Cyber security is constantly evolving and is a key component of GDPR compliance.
With the entire world online, there are hordes of opportunistic hackers looking to harvest financial and personal data from reputable businesses like yours.
Block the cyber threats that could lead to data breaches and know where personal data can be breached within your environment & team.
Conduct an exit interview with departing employees
Check for personal data in belongings - Names / Addresses / Numbers / Emails
Remember to remove their personal data from your system
Ensure confidential documents are destroyed securely not left in a bin
Train staff in handling personal data
Have a clear retention policy
Consider before giving personal details online, check hyperlink is genuine
Ensure website is secured with padlock and HTTPS:\\
Provide adequate cyber awareness training to ALL Staff
Ensure personal data is not on public display when unattended
Lock cupboards, cabinets and drawers containing personal data
Remove public facing contact and telephone lists
Ask yourself... is it your information to share?
Consider who else is listening
Always lock your computer screen when away from your desk
GDPR brings tighter controls on sharing personal data, think before talking about individuals
Company information is commercially sensitive or intellectual property, should it be given away freely?
Provide employees with training around handling company data / secrets
Have a data retention policy which states how long paper records are kept
Ensure sensitive / personal data is destroyed securely
Notify data subjects that their information has been destroyed
Raise IT equipment up off the floor to protect against flooding and make sure the room is well ventilated
Ensure you implement an offsite backup strategy as well as an onsite backup as part of your disaster recovery plan
Consider scanning your paper documents into digital form to reduce the risks of fire or flood damage
Implement device management tools to remote wipe lost or stolen devices
Ensure devices are locked down with appropriate security and authentication tools
Consider whether personal data is stored on mobile devices and what your business controls are
Assign appropriate permissions for the roles of your users
Apply security policies which may include disabling USB ports on certain devices
Ensure job roles and responsibilities are updated to include the handling of personal data
Make it clear what you are storing, what it will be used for and how long for when obtaining personal data
Display your privacy statement both online and for visitors to your premises
Don't hold onto data just because, consent can be withdrawn and people have a right to be forgotten
*Free vulnerability scan is limited to 1 free test per company and will be conducted on a single public facing static IP address.
There are 100 free tests up for grabs and will be on a first come first serve basis.*
Cookies are small text files stored on your device when you access most websites on the internet.
However, please be aware that restricting or blocking cookies set on the Website may impact the functionality or performance of the Website, or prevent you from using certain services provided through the Website. It will also affect our ability to update the Website to cater for user preferences and improve performance.
We don’t sell the information collected by cookies, nor do we disclose the information to third parties, except where required by law (for example to law enforcement agencies).
We may sometimes embed content from 3rd party websites such as YouTube. As a result, when you visit a page containing such content, you may be presented with cookies from these websites. We do not control the dissemination of these cookies and you should check the relevant third party's website for more information.
|CookieConfirm||The presence of this cookie is used to remember the fact that you have confirmed that you are happy to accept cookies|
|ASPSESSIONIDxxxxxxxx||This is a Session Cookie (session cookies are temporary and are erased when you close your browser). It identifies you from one page to the next and is used, for example, to keep track of your logged-in status.|
|UserID, account, password||These cookies are used to remember your login credentials for when you next visit our website. They are only created if you choose the “Remember Me” option on the login page.|
|_utma, _utmb, _utmc, _utmz||These are cookies created by Google Analytics and are used to provide us information on which web pages are the most popular, and the most popular search terms used by visitors arriving at our site.|