LightBlog

Tuesday, May 30, 2017

10 Steps of Cyber Security




Cyber essentials are government- backed cyber security certification that helps to focus on business objectives and protected from common cyber attacks. Following 10 steps to cyber security published on 2012 and using steps means protecting organization from cyber attacks.


  • ·        Risk Management Regime
Defining Risk management regime is central in an organization overall cyber security strategy.


  • ·        Secure Configuration
Security patches should be applied to ensure the maintenance of secure configuration of ICT systems.


  • ·        Network Security
Network should be protected against external and internal attacks by managing network perimeter and filtering out unauthorized access and malicious content.


  • ·        Managing User Privileges
Account management processes should be established and the number of account privileges should be limited

  • ·        User Education and Awareness
User security policies, staff training should be established and user awareness of cyber risk should be maintained


  • ·        Incident Management
Incident response and disaster response capability should be established


  • ·        Monitoring
Monitoring strategy and supporting policies should be produced

  • ·        Removable Media Controls
A control should be produced to control all access to removable media

  • ·        Home and Mobile Working
A mobile working policy should be developed
 
  • ·        Malware Protection
Anti malware should be established

No comments:

Post a Comment

Adbox