How secure is your data?

Do you leave the front door of your office wide open when you walk in? Pop a chair in front of it to make it easy for others to walk in? It’s likely you wouldn’t do it for a number of reasons, but a key one would be your security.

So why is it not so easy to spot the virtual equivalent of doing those sorts of things?

We’re approaching the end of CyberScotland week. There’s been plenty happening around Scotland, both in person and online, and still some events to go so take a look if you’ve not had a chance yet.
https://lnkd.in/eeGz6fhf!
 
How do you manage your data security? Do you regularly train your staff? How do you keep up with changes, both to the tools to help protect you and also the threats that exist?
 
At effini, we’re always improving our own skills and understanding of what’s happening in the cyber world. 
 
This means we ourselves can keep our house in order, and importantly, our clients can get the full benefit of our knowledge and experience when protecting their data.
 
If we try and simplify how you think about cybersecurity, ask yourself the following questions:
 
❓ How open are the doors in your organisation?
❓ Can your staff easily walk from one room into another?
❓ Who can open the drawers of your filing cabinets?
 
It’s too easy to leave everything open to make it quick and easy to access, and remove blockers for your staff.
 
Small organisations and start-ups can leave lots of virtual doors open too as they rush to get their exciting and innovating products to market. In other cases, companies can be so busy that people forget to close that door behind them.
 
Our annual Cyber Essentials self-assessment is always a good prompt to review our internal security, even beyond the scope of the assessment. There is a question in the self-assessment
 
“Do you ensure that staff only have the privileges that they need to do their current job? How do you do this?”
 
Ask yourself these key questions to approach this systematically:
 
❓ What’s the purpose of each person’s role?
❓ What information do they need access to for success?
❓ What do they actually have access to?
 
Draw up a matrix with the answers to those questions. You’ll gain a comprehensive view of your information and systems, and who’s accessing them.
 
ℹ️ Use this to inform the policies around access, and the practical approaches to putting that in place.
🌱 Embed it into your onboarding process for new staff so they start out with the right access
💡 Perhaps most importantly, ensure everyonehas a clear understanding why some of those doors may be closed to them
 
At effini we can help you plan and implement your Data Security Strategy, get in touch to arrange a conversation with one of our cyber specialists.

Published by:
Effini Digital