhemu
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safetyMark Bennett
 

Destaque (13)

Screening volunteers for your organisation
Screening volunteers for your organisationScreening volunteers for your organisation
Screening volunteers for your organisation
 
Hegewald Center Graduate Party 6.6.14
Hegewald Center Graduate Party 6.6.14Hegewald Center Graduate Party 6.6.14
Hegewald Center Graduate Party 6.6.14
 
Are You Prepared - Extreme Heat
Are You Prepared - Extreme HeatAre You Prepared - Extreme Heat
Are You Prepared - Extreme Heat
 
presentation for diplom
presentation for diplompresentation for diplom
presentation for diplom
 
Hobby
HobbyHobby
Hobby
 
กฎและกติกา มารยาท ยิมนาสติก
กฎและกติกา มารยาท ยิมนาสติกกฎและกติกา มารยาท ยิมนาสติก
กฎและกติกา มารยาท ยิมนาสติก
 
Theodor W. Adorno Minima Moralia
Theodor W. Adorno   Minima MoraliaTheodor W. Adorno   Minima Moralia
Theodor W. Adorno Minima Moralia
 
Behavior based
Behavior basedBehavior based
Behavior based
 
Creating Abundant Communities: The second human potential movement
Creating Abundant Communities: The second human potential movementCreating Abundant Communities: The second human potential movement
Creating Abundant Communities: The second human potential movement
 
An introduction to microcontrollers
An introduction to microcontrollersAn introduction to microcontrollers
An introduction to microcontrollers
 
TIC TAC TOE
TIC TAC TOETIC TAC TOE
TIC TAC TOE
 
Selection sort 1
Selection sort 1Selection sort 1
Selection sort 1
 
Quiz warehouse safety
Quiz warehouse safetyQuiz warehouse safety
Quiz warehouse safety
 

Semelhante a Cyber security guide

Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breachincmagazineseo
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Enterprise Wired
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businessesbasilmph
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewTheEntrepreneurRevie
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfNeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 

Semelhante a Cyber security guide (20)

Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 

Cyber security guide

  • 1. SME Business Guidance Series Cyber Security Provided by: Bennett Christmas Insurance Brokers Ltd www.bennettchristmas.com The content of this guide is of general interest only and not intended to apply to specific circumstances. It does not purport to be a comprehensive analysis of all matters relevant to its subject matter. It does not address all potential compliance issues with UK, EU or any other regulations. The content should not, therefore, be regarded as constituting legal advice and not be relied upon as such. It should not be used, adopted or modified without competent legal advice or legal opinion. In relation to any particular problem which they may have, readers are advised to seek specific advice. Further, the law may have changed since first publication and the reader is cautioned accordingly. Design © 2013 Zywave, Inc. All rights reserved. Contains public sector information published by the BIS and licensed under the Open Government Licence v1.0.
  • 2. Many small business owners have taken advantage of online business tools, such as advertising, carrying out financial transactions and communicating with customers and suppliers. However, this increase in usage also brings new and more complex risks into the equation. Every day throughout the United Kingdom, attacks on security and IT systems try to steal private information or disrupt businesses. According to a recent study by the Department for Business, Innovation and Skills, 87 per cent of small business respondents experienced a security breach within the past year. Understanding Your Risks As a small business owner, you need to protect your computer-based equipment, data and information from unauthorised access. While it is almost impossible to prevent all risks, the majority of risks can be prevented with basic security practices. It does not have to cost a lot of money, nor do you have to be an IT expert to implement these practices. Even by taking basic measures, you can protect your assets, reputation and customers and help your business thrive. Common Types of Attacks Cyber attacks typically target your business’s information and IT-based services and equipment. Information commonly stolen includes client lists, transactions, databases, financial details, pricing information and personal data. This can occur through theft or unauthorised access of equipment, remote attacks on the IT system or your website, and attacks on information held on third-party systems, such as a cloud-based system. Sources of the Attacks Cyber attacks don’t just come from outside parties (criminals and competitors) trying to steal from or disrupt your business—they can also come from current or former employees. Employees have access to privileged information and can compromise it by accident, through negligence or with malicious intent. Even leaving a laptop unattended for a few minutes can pose a threat. Consequences of the Attacks One single attack could seriously damage your business and can cause significant financial losses and costs. Financial losses may occur when financial and bank details are taken, everyday business is disrupted or even when business is lost due to a damaged reputation. A poor reputation can shrink your customer base. There are also significant costs involved with a successful cyber attack. Costs include cleaning up and restoring equipment, IT systems, networks and websites. The Information Commissioner’s Office could fine you for noncompliance with the Data Protection Act. Attacks can also damage other companies you are associated with, such as suppliers or business partners. Managing Your Risks Managing your cyber risks can be accomplished in three simple steps: planning, implementation and review. The following pages provide principle assessment questions and a checklist for each step. 2 | Small Business Cyber Security
  • 3. 3 | Small Business Cyber Security Step 1: Planning 1. What information assets are critical to your business? What kind of risks could they be exposed to? Assessment 2. What legal and compliance requirements is your business subject to? Questions 3. How could you continue to do business if you were attacked? How could you manage these risks on an ongoing basis? Planning Checklist Make information security part of your normal business risk management procedures. Consider whether your business could be a target for an attack. Ask your suppliers, major customers or similar businesses if they have been attacked, so you can learn from their experiences. Know whether you need to comply with personal data protection legislation, such as the Data Protection Act and Payment Card Industry compliance. Identify financial and information assets critical to your business. Identify essential IT services, such as online payment. Evaluate all IT equipment, including mobile and personal IT devices. Understand the risks to all of these things by considering how they are currently managed and stored, and who has access to them. Assess the level of password protection required to access equipment and online services by staff, third parties and customers. Determine whether more security is needed. Ensure all staff is properly trained and understands their role in cyber security. Decide whether additional investments or expert advice is needed to properly protect your business. If so, seek appropriate advice. Determine who can provide assistance if you are attacked or if online services are disrupted. Define recovery procedures and plan how to keep your business running in the event of an attack.
  • 4. 4 | Small Business Cyber Security Step 2: Implementation 1. Do you have the right security controls in place to protect your information, equipment, IT system and outsourced services? 2. Does your staff know what their responsibilities are? Are they aware of best practices? Assessment Questions 3. How will you deal with an attack or threat? How will you get your business running again? Who can you turn to for assistance? Implementation Checklist Put the proper security controls in place for your business. If third-party IT services are used, check your contracts and service level agreements, and ensure that security controls are in place. Install malware protection or anti-virus solutions on all systems and keep all software up to date. Restrict access to inappropriate websites. Create a security update policy detailing how and when updates are to be installed. Protect your networks, including wireless ones, with firewalls, proxies, access lists and other measures. Identify a standard secure configuration for all IT equipment. Maintain an inventory of all equipment and software. Change any default passwords. Manage user privileges and restrict access (staff and third-party) to the minimum required. Keep equipment physically secured to prevent unauthorised access. For home and mobile workers, ensure that sensitive data is encrypted when stored or transmitted online so that data can only be accessed by authorised users. Restrict the use of removable media such as USB drives, CDs, DVDs and secure digital cards. Protect any data stored on such media to prevent losing data and to prevent malware from being installed. Monitor use of all equipment and IT systems, collect activity logs and make sure you know how to identify unauthorised or malicious activity.
  • 5. 5 | Small Business Cyber Security Step 3: Review 1. Are you reviewing and testing the effectiveness of your control measures? 2. Are you actively monitoring and acting on the information received? Assessment Questions 3. Are you keeping up with the latest cyber risks and threats? Review Checklist Periodically review your security and respond to any changes or problems you identify. Test, monitor and improve your security controls on a regular basis to manage any changes to your level of risk. Remove any software or equipment that is no longer needed. This will ensure sensitive information stored on it will be disposed of. Review and manage changes to user access. If attacked, ensure that the response includes removing on-going threats (such as malware), understanding the cause of the incident and addressing any gaps in your security that were identified. Report online fraud and attack to the police via the Action Fraud website at www.actionfraud.police.uk/report_fraud. You may also need to notify customers and suppliers if their data has been compromised or lost.