“There are only two types of companies: Those that have been hacked and those that will be hacked.” 

Robert S. Mueller, III, former Director of the FBI and now Special Counsel 

By the time he made this comment, it was out of date – it should instead read

“There are only two types of companies: those that have been hacked and those that don’t know they have been hacked.”

Find out about how to protect your business

Your team: Your first Line of Defence

Your team are your greatest resource without whom literally nothing about your organisational goals would move forward. They are the doers! They are also, by definition, the individuals who see, modify, change, delete your valuable information. They are your first line of defence against information security risks.

However, they are also one of the key attack vectors for malactors who seek illegal and uncontrolled access to your data through social engineering attacks these threats include, but are far from limited to

Threats

DNS spoofing

Living Off the Land (LOtL)

Phishing

Pretexting

Spear Phishing

Scareware

SMS phishing

Spoofing attack

Vishing

Watering Hole

This is a superficial list of threats in an ever-widening set of threats.

Training

We can provide training directly to your team and work closely with internationally recognised certification organisations to support full certification

CyberEssentials and CyberEssentials+ are UK data protection standards which focus your business on five technical control themes:

  • firewalls
  • secure configuration
  • user access control
  • malware protection
  • security update management

These areas, along with the increased use of largely uncontrolled home working environments are the key areas of technical risk and always falll within the scope of certification

International Standards

The International Organization for Standardization (ISO) is an international nongovernmental organization made up of national standards bodies; it develops and publishes a wide range of proprietary, industrial, and commercial standards comprising representatives from national standards organizations.

Because the organization is global and would therfore have different acronyms in different languages, the founders named it using its short form: ISO

ISO-27001 is one of the standards of interest to those who take data privay and data protection seriously. Other important standards in this area incude ISO-22301: Business continuity management systems and ISO-27701: Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management

ISO-27001

Operational compliance is assessed against this internal standard on an on-going basis and, on occassion, non-conformities are identified. These Improvements are put in place thoughout the life of the ISMS which maintains and improves this high standard of data procection and Information Security.

ISO-27701

ISO-27701is a privacy extension to ISO/IEC 27001. It enhances the existing Information Security Management System (ISMS) with requirements to establish, implement, maintain, and continually improve a Privacy Information Management System (PIMS) thereby achieving a gold standard in the protection of Personally Identifiable Information – Data Subjects’ Private Information with even greater focus on protecting special categoy data.

ISO-27701 is intended to be a certifiable extension to ISO/IEC 27001 certifications so organizations planning to seek an ISO/IEC 27701 certification will also need to have an ISO/IEC 27001 certification. As such it meets all requirements of regulations such as GDPR/UKGDPR Arcticle 32 and associated data protection requirements

ISO-22301

This standard enables an organisation to fully understand and perfect its readiness for disaster scenarios. The might include loss of premise, key information assets either by damage or attack (such as those represented by Ransomware).

To achieve this ISO-22301 focuses risk analysis on

  • Operational planning and control
  • Business impact analysis and risk assessment
  • Business continuity strategies and solutions
  • Business continuity planning and procedures
  • Exercising of the planned activities
  • Management Review of the process

Like ISO-27001 the organisation’s preparedness is documented in an ISO-9000-compliant Managementy System which are then used to assess operational performace. This process inevitably leads Improvements being made thoughout the life of the BCMS and surrounding processes.