Você está na página 1de 1

10 Steps To Cyber Security

DefiningTandTcommunicatingTyourTBoardsTInformationTRiskTManagementTRegimeTisT
centralTtoTyourTorganisationsToverallTcyberTsecurityTstrategyjTCESGTrecommendTyouT
reviewTthisTregimeTGTtogetherTwithTtheTnineTassociatedTsecurityTareasTdescribedTbelowTGT
inTorderTtoTprotectTyourTbusinessTagainstTtheTmajorityTofTcyberTthreatsj

ProtectTyourTnetworksTagainstTexternalTandT
internalTattackjTManageTtheTnetworkTperimeterjT
FilterToutTunauthorisedTaccessTandTmaliciousT
contentjTMonitorTandTtestTsecurityTcontrolsj

MalwareTProtection

Monitoring

UserTEducationTandTAwareness

ProduceTuserTsecurityTpoliciesTcoveringT

acceptableTandTsecureTuseTofTtheTorganisationsT
systemsjTEstablishTaTstaffTtrainingTprogrammejT
MaintainTuserTawarenessTofTtheTcyberTrisksjT

HomeTandTMobileTWorking

NetworkTSecurity

ProduceTrelevantTpolicyTandTestablishTantiG
malwareTdefencesTthatTareTapplicableTandT
relevantTtoTallTbusinessTareasjTScanTforT
malwareTacrossTtheTorganisationj

CESG

EstablishTanTeffectiveT
governanceTstructure
andTdetermineTyour
riskTappetitejT

Information
RiskTManagement
Regime

MaintainTtheT
BoardsTengagementT
withTthe
cyberTriskj

EstablishTaTmonitoringTstrategyTandTproduceT
supportingTpoliciesjTContinuouslyTmonitorTallT
ICTTsystemsTandTnetworksjTAnalyseTlogsTforT
unusualTactivityTthatTcouldTindicateTanTattackjT

TProduceT
supportingT
informationTriskT
managementTT
policiesj

DevelopTaTmobileTworkingTpolicyTandT
trainTstaffTtoTadhereTtoTitjTApplyTtheT
secureTbaselineTTbuildTtoTallTdevicesjT
ProtectTdataTbothTinTtransitTandTatTrestjT

SecureTConfiguration

ApplyTsecurityTpatchesTandTensureTthatTtheT
secureTconfigurationTofTallTICTTsystemsTisT
maintainedjTCreateTaTsystemTinventoryTandT
defineTaTbaselineTbuildTforTallTICTTdevicesj

RemovableTMediaTControls

ProduceTaTpolicyTtoTcontrolTallTaccessTtoT
removableTmediajTLimitTmediaTtypesTandTusejT
ScanTallTmediaTforTmalwareTbeforeTimportingT
onTtoTtheTcorporateTsystemj

ManagingTUserTPrivileges
IncidentTManagement

EstablishTanTincidentTresponseTandTdisasterTrecoverT
capabilityjTProduceTandTtestTincidentTmanagementTplansjT
ProvideTspecialistTtrainingTtoTtheTincidentTmanagementT
teamjTReportTcriminalTincidentsTtoTlawTenforcementjT

EstablishTaccountTmanagementTprocessesTandT
limitTtheTnumberTofTprivilegedTaccountsjTLimitT
userTprivilegesTandTmonitorTuserTactivityjT
ControlTaccessTtoTactivityTandTauditTlogsjT

Você também pode gostar