Why should I be concerned about Cyber Security?
What is a VPN?
What is the most common cyber threat right now?
Do I really need to update/upgrade my systems?
Upgrading your physical and cloud-based systems to newer products/services will often mean enhanced security but the biggest and most expensive systems, aren’t always the most effective for your organisation. Furthermore, at the point a product becomes end of life and updates are no longer being issued, it is crucial that you make the switch to an upgraded system.
At Complete I.T. our team will get to know your organisation inside and out and will be able to recommend the right products and services to help reach your organisation’s needs. We can also automate important security updates to ensure you are always using the most up to date software.
What is the importance of training my team on Cyber Security?
I'm not sure that my IT team are staffed appropriately...
What obligations does my organisation have regarding Cyber security and GDPR?
The General Data Protection Regulation (GDPR) is a legal requirement that means businesses must have robust technical and organisational measures in place to help prevent data from being leaked, stolen, disclosed or inappropriately accessed. When this occurs, it is a breach of the GDPR and can lead to not only financial penalties but reputational damage too. All businesses have the legal responsibility to protect not only your clients’ but your teams’ personal data. This can be achieved, in part, through a robust cyber security plan.
I just need IT Support, is a roadmap necessary?
There is no one-size fits all when it comes to IT needs. Having a bespoke roadmap created for you, aligning with your business requirements will mean that you have the appropriate IT Support in place to help you achieve your business goals. This should be reviewed regularly. At Complete I.T. you will have a dedicated Technical Consultant who will work closely with you to ensure your roadmap aligns to your business goals.
How should we respond in a cyber security emergency?
What is the best way to protect my accounts?
The next step would be enabling 2FA (Two-Factor Authentication) on all of your accounts. 2FA adds an extra layer of protection to your account by asking for additional verification after entering your password. This may be through a fingerprint scan, Google/Microsoft authenticator app or face recognition scan. So even if someone did manage to guess your password, it would be very difficult for them to get past the 2FA you have set up.
What does “security by design” mean?
There should be no compromise when it comes to security. In the design phase of any system, product or service, security is always a consideration and a priority. This gives the assurance that the product or service is as secure as it can be.
Do we know where our data is and if it is safe?
Without the appropriate controls in place it is very easy to save your company data anywhere in the world; this makes keeping track of it increasingly difficult. In the event of a breach, it can be nigh-on impossible to know what data was stored where and therefore what has been put at risk. To help mitigate this threat, pick a couple of locations to store data, such as Microsoft SharePoint and OneDrive and make a formal record of what is stored in these locations.
The best way to do this is twofold:
- Have an Information Asset Register which details where your data is stored and what security is applied to it.
- Have a Record of Data Processing (also a legal requirement under GDPR) which details what data you have in each storage location and all the other legal aspects which are detailed in Article 30 of the GDPR.