Chapter 3: Developing a Robust Security Strategy
Building a robust security strategy is a fundamental step towards safeguarding your digital assets. In this chapter, we explore the key elements of a comprehensive security strategy, including policy development, risk management, and incident response planning. By creating a well-defined security strategy, you can effectively allocate resources and establish a proactive defence against cyber threats.
Remember – You have 72 hours from first noticing a breach to investigate it and report it to the ICO if necessary.
One of the main reasons for creating a comprehensive security policy is so that everyone knows what is and is not acceptable when using an organisation’s IT systems and more importantly what to do if a user suspects that they or someone else has observed suspicious activity
Risk management frameworks are a good way to keep your IT systems in check. There are several risk management frameworks like ISO 27001 or NIST Cybersecurity Framework. However, a good place for all businesses to start is with the UK government backed Cyber Essentials Cybersecurity risk management process for identifying risks.
So, a user has reported that they have noticed strange activity on some files on your network. What do you do??
Well, this is where you need to have a clear incident response plan that sets out who is responsible for the implementation of the plan and the roles others play in the investigation and remediation of the incident. An incident response plan should include logs of what happened and what has been done at every stage. This will then make it easier to explain to the Independent Commissions Office what happened if you suffer a breach.