• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
Computer Business World News

Computer Business World News

Trending News about Computers, Business and Tech

  • Home
  • BUSINESS
  • CAREERS
  • CLOUD
  • COMPUTERS
  • CYBERSECURITY
  • I.T.
  • TECH
  • VOIP
  • About

Successfully managing cyber security risks

by


add to folder:

Folders shared with you

Gadens logo

What can you do?

  • Risk assessment – Identify the security risks to information held by the organisation and the consequences of a breach of security
  • Policy development – Develop a policy or range of policies that implement measures, practices and procedures to reduce the identified risks to information security
  • Staff training – Train staff and managers in security and fraud awareness, practices and procedures, and codes of conduct.
  • Technology – Implement technologies to secure information held by the firm, including through such measures as access control, copy protection, intrusion detection, and robust encryption. 
  • Monitoring and review – Monitor compliance with the security policy, periodic assessments of new security risks and the adequacy of existing security measures, and ensuring that effective complaint handling procedures are in place.
  • Appropriate contract management – Conduct appropriate due diligence where services (especially data storage services) are contracted, particularly in terms of the IT security policies and practices that the service provider has in place, and then monitoring compliance with these policies through periodic audits.

Top tips and takeaways

  1. Cyber breach events are increasing and pose substantial risk to both public and private sectors.
  2. Given the stance regulators and government are taking on cyber risk, organisations which ignore cyber risk do so at their own peril. 
  3. Understand the new data breach notification laws
  4. Policy review and updates.
  5. Build awareness to reinforce compliance over time.
  6. Allocate responsibility for privacy and data security at a Board Level.
  7. Review insurance policies and assess coverage for data breaches; consider whether cyber insurance is required.
  8. Train staff.

 

add to folder:

Folders shared with you

Popular articles from this firm

If you would like to learn how Lexology can drive your content marketing strategy forward, please email [email protected].



Click to View Original Source

Filed Under: CYBERSECURITY

Primary Sidebar

More to See

Deutsche Telekom and FC Bayern extend it’s over 20 year-long partnership

The excellent 20-year collaboration between FC Bayern and Deutsche Telekom (DT) has been extended to 2027. The two partners will keep delighting … [Read More...] about Deutsche Telekom and FC Bayern extend it’s over 20 year-long partnership

Tidy double-decker screen setup offers a flexible way to multiscreen

Lighting up Kickstarter this week is the Geminos X, a fresh and very tidy approach to multi-screen monitor setups. Two 24-inch monitors unfold … [Read More...] about Tidy double-decker screen setup offers a flexible way to multiscreen

Denton County’s proposed budget lowers tax rate, prioritizes public safety and cybersecurity – Cross Timbers Gazette | Southern Denton County | Flower Mound

Denton County announced Tuesday that its $371 million Fiscal Year 2022-2023 recommended budget earmarks an estimated $7 million for cybersecurity … [Read More...] about Denton County’s proposed budget lowers tax rate, prioritizes public safety and cybersecurity – Cross Timbers Gazette | Southern Denton County | Flower Mound

Footer

SITE INFORMATION

COMPUTER BUSINESS WORLD NEWS

About/Contact

Privacy Policy

Thank you for visiting our website.

Recent

  • In a world of Ambient Computing, Israel remains static
  • Deutsche Telekom and FC Bayern extend it’s over 20 year-long partnership
  • Tidy double-decker screen setup offers a flexible way to multiscreen

Search

Copyright © 2022 Computer Business World