Skip to content
Permalink
Browse files
Merge pull request #24 from aa9863/Session10Business
Session10 business
  • Loading branch information
aa9863 committed Jun 19, 2020
2 parents 6b1703b + 5efe0e1 commit b0ea97e49e2263ffb6455d2474d3f9c5fe2eadd2
Show file tree
Hide file tree
Showing 5 changed files with 115 additions and 0 deletions.
@@ -0,0 +1,115 @@
---
title: Business Factors
---

# Review of Week

## Course Wrap up

- Looked at cyber security topics
- Not a set of Rules, but understanding these topics can help you stay safe
- Raise awareness of Phishing, Security and Risks

## Business Factors

- How do you protect your business?
- Individual, remember that there is a risk
- Organisation: Invest in protection

## Business Investment: Organisation

- Follow advice from NCSC and similar
- Keep Firewall, AV up to date (but remember its just a stage in prevention)
- Employ professional to test network security

## Business Investment: People

- Cyber essentials course
- Regular training on risks


# Business Stats

## What does this mean for Industry

- 98% of Businesses *Depend* on some form of digital communication.
- 81% some kind of Website or Blog
- Around 78% of Medium to Large businesses hold some kind of personal data.

## Do Senior Managers Consider this an issue

![How high or low a priority is Cyber security to your organisations directors, trustees or senor management](images/priority.png)

## Change in Priority over time.

- A Range of different approaches to the Issue
- GDPR and Data protection
- Financial fraud
- Protecting against Cyber attacks
- Reacting to a previous issue

## Spending on Cyber Security

- 7 in 10 have some level of spend.

![Average Investment in Cyber security in the last financial year](images/spend.png)


## Scale of Threats

- 32% of all business have identified some attack or Breach in 2019
- Good news: Trend is dropping (43% 2018, 46% 2017)
- Bad News: We don't know why....
- Better security
- "Better Focus" by attackers. 2 Attacks in 2017 to 6 in 2019
- Fewer attacks Detected.

## Types of Attack

![](images/TypesOfAttach.png)

## Types of Threat:

- Hacking / Data Breach
- Social Engineering
- IoT Technologies / BOYD
- 3rd Party Issues

## 10 Steps to Cyber security

- Government guides on risk management. (26)
- Focus on different types of controls
- Technical
- Formal Policy


## 10 Steps to Cyber Security

- Only 17% of businesses have actually heard of the stage. However:
- 97% Have implemented at least one step
- 58% Have implemented at least half

## Threats outside of your control

- 44% of business, staff regularly BYOD
- 60% Have some kind of Cloud computing.


# Task

## Case Study Task

https://www.cisecurity.org/wp-content/uploads/2018/10/Six-tabletop-exercises-FINAL.pdf

# Coursework

## Coursework Reminder

- New submission date. 1st May
- Coursework is unchanged
- I will keep you informed in anything changes

## Revision / help sessions

- Be sure to contact via Email if you have any questions
- I will publish details of online support sessions.
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit b0ea97e

Please sign in to comment.