Articles

10 Steps to Cyber Security

by Sudhanshu K. Co-Founder Of Training Institute

During this blog, we explain 10 step to cyber security and provide advice on the way to start Risk management regime, Secure configuration, Home and mobile working, Incident management, Malware prevention, Managing user privileges, Monitoring, Network security, etc…

“It is only when they go wrong that machines remind you how powerful they are” 

– Clive James

As technology continues to evolve so also do the opportunities and challenges it provides. We are at a crossroads as we move from a society already entwined with the internet to the coming age of automation, Big Data, and the Internet of Things (IoT).

Despite the threat of viruses and malware almost since the dawn of computing, awareness of the security and sanctity of data with computer systems didn’t gain traction until the explosive growth of the internet, whereby the exposure of so many machines on the web provided a veritable playground for hackers to test their skills – bringing down websites, stealing data, or committing fraud. It’s something we now call cyber crime.

Since then, and with internet penetration globally at an estimated 3.4 billion users (approximately 46% of the world’s population2), the opportunities for cyber crime have ballooned exponentially.

Combating this is a multi-disciplinary affair that spans hardware and software through to policy and people – all of it aimed at both preventing cyber crime occurring in the first place, and minimizing its impact when it does. This is the practice of cyber security training in Mumbai, India

Defining and communicating your Board’s Information Risk Management Regime is central to your organisation’s overall cyber security. CESG recommend you review this regime – together with the nine associated security area described below – in order to protect your business against the majority of cyber threats

  1. Network Security Protect your networks against external and internal attack. Manage the network primer. Filter out unauthorized access and malicious contents. Monitor and test security controls.
  2. Malware Protection Produce relevant policy and establish anti-malware defenses that are applicable and relevant to all business areas. Scan for malware across the organisation.
  3. Monitoring Establish a monitoring strategy and produce supporting policies. Continuously monitor all ICT system and networks. Analyse logs for unusual activity that could indicate an attack.
  4. Incident Management Establish an incident response and disaster recover capability. Produce and test incident management plans. Provide specialist training to the incident management team. Report criminal incidents to law enforcement
  5. User Education and Awareness Produce user policies covering acceptable and secure use of the organisation’s systems. Establish a staff training programmer. Maintain user awareness of the cyber risks.
  6. Home and Mobile Working Develop a mobile working policy and train staff to adhere to it. Apply the secure baseline to all devices. Protect data both in transit and at rest 10 Steps to Cyber Security
  7. Secure Configuration Apply security patches and ensure that the secure configuration of all ICT systems is maintained. Create a system inventory & define a base line build for all ICT devices.
  8. Removable Media Controls Produce a policy to control all access to removable media. Limit media types and use. Scan all media for malware before imported on the corporate system.
  9. Managing User Privileges Establish account management processes and limit the number of privileged accounts. Limit user privileges and monitor user activity. Control access to activity and audit logs.
  10. Information Risk Management Regime Establish and effective governance structure and determine your risk appetite. Maintain boards engagement with cyber risk. Produce supporting information risk management policies.

This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

https://g.co/kgs/ttqPpZ


Sponsor Ads


About Sudhanshu K. Junior   Co-Founder Of Training Institute

1 connections, 0 recommendations, 7 honor points.
Joined APSense since, February 10th, 2020, From Mumbai, India.

Created on Feb 10th 2020 05:15. Viewed 334 times.

Comments

No comment, be the first to comment.
Please sign in before you comment.