Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Cyber Defence in Depth

What does cyber defense in depth


• Cyber defence in depth covers five important elements: detection,
protection, management, response and recovery.
Detection

• Understanding your threats


• Understanding the threats you face and where your cyber defences are most at
risk of being breached is critical to securing your organisation against cyber
attacks.
• Most attacks exploit two types of vulnerability: technical and human.
• New technical vulnerabilities are discovered and exploited by criminals every day.
Previously patched vulnerabilities can also be reintroduced into systems by
updates and reconfigurations.
• A programme of regular vulnerability scanning is a critical component of a risk-
based approach to security: it identifies security vulnerabilities in workstations,
internal and external networks, and communications equipment.
• It is an automated activity that scans infrastructure targets for known
vulnerabilities and misconfigurations, enabling you to bolster your defences
where you most need to.
Protection
• Protect your organisation
• Protecting your organisation against cyber attacks and data breaches is a
complex undertaking. It is inevitable that some attacks will get past your
defences, through threats such as zero-day attacks and well-designed
phishing emails.
• It is therefore essential to implement more robust cyber security controls
and ensure you have appropriately trained staff to manage cyber security
defences and breaches.
• Not all organisations need to implement extensive security measures, but a
base level of cyber security is essential to protect against automated
attacks that seek to exploit common vulnerabilities.
• Certification to basic security schemes such as Cyber Essentials helps
protect organisations from the most common cyber threats and
demonstrate their commitment to cyber security.
Management

• Manage your cyber security risks


• or many organisations, managing cyber security risks requires a more intensive
approach than simply implementing basic protections. Cyber security isn’t a
destination – it is an ongoing process, requiring continual evaluation,
maintenance and revision.
• This should include such measures as embedding risk-based security controls in
corporate processes, managing the security of supply chains and carrying out
regular audits to ensure security controls remain up to date.
• ISO 27001 is the international standard for an ISMS (information security
management system), a risk-based approach to information security that
encompasses people, processes and technology. Independently audited
certification to the Standard demonstrates to customers, stakeholders and staff
that the organisation has implemented and maintains information security best
practice.
Response

• Prepare your response


• Cyber criminals need to find only one weakness to infiltrate your systems,
so it is essential to be prepared. The security measures you have
implemented should minimize the impact of a successful attack, but how
you respond is critical to limiting disruption and costs.
• This is especially important when it comes to breaches of personal data,
which must be reported to the data protection authorities within 72 hours
of being aware of the breach under the GDPR and DPA 2018.
• Organizations need a robust business continuity management system,
combined with cyber security and data protection audits, and supply chain
security to minimise the attack’s likelihood and impact.
• Implementing cyber incident response management plans means you
won’t waste valuable time when the worst happens
Recovery

• Safeguard your organization from cyber threats and gain peace


• Cyber Safeguard provides all the essential support, training, testing and insurance cover
you need for a cyber secure business. Our easy-to-manage service enables you to:
• Access cyber insurance cover from day one;
• Quickly roll out staff awareness training and track staff participation, both in the office
and remotely;
• Ensure staff are appropriately trained to spot phishing emails, avoid email misuse and
adhere to data privacy and information security best practices;
• Perform unlimited scans to check for vulnerabilities and use your ‘Scanned by IT
Governance’ badge to demonstrate to clients that you take security seriously;
• Access emergency cyber incident and breach support whenever and however you need
it; and
• Gain peace of mind with advice from legal and cyber security experts.

You might also like