Four Steps to Building a Cybersecurity Strategy - Keep Hackers Out

Written by Sam Jones
Jul 5, 2019 - 2 minute read

If you're an SME there's a good chance you could experience a data breach. Here are 4 steps for building a cybersecurity strategy that keeps hackers out...

Cyber Security Consultation

According to the National Cyber Security Centre (part of GCHQ) if you’re a small or medium-sized enterprise (SME) then there’s around a 1 in 2 chance that you’ll experience a cyber-security breach.

Here are four steps to begin building a cybersecurity strategy that keeps hackers out of your business.

A. Define your company's current cybersecurity status.

Get together your senior leadership team, board of directors and investors/trustees to conduct an informal audit of the business. Get a sense for the level of security you have today.

Questions to ask: Is anyone in charge of our cybersecurity? What defences do we already have in place? Is our strategy all-inclusive and coordinated? If not can we identify our weak spots and ‘gaps’?

B. Identify the key person accountable for your cybersecurity.

Engage leaders from across the organisation—remember cybersecurity is much more than just IT. Include people from different functional areas, such as human relations, marketing, operations and finance. Other players essential to this conversation are your lawyers, insurance broker and your accountant/auditor.

Questions to ask: Who should be answerable or responsible for our cybersecurity? What process can we implement to ensure accountability? How can we communicate and increase awareness about cybersecurity in our different departments and teams?

C. Take an list of your assets, determine their value and prioritise your most critical assets.

Identify the "crown jewels" in your company, whether those are employee records, intellectual property or customer data. Recognise that you will never be 100% safe from an attack, so prioritising areas of defence is important.

Questions to ask: What are the most important assets we need to protect? Customer data? Intellectual property? Employee records? Can we measure the degree of confidentiality, integrity, availability and safety of our most critical assets?

D. Decide what business capabilities and cybersecurity measures you want to manage yourself and those you can outsource.

Consider whether it makes sense to subcontract certain aspects of your business to a cloud-based system to increase your security. At the same time, consider whether it makes sense to engage a cybersecurity expert or provider. Decide whether you want to work with a consultant to figure out your cybersecurity plan or if you want to outsource your cybersecurity entirely.

Questions to ask: What aspects of our business , such as order fulfillment, should we handle internally versus outsourcing to a third party (e.g., Amazon, Cisco, Google)? Should we outsource our cybersecurity to a third-party service? Should we use a fractional CIO model and seek out cybersecurity consulting? Or should we handle the entire process ourselves?

If you don’t know what the status of your security is today you can’t plan how to provide for it. The best defence is a good offence. Make it a priority to protect your data for the benefit of your employees, your customers and the long-term health of your business.

Cyber Essentials, the only recognised UK cyber security standard is next logical step for your business. Check out our Ultimate Guide to Cyber Essentials to understand what Cyber Essentials can do your organisation.

Download your FREE copy of The Ultimate Guide to Cyber Essentials Now!

The Ultimate Guide to Cyber Essentials

Topics: IT, UK, Business Security, Cyber Attack, Cyber Security, SME

author

More by Sam Jones

Related articles
Why Stick to Annual Penetration Tests When Hackers Attack Year-Round?

Explore the crucial benefits of switching from annual to monthly penetration testing and vulnerability analysis for UK businesses. Learn how Managed Service Providers (MSPs) can effectively use monthly cyber vigilance to thwart hackers and enhance cybersecurity.

Staying One Step Ahead of Hackers  Find your weak spot before they do!

Pen testing Cyber Best practices continuous assessments ISO standards vulnerability assessments. Testing continuous security monitoring

Compliance, Cyber security and Certifications – Two’s Company and Three’s a Winning Cyber Protection Strategy

Compliance, cyber security, and certifications are crucial for a winning cyber protection strategy. Learn how integrating these elements can safeguard your organization from evolving cyber threats.