how organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)
TRANSCRIPT
![Page 1: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/1.jpg)
How Organizations Can Avoid Data Breaches And Thus Meet Their Security Obligations
![Page 2: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/2.jpg)
Stay on top of security developments by following these five pieces of advice
![Page 3: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/3.jpg)
With cyber attacks becoming increasingly common in the present day, it is vital for companies to ensure that
they keep their data safe from breaches
![Page 4: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/4.jpg)
1 KEEP YOUR IT INFRASTRUCTURE IN GOOD HEALTH
![Page 5: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/5.jpg)
Knowing and understanding your IT infrastructure is an essential first step for
keeping it safe and sound
![Page 6: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/6.jpg)
Get to know what types of software you are using and what new updates or patches are
available
![Page 7: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/7.jpg)
Get to know what types of software you are using and what new updates or patches are
available
Install new security and safety features as soon as they become available
![Page 8: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/8.jpg)
If a data breach does occur and you have fulfilled all of your legal obligations under the Data Protection Act, then it is unlikely that you
will have to pay a penalty
Monitor your IT infrastructure at all times to make sure that you catch any
attempted breaches
![Page 9: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/9.jpg)
![Page 10: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/10.jpg)
Monitoring IT security should be a 24/7 job as attacks can happen at any time
![Page 11: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/11.jpg)
Put in place encryption policies
![Page 12: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/12.jpg)
Put in place encryption policies
Intrusion detection and
prevention programs
Regular automatic
assessments
Backup programs
![Page 13: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/13.jpg)
A key method of cyber attackers is to send you a malicious file to download as an email attachment
Stop new files from downloading automatically until they have been
checked manually
![Page 14: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/14.jpg)
3 EDUCATE ALL COMPANY MEMBERS ABOUT IT SECURITY
![Page 15: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/15.jpg)
Get everyone on board when it comes to monitoring the security of your IT
infrastructure
![Page 16: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/16.jpg)
Train employees to encrypt their information and to recognize attempted
cyber attacks
![Page 17: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/17.jpg)
Train employees to encrypt their information and to recognize attempted
cyber attacks
Create a set of employee
regulations
![Page 18: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/18.jpg)
One very good policy to implement here is data minimization: this means only sharing data with the minimum number of top level
employees
A single lost laptop can result in a huge data breach
![Page 19: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/19.jpg)
4HAVE A DETAILED PLAN ABOUT WHAT TO DO IN THE EVENT OF A DATA BREACH
![Page 20: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/20.jpg)
Plans about how to respond to suspicious activity
![Page 21: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/21.jpg)
Set up real time alerts which enable you to identify threats
![Page 22: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/22.jpg)
If there is a data breach, the relevant part of the system should be shut down following the advice of an IT professional. This will best preserve evidence of
the breach which can be analyzed in order to improve future security
Integrate prevention and response strategies into your day to day
operations
![Page 23: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/23.jpg)
5 BE SMART ABOUT WHO YOU HIRE
![Page 24: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/24.jpg)
Hiring an IT professional (or a team of professionals) to keep your IT
infrastructure safe is a very good idea
![Page 25: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/25.jpg)
Think of this additional hire as an investment rather than a loss of
money
![Page 26: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/26.jpg)
Do not just look close to home, either: tap in to the global talent pool to ensure that you hire the perfect
person for the job
Think of this additional hire as an investment rather than a loss of
money
![Page 27: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/27.jpg)
Hiring a dedicated person, or group of people, to deal with your company’s cyber security, moreover, is very good for business
Many security professionals can work remotely for much of the time
![Page 28: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/28.jpg)
Show the world that you care a lot about keeping all of your customers’ and also any business partners’ data safe and secure at all times
Visit Our Article
![Page 29: How organisations can_avoid_data_breaches_and_thus_meet_their_security_obligations (1)](https://reader036.vdocuments.us/reader036/viewer/2022081605/5877feea1a28ab91178b6635/html5/thumbnails/29.jpg)