Cyber Security Services
What does Cyber Security mean to you?
Does the mere name conjure up visions of cyborgs and sci-fi or hackers and the dark arts of the computing world?
In business, cyber security has been around almost as long as the internet and has evolved from mere password protection to high levels of encryption, advanced firewalls and embed security systems across servers, websites, email platforms and even your smartphone devices.
Unlike anti-virus software, deemed a long-standing prerequisite of any computer, cyber security is only recently receiving the attention it demands.
Perhaps the EU General Data Protection Regulation (GDPR) launch in May 2018 and the upcoming US California Consumer Privacy Act (due in January 2020) have served to highlight the responsibility of all businesses when it comes to security and their clients. Regulation has also resulted in the desire for the media to feed on the horror stories of data hacks, ransomware, malware, virus and worm attacks, phishing and spyware.
Yet, this media frenzy, which seems to report almost daily on the next big hack attack, always cites the big guy, the big brand, the businesses with large amounts of data and frankly, money. Yes, the ransomware attackers want their cash before they destroy your business.
Middle range business owners have been slower to react to cyber security, but all the indications are that is set to change. And as usual not by choice!
In business, cyber security has been around almost as long as the internet and has evolved from mere password protection to high levels of encryption, advanced firewalls and embed security systems across servers, websites, email platforms and even your smartphone devices.
Unlike anti-virus software, deemed a long-standing prerequisite of any computer, cyber security is only recently receiving the attention it demands.
Perhaps the EU General Data Protection Regulation (GDPR) launch in May 2018 and the upcoming US California Consumer Privacy Act (due in January 2020) have served to highlight the responsibility of all businesses when it comes to security and their clients. Regulation has also resulted in the desire for the media to feed on the horror stories of data hacks, ransomware, malware, virus and worm attacks, phishing and spyware.
Yet, this media frenzy, which seems to report almost daily on the next big hack attack, always cites the big guy, the big brand, the businesses with large amounts of data and frankly, money. Yes, the ransomware attackers want their cash before they destroy your business.
Middle range business owners have been slower to react to cyber security, but all the indications are that is set to change. And as usual not by choice!
FACT: Cyber Security Business Insurance
Business insurance policies can often include cyber security protection to compensate any loss incurred by an attack and sadly, any payments made to the criminals.
What many businesses do not realise, however, is that insurance premiums can be reduced significantly by implementing business cyber security protection and /or assessments. Business insurance for cyber security is not high on the budget agenda until it is needed. And all businesses need to consider:
|
What is a cyber security risk assessment?
Risk assessments have been around for a very long time. Digital risk assessments are a whole new arena of risk that has evolved with the increasing complexity of digital threat. Especially as most businesses are reliant on their information technology, software, processes and systems.
In general, digital risk assessments are used to prioritise business risk across company assets, provide a summary report and recommendations and promote informed cyber security decisions, either corrective or preventative. The benefits of preventative action are numerous and can be diverse:
The latter is key. Cyber risk assessments are not a one-off. You need to monitor and assess continuously. Knowledge is indeed power and knowing where your security weakness lie can use the assessment evidence to establish where you need to improve and/or invest. |
FACT: The most common cyber attack starts with email
No matter how many systems and processes you have in place, the human interaction with email only adds to the open-door potential – simply inviting problems right in. Statistics demonstrate that for most SME businesses, the potential to be out of business can be as little as 6 months post a data breach.
Who should perform your cyber risk assessment?
In an ideal world you would have trained personnel in-house not only conducting the risk assessment, but with the infrastructure knowledge, skill set or management support to both understand and action remedial action where needed.
In the real world, you need to identify the right staff or more likely, an outsource partner to deliver the right assessment and actionable recommendations. EVC Marketing can help you with this. |
How to perform a cyber risk assessment
Start with a data audit which identifies what and where business critical and/or valuable data is stored allowing you to assess:
|
EVC Cyber Services
EVC Marketing has a network of professional cyber security technicians and engineers who can provide a range of consultancy services including:
· Penetration Testing · Red Team Assessments · Ethical Hacking Assessments · GDPR Audits · IT Security & Backup Data Solutions If you have a cybersecurity requirement, talk to EVC today. |