01908 663958
CharityTelecomsBusinesscontinuityCharityplanningCharityriskDisasterresponseRiskBroadbandCyberFoodCyber securityJoin the CirclesMobilesBidfoodCahrityinsuranceCharitysupportMobileSummer MenuTelephonyUtilities10% Off2 CirclesCelebrate Summer 2022CharitiesCybersecurityDataDiscountDIYDIY, Discount, B&Q, Paint, Kitchens, Bathroom,ElectricityEnergyEnergy AuditFood wasteFurnitureGasInsuranceJubileeMadeinbritainMadewithcareGOPAKNisbetsOffersOffice suplliesSchoolfurnitureSchoolsSummerTelecommunicationsTradepointVoip#2Circles#AchieveMore#BeMoreConnected#BeMoreMobile#BeMoreReady#ExtraMile#managedprint #aslflex #flexability #flexible#scg20232CC2Circles3for2: www.Trade-Point.co.ukAccessAccessInsuranceAcciount managementAccount mangerAccountsActionAdminstratorAllergensAntivirusArchivingAuthenticationBackupBathroomBed linenBemoreconnectedBemoreincontrolBigswitchBorder ControlBreachBuildinginsuranceBurgerBy 2050CalendarCaloriesCaloroes, Foods, Kitchen, equipment, labellingCarbon reportingCarehomesCateringCateringequipmentCelebrateSummerCelebrateSummer2022CelebrateSummerDessertsCelebrationChairsCharity givingCharityfinanceChecksCheesecakeChildrensfurnitureChocolate EclairsCleaningClick & collectCloudCommunicationsCommunications, Telecoms, Broadband, VOIPConferenceConnectivityCostofgivingCRNetCyber InsuranceCyber ProtectionCyber security strategyDatabaseDeals and OffersDesignDettolDiaryDogoodDomoregoodEarlyyearsEarlyyearseducationEducation, Banana Moon, Telecoms, Technology,Emergency alertEnergy contractEnergy OulookEnergy savingEnergyconsumptionEnergycrisisEveryday FavouritesExclusiveExterior PiantFibreFinanceFirewallFundingFundraisingGetmuddyGivingyoumoreGrowthHackingHome WorkingHospitalityHotel suppliesHotelsHttps://www.2circlesconsulting.com/HygieneHygienestandardsIceCreamImpactImpactreportingInformationSocietyDayInsatalled waterInspirationInstallation, Furniture, BS5852,Insurance, Charity, Support , Future, ChildrenInsurance, environment, charity. church, ChristianInternetInvoice validationInvoicevalidationISDNISDNnetworkISDNswitchoffITJobJointhecirclesJubilee celebrationsKitchensKnowthedifferenceKwhsLegalLinen. Bedding, Towels, blinds, crockery,glasswareLogsLondonMailMaintenanceMajornetworksMakeallergyHistoryMarketMeasureMember discountMental HealthMenu PlanningMenusMessychurchMessyplayMicrosoft TeamsMobileBatteryMobiledataMudTableNatashaClinicalTrialNatashasLawNewtermNon profitOblineOfficeproductsOilOutdoor celebrationsOutdoorfurnitureOutdoorlightingOutdoorplayParty essentialsPasswordsPatchingPhisingPhonesPintPinters, Photocopiers, Scanners, Flexibility,PizzaPlanPlannerPlastic packaging Tax, Ethical, sustainability,PlastictaxPlaywithmudPledgePowerPPEPremier Office SupplierProducts fit for a QueenPropertyProtectagainstfraudRebuildcostRecords&reportsRecoveringRisingenergycostsSavingsScamsSCGSolutionsSchoolSchooldiningfurnitureSchoolsoutSecureSecuritySmartmetersStationaryStewardshipStrategicapproachSummerDessertsSummerGrillsSummerholidaysSustainableSustainableproductsSweettreatsTechnologyTelecomsnewsTenderThe Work PlaceThemedaysThirdsectorTrainingTransformationTrustTrustees, Charities, FundingTrustpilotTrustpilot reviewsUnderinsuranceUnlockUtility AidVegangrillsVolunteeringVunerabilityWaterWatercoolerWellbeingWifiWorldtelecommunicationsdayZero Net
TAGS

Cyber-Security Fundamentals for Organisations #02

Keep systems and cyber-defences up-to-date.

1. Check Your System Patching

System patching is essential to correct errors in software that could lead to vulnerabilities if not fixed. Make sure you patch the following

:• Users’ desktops, laptops and mobile devices (If possible, turn on automatic updates.)

• Firmware on your organisation’s devices• Internet-facing services

Additionally, review any unpatched systems. Ideally, all key business systems should be patched. If this isn’t practical, put mitigations for any remaining unpatched systems in place.

2. Check Your Defences

Bolster your defences by ensuring antivirus software is installed correctly and active on all systems.

Review all firewall rules regularly. These determine the network traffic allowed to enter and exit your network. Often temporary firewall rules are set up to enable a contractor or similar to perform a task for a particular timeframe. If such rules are left in place for longer than required, security risk increases.

Additionally, check the security defences of all other devices such as laptops and mobile phones. Consider the National Cyber Security Centre’s device security guidance.

Cyber Liability Insurance and Advice

We have provided some general information about cyber security to help you manage your risks, but if you want to enquire about insuring your cyber liability risks please contact CSCBG at buy@cscbg.org.uk and they'll  put you in touch with us




 

This product has been added to your cart

CHECKOUT