Published on
13/08/2019
by Any Business.Com.Au
The Threat is Real: Cyber Crime and Small Business Part 3
Creating a cyber security policy for your business
A cyber security policy outlines the assets you need to protect, the threats to those assets and the rules and controls for protecting them and your business. The policy should inform your employees and approved users of their responsibilities to protect the technology and information assets of your business. Some of the issues the policy should cover are:
- the type of business information that can be shared and where
- acceptable use of devices and online materials
- handling and storage of sensitive material.
Businesses who don't have a cyber security policy in place could be leaving themselves open to attacks and legal issues.
Quick tips on what to include in your cyber security policies
You should develop, review and maintain your cyber security policy on a regular basis. The policy needs to outline which systems you need to protect critical data against attacks and who is responsible for protecting it.
A cyber security policy should include guidelines on:
Password requirements
- how to store passwords correctly
- how often you need to update them
- the importance of having unique passwords for different logins.
Email standards
- when it's appropriate to share your work email address
- only opening email attachments from trusted contacts and businesses
- how to block junk, spam and scam emails
- deleting and reporting suspicious looking emails.
Handling of sensitive data
- when you can share sensitive data with others
- storing physical files in a locked room or draw
- properly identifying sensitive data
- destroying any sensitive data when it is no longer required.
Locking computers and devices
- when to physically shut down computers and mobile devices when they aren't in use
- locking screens when they are left unattended.
Handling of removable devices
- how to protect data stored on removable devices like USB sticks
- restricting the use of removable devices to prevent malware from being installed
- scanning all removable devices for viruses before they are justified to connect to your business systems.
Handling of technology
- where employees can access their devices such as a business laptop away from the workplace
- how to store devices when they aren't in use
- how to report a theft or loss of a work device
- how system updates such as IT patches and spam filter updates will be rolled out to employee devices.
Social media and internet access standards
- what is appropriate business information to share on social media channels
- which channels and newsletters are appropriate for employees to sign when using their work email account
- guidelines around which websites and social media channels are appropriate to access during work hours.
Managing incidents
- how to respond to a cyber incident
- what actions to take
- the roles and responsibilities on how to deal with the cyber attack.
Prepare a cyber security incident response plan
You have legal responsibilities as a business owner to protect your business and ensure that your business and customer information is safe. Think about the information that you store online, and what it would mean if the information is lost or stolen?
Unfortunately, you cannot predict when a cyber-attack will occur and what it might involve. If a cyber security incident occurs, you should minimise the impact and get back to business as soon as possible.
A cyber security incident response plan will help you and your business prepare for and respond to an incident fast and effectively.
What is an incident response?
An incident response is how you protect and restore the operation of your business when a cyber incident occurs. If you don't deal with an incident quickly you could expose your business to major disruption and legal issues.
It's critical that you and your employees understand the basics of detecting and responding to a cyber security incident. A cyber security incident response management plan can help you do this.
What is a cyber security incident response plan?
A cyber security incident response management plan is a guide that outlines the steps to manage a cyber security incident. The plan should help you and your employees detect incidents quickly, lessen the impact, and return your business to normal as soon as possible. The plan should set out the process of:
- preparing for a cyber incident
- detecting the threat
- assessing the level of threat and impact
- responding to the level of threat
- reviewing the process and improving the incident plan if needed.
Tips on how to prepare and respond to cyber security incidents
Prepare and prevent
Prepare your business and employees to be ready to handle potential cyber incidents that may arise.
- Develop policies and procedures to help employees understand how to prevent an attack and to identify potential security incidents.
- Identify the financial and information assets that are important to your business and technology that you rely on.
- Consider the risks to these systems and the steps you and your employees need to take to lessen the effects or damage to your business.
- Create roles and responsibilities so that everyone understands who to report to if an incident occurs and the recovery procedures that follow.
Check and detect
Check and identify any unusual activity events that may damage your business' information assets and systems. Unusual activity may include:
- accounts and your network cannot be accessed
- passwords no longer work
- data is missing or altered
- your hard drive runs out of memory
- your computer keeps crashing
- your customers receive spam from your business account
- you receive numerous pop-up ads.
If you see a security incident, document any evidence and report it to your IT section, a team member or a government body such as the Australian Cybercrime Online Reporting Network.
Identify and assess
- Find the initial cause of the incident and assess the impact so that you can contain it quickly.
- Determine the impact the cyber incident has had on your business and the effects to your business and assets if not immediately contained.
Respond
- Limit further damage of the cyber incident by isolating the affected systems. If necessary, disconnect from the network and turn off your computer to stop the threat from spreading.
- Eliminate the problem with the removal of the threat.
- Recover from the incident by repairing and restoring your systems to business as usual.
Review
- Identify if any systems and / or processes need improving and make those changes.
- Evaluate how the incident before and after, and any lessons learnt.
- Update your cyber security incident response plan based on the lessons learnt so you can improve your business response.
Remember, the online security measures you take will help protect your business and your customers from existing and future threats.