Actions and Detail Panel
Cyber Security to Protect Business Online - Protect your Devices
A workshop in the Cyber Security, Protecting Business Online series designed to guide SMEs through the requirements and pitfalls of cyber security providing practical, cost-effective advice and solutions. Each workshop looks at a different aspect of cyber security from governance to tactical planning for an attack.
Isaac Asimov’s sentiment “I do not fear computers. I fear the lack of them.” is even more relevant today with our increasing dependence on our devices - PC’s, laptops, tablets and smartphones. This workshop explores simple effective protection to safeguard the devices individuals use to access data. Keeping them in a healthy state keeps your data secure and the devices running efficiently.
IT asset lifecycle - security requirements during each phase
Bring your own Device (BYOD)
Security requirements triggering an IT asset investment program
Incorporating security requirements into the planning and procurement.
Default configurations for the devices individuals you use to access data
Security measures to protect devices over their lifetime
Managing the device to protect your organisation data
Securely disposing of devices
During the workshop we will explore the trade-off between usability and security. There will be lots of opportunity to discuss these trade-offs as we consider the different security measures your organisation could implement to protect devices. We will highlight how the requirements of Cyber Essentials and the IASME standard will impact implementation decisions on security measures
The workshops in this series are: