Cyber Security Measures


  • Mandatory 2 step authentication
  • Check Abdul’s personal email security
  • Firefox sync uninstall
  • Lastpass
  • Check g suite backups
  • Phishing tests


Cyber Attack Stats

  • 54% of UK companies hit by cyber attack
  • Average cost of CA is 3k-36k
  • 96% of companies not confident can protect themselves
  • Most common attacks by fraudulent email, impersonation and ransomware
  • 76% of K adults don’t know what ransomware is
  • 56% of organisations hit by Ransomware paid ransom
  • Global attack map:



  • A variant of malware
    • Malware is malicious software
  • Many different variants
    • Cryptolocker, cryptowall, locky
  • Multiple delivery methods
    • Email, compromised websites, software vulnerabilities



  • Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details
  • These attacks are untargeted and generally sent out to a huge number of recipients at one time
  • Often directs users to enter personal information at a fake website


CEO Fraud / Whaling

  • Impersonating a senior officer, bosses etc to order a fraudulent bank transfer


What is social engineering?

  • A type of confidence trick for the purpose of information gathering, fraud or system access
  • It is often one of many steps in a more complex fraud scheme
  • Targets employees, not IT systems
  • Employees often do not see themselves as part of the organization information security effort


How to stay protected

10 steps to Cyber Security

  1. Risk management regime
    1. Develop an appropriate risk management regime
    2. Ensure this is supported by the board and senior managers
    3. Clearly communicated approach
  2. Secure configurations
    1. Identify core business technology
    2. Develop strategy to remove old technology and services
    3. Introduce a patching policy
    4. This will reduce the risk of compromised systems
  3. Network security
    1. Protect your networks from attack
    2. Filter internet access
    3. Update default passwords on your network devices
    4. Consider your data location and how you (or attackers) can access it
  4. Managing user privileges
    1. Develop a process of granting access to data
    2. Review current access levels
    3. Does everyone have access to everything?
    4. Monitor user’s activity on the network and key systems
    5. Audit the logs of your network and key systems
  5. User education and awareness
    1. Review staff’s current cyber security awareness levels
    2. Introduce cyber security awareness training
    3. Both for new and existing staff
    4. Develop a security conscious culture
  6. Incident management
    1. Establish an incident response and DR capability
    2. Test your backups and DR plan
    3. Review your current downtime and decide if this is appropriate for your business
    4. Report criminal incidents to law enforcement (police / action fraud)
  7. Malware prevention
    1. Establish malware protection across your network
    2. Ensure this is on all your devices
    3. Ensure this is regularly updated and regular scans performed
  8. Malware prevention
    1. Establish malware protection across your network
    2. Ensure this is on all your devices
    3. Ensure this is regularly updated and regular scans performed
    4. Make sure access scan is activated (antivirus scans files accessed)
  9. Monitoring
    1. Continuously monitor all systems and networks
    2. Analyse logs for unusual activity that could indicate an attack
    3. Establish a monitoring strategy and produce supporting policies
    4. BURAK: There are software that uses AI to define normal traffic, then alerts you irregularities (if someone accesses other folders than sales and marketing they usually do)
  10. Removable media controls
    1. Produce a policy to control all access to removable media
    2. Limit media types and use
    3. Scan all media for malware before importing onto the system
    4. BURAK: No usbs would be used
    5. BURAK: Autoplay needs to be turned off
  11. Home and mobile working
    1. Develop a mobile working policy and train staff to adhere to it
    2. Apply the secure baseline and build to all devices
    3. Protect data both in transit and at rest – encryption is an option for this
    4. BURAK: Consider VPN
    5. BURAK: Are company laptops have antivirus on them?


Small Business Cyber Security Steps

  • From the national cyber security centre
  • Focused on SMEs
  • This advice will significantly increase your protection


Backing up your data

  • Tip 1: Identify what data you need to backup
  • Tip 2: Keep your backup separate from your computer
  • Tip 3: Consider the cloud
  • Tip 4: Make backing up part of your everyday business


Protecting your organisation from malware

  • Install and turn on antivirus
  • Prevent staff from downloading dodgy apps
  • Keep all your IT equipment up to date – patching
  • Control how USB drives (and memory cards) can be used
  • Switch on your firewall


BURAK: G Suite backups – backup of cloud

Onedrive, dropbox, 365

Storage craft – channel only IT companies


Keeping your smartphones and tablets safe

  • Switch on password protection
  • Make sure lost or stolen devices can be tracked, locked or wiped
  • Keep your device up to date
  • Keep your apps up to date
  • Don’t connect to unknown wifi hotspots, or at least use VPN
  • Smaller wifis like coffee shops etc are not secure


Faster, safer, and smarter browsing

Ghostery helps you browse smarter by giving you control over ads and tracking technologies to speed up page loads, eliminate clutter, and protect your data.


Using passwords to protect your data

  • Make sure you switch on password protection
  • Use two factor authentication for important accounts
  • Avoid using predictable passwords
  • Help your staff cope with password overload
  • Change all default passwords


Mobile device management

Corporate container



Use landline from mobile app

People calling landline will be directed to mobile phone

Or you can call from mobile and customer will see your landline


Domain password criteria

Must contain this amount of letters numbers etc


Use password managers


Backup and disaster recovery

  • Ensure you have a robust backup and DR strategy
  • Test your backup on a schedule
  • Recommended testing backups for file recovery monthly
  • Recommended testing DR every six months
  • Review RTO and RPO for your backup system


RTO and RPO?

  • RPO: Recovery point objective
  • RPO: how long can you afford to go back in time to restore a backup?
  • RTO: Recovery time objective
  • RTO: How long can you afford to be down in your business?
  • Both are important, separately measured and unique to each business.


If security is tedious or difficult, people will not use it. It needs to be convenient

Password Manager

  • They give you huge advantages in a world where there’s far too many passwords for anyone to remember.
  • They make it easy for you to use long, complex, unique, passwords across different sites and services with no memory burden
  • They are better than humans at spotting fake websites, so they can help prevent you falling for phishing attacks
  • They can generate new passwords when you need them and automatically paste them into the right places
  • They can sync your passwords across all your devices, so you’ll have them with you whether you’re on your laptop, phone or tablets


Sites that support 2 step authentication


Cyber essentials


  1. Secure configurations
    1. Close accounts which are not used
    2. Remove software you don’t need
    3. Change all default admin pwd to a strong pwd
    4. Disable autorun features
  2. Boundary firewalls and internet gateways
    1. Needed on office devices
    2. Needed on home office devices
    3. Change default pwd to a strong one
  3. Access control and admin privilege management
    1. Do not use admin account day to day
    2. Use strong admin pwd
    3. Do you have a list of admin privileges
  4. Patch management
    1. Correct licenses for your software
    2. Set to update auto
    3. Receiving security patches
  5. Malware protection


IASME Governance


Cyber Essentials