Human threats
Hackers being able to get into an organisations internal network, to steal data or damage
Fraud
Theft of funds by dishonest use of computer system
Deliberate sabotage
Could be anything e.g malicious damage
Viruses
Can spread through network to all organisations computers
Malware
Often spread by clicking on a email
Term is used for intrusive software
Denial of service
Characterised by attackers attempting to prevent legitimate users of a service from using it
Checklist steps to protect an organisation from cyber risks
Allocate responsibility
Protect computers and your network
control employee access to computers and documents
Protect against viruses
Extend security beyond the office
Secure files stored on the cloud or other devices
Plan for the worst
Educate your team
Keep records and test your security
APC- PESPEK
Allocate responsibility
Decide who is responsible for maintaining security functions
Protect network and computers
Implement back up procedures
Implement a firewall (barrier between trusted network and untrusted, so blocks some sites)
Control employee access to computers and documents
Keep those with administrators ( complete access) to a minimum.
Use login ID and remove inactive ones.
Protect against viruses
Ensure staff are updated on spotting modern malware
Access anti virus software and update it
Extend security beyond the office
Check all business devices used remotely are protected.
Additionally, ensure staff are aware of dangers when connecting to public WIFI
secure files on the cloud or external devices
Restrict read- write capabilities
Establish approved lists of sharing mechanisms and online platforms. Block those not approved
Ensure sensitive information that is transferred outside of an organisation is encrypted.
Plan for the worst
Create a full disaster recovery plan in event of cyber attack
educate employees
Plan business training around security
Track files and test security
Regularly test procedures
Implement a system of keeping records to maintain security.