Cyber Security is an on-going challenge for the boards of companies of all shapes and sizes. Part of the challenge is Cyber Security is largely intangible, it is hard to determine if your business has an appropriate level of security, or even determine what an appropriate level of security is.
To help companies with this, BIS and GCHQ released the 10 Steps to Cyber Security Guidance Sheets.
The 10 steps are (select a step to explore the topic in more detail):
- Information Risk Management Regime
- Secure Configuration
- Network Security
- Managing User Privileges
- User Education and Awareness
- Incident Management
- Malware Prevention
- Removable Media Controls
- Home and Mobile Working
The purpose of this series of articles is to look at the 10 steps to cyber security, specifically looking at good practice in these areas.
What constitutes good practice is continuously evolving, so each page enables discussion to feedback your experiences. We will also maintain the “See Also” sections on each page, to reference, vendor neutral, discussions of good practice.
This series of articles is sponsored by NEXOR.
NEXOR provide a free iPad / iPhone app – NEXOR Quaestor to help organisations take the ten steps to cyber security test.
For companies concerned about their Cyber Security, NEXOR provide a Cyber Security Maturity Assessment Service for company boards.