“As an organisation grows, so it outgrows the usefulness of just the one cyber policy document,” explains Neil. He adds that there are lots of other approaches and policies you should consider to make everyday activities and behaviours manageable. “Don’t forget that training and awareness of these policies will require a commitment from the leadership and staff to see them made effective.”
So as an organisation expands, what else might it consider?
Acceptable use: This makes clear that facilities, equipment, systems, and data shall only be used and accessed in acceptable ways that ensure the confidentiality, integrity, and availability of the information. Systems and IT equipment are provided for business use, but the organisation recognises there are times when staff will need to complete personal tasks online. “Any reasonable personal use of equipment is permitted so long as it does not bring the organisation into disrepute nor violate any laws or regulations,” says Tim.
Access control: This is where the policy limits an individual’s access to places, data, and systems that they need to do their required job and nothing more. This is often known as “least privilege” and is designed to stop people reading, downloading, changing, or deleting certain information.
Back-up and recovery: This is to set out the requirements for backing up, and accessing backed-up data, so that information is protected. This policy has become increasingly important, given the high-profile and reputation-damaging nature of some ransomware attacks. “With a good offline back-up, taken regularly, stored safely, and tested so that you know it works, it is possible to recover from an attack far faster and more safely than paying a ransom to a criminal to retrieve information,” adds Neil.
Business continuity: This commits the manager of networks and systems to minimise the risk of loss of services, and, in the event of an incident, implement the recovery plan to support the business’s needs. With the rise of ransomware, planning for a longer-term disruption to core IT services – from hours or days in the past to weeks or months – is crucial.
Data protection, retention and destruction: Data should be protected in proportion to its sensitivity and value and processed in line with legal and regulations. “A policy or procedure for this is therefore vital,” explains Tim. “This includes keeping it only as long as necessary and destroying it safely when it is no longer needed.”
Remote working: Given that homeworking has become more prevalent since the pandemic began, many organisations have had to create remote-working policies. “This has frequently been done under great pressure and has let security standards slip,” says Neil. “This security debt needs to be paid back with resources and investment.” Setting an effective remote-working policy means focusing on the physical security of data and equipment. “Don’t overlook printing out material, and ensure staff are reminded about prying eyes and eavesdroppers, particularly on confidential business calls and in online meetings.”
Supplier management: As businesses grow, they tend to rely on third parties for elements of business activity. So a secure policy requiring the effective selection, due diligence, and management of those suppliers is essential. If using software as a service (SaaS), ensure that, if something happens to the supplier, your organisation can still access the information it needs. “Applications and data should be managed with an effective escrow,” advises Neil. “To many organisations, this means keeping its operations going and insulation from reputation damage.”
For more information on cyber security services, visit NCC Group.
This article was written in collaboration with NCC Group Software Resilience, the world's largest Software Escrow provider. Visit their insight blog for actionable resources and helpful information.