Cyber security

Finding the best strategy to keep your business secure

No business wants to suffer a cyberattack or data loss. But hoping it doesn’t happen isn’t good enough – you must know what to do if the worst does happen.

Think about it like office fire drills. While a fire is unlikely, you still test alarms and train staff for an emergency situation, just in case.

Accidents are more important than deliberate external attacks
Although exact figures vary, most analysts agree that the biggest risk today is not state hackers, but an accidental leak by a member of staff.

UK’s Information Commissioner’s Office found that in the first quarter of 2018, the most common causes of data loss were actually loss or theft of paperwork, followed by documents being sent to the wrong recipient. The ICO received over 200 reports of lost paperwork and just over 100 incidents of wrongly addressed documents. In comparison, it received only 97 reports of cybersecurity incidents.

Building a security strategy should begin with the control of access to sensitive information before considering external threats.

It is important that there are systems in place to control access to information and to record who is accessing what within the business. Make sure the strategy allows people to access the data they need, but only the data they need.

Beyond system access, it is also vital to ensure that staff are properly trained and understand the importance of security to the whole organization and its reputation.

Always have a Plan B
No matter how good your security strategy, it should also include a plan B to cover what happens if things go wrong. However the breach happens, your company must be ready to act fast if and when it does.

Preparing for a data breach or a cyberattack is very similar – everyone must know what to do, and when to do it.

The first thing is to consider who will be your incident response team, which needs to be as small as possible for decisions can be made quickly. Aside from just technical staff, there should also be a senior manager, and someone needs to be responsible for communications.

Secondly, you need to identify the scope of the problem and whether your organization has the skills and personnel to deal with a breach on its own.

Use the ‘golden hour’ to your advantage
Security experts talk about the period immediately after a breach as ‘the golden hour’. Your response in this period will make a huge difference to how much damage is suffered and how quickly your business can recover.

Cybersecurity tools with automated detection and response capabilities can significantly reduce both the damage caused and the time needed to recover. Quickly determine exactly what has been breached, what data is at risk (or already lost), and what needs to be done to make systems safe again.

Who do you need to tell?
Wider external communication is also very important. This includes talking to your supply chain and other companies linked to your systems. If customer data has been compromised, it is essential you understand how and when you communicate the breach.  For larger companies, it makes sense to have a senior public relations person linked to the response team.

Once systems are secure and back up and running there is another important task to do.

What can you do better next time?
The final step of your plan should be to determine what parts of your plan worked and what could work better in order to make improvements for the future.

The best security strategy is not a fixed document. It needs constant attention and updating as threats and the risk profile of the business changes. This is why the best prepared companies run regular cyberattack drills. In the event of the worst happening - everyone knows their job.Visit some of the security solutions that Fuji Xerox can provide for your organization.

Contact us

Related Solutions