FAQ

Frequently Asked Questions of cyber security

Are cyber threats increasing?

Do mobile devices present a security risk to business?

What are the barriers to addressing cybersecurity in business?

What are the real needs of a cybersecurity strategy?

Do we need to know more about cybersecurity?

Where can I learn more about securing my business?

Why do cloud system create new cybersecurity issues?

Is privacy a part of cybersecurity?

What is the average cost of a cyber event?

What is cyber hygiene?

What is a firewall and do I need one?

How can a business prevent a cyber event?

What is cyber risk and how can I manage it?

Why do I need a cybersecurity framework?

Why is treat intelligence so important in business?

Why do we need to worry about information security?

What are todays biggest security threats?

What is sensitive data and what are my compliance obligations?

What is the best on staff or contracted off staff security personnel?

Do I need a security person on my board?

Why do cybersecurity and the business focus have to be aligned to benefit the business?

Where is my data and how is it being protected?

Do our employees need to be aware of cyber events?

Why do I need to invest in internal cybersecurity systems?

Cyber insurance - do we need it

Isn't reacting to a cyber event better than being proactive?

We are only a small organisation do I still need to worry about cyber criminals?

What is a data breach?

What is malware?

What is phishing?

Why do I need 2FA?

What are the indicators of a breach?

I hate passwords why can't I use the same one everywhere?

What is being monitored inside my network?

What is encryption?

Why do I need encryption on my website?

Why is it unwise to connect to a free wifi point?

How do I identify my business assets?

Secure payments and how you can do it

Is a printer a target of cybercrime

Why do I need to lock my computer

Is awareness good cybersecurity protection

Secure your device

Lets talk paywave

Are cyber threats increasing

cyber threats increasing cyber threats are increasing significantly.

The problem is that once a cyber threat is discovered and the vulnerabilities removed, they are now looking for other vulnerabilities that they can use to create a hack or create an attack. So the whole process of finding a vulnerability,

patching that vulnerability and removing that vulnerability from the internet is part of what causes or what reduces the chance of a hack happening.

And that's why it's so important to use just the basics. Whenever you see something that needs to be patched. You need to patch it up further straightaway.

Do mobile devices present a security risk to business

Do mobile devices present a security risk to business?

Yes, they do.

The amount of information that we now hold on our devices is quite significant.

And because of that, we have to really start taking into account that if my device gets hacked, then there is a very good chance that that hack could improve in fact, the business in significant ways.

If your CEO gets his mobile phone or mobile device hacked, then they have access to his email account.

They have access to his information.

They have access to other components that are on that, that device. For instance, if your laptop gets hacked, then these devices then become the ability for the hacker, the cybercriminal to get into your organization and really cause some problems.


What are the barriers to addressing cybersecurity in business

What are the barriers to addressing cyber security in business?

Well, there are three main barriers when it comes to cybersecurity and protecting against cybercrime.

One is money. And as we know in most cases where when it comes to spending money on an insurance type environment, which is what security is. It has to be debated it has to be argued about it has to really be fought for the money to allow an organization to secure itself.

What whenever you're talking about investing money in an organization for hiring people or buying systems, then you are also looking at other components.

There are two other areas that are barriers.

One is the capability of the people you've got on staff or the capability or people you are actually using to protect your organization.

And the second one is time.

Now time is effective for the simple process that everybody needs to implement the systems as fast as possible.

But that also comes with caveats along the lines of You have to get it right even though speed is important.

So all three time, money and capability are really barriers to people actually addressing cybercrime properly

What are the real needs of a cybersecurity strategy

What are the real needs of a cybersecurity strategy?

Once you start putting a strategy together, then you will notice that cybercrime and cybersecurity start snowballing in a large number of ways.

Now cyber security strategy you can't come up with a car cybersecurity strategy until you understand exactly what you have inside your organization.

Now, those assets within your organization's are a pinnacle component of working out how you are going to protect them, how you're going to identify the risks, how you're going to mitigate those risks and how you are going to go forward as an organization.

So most of the time, yes, there is a real need for strategy, but you have to have that strategy within the bounds of a framework or the capability that allows you to do that.

Do we need to know more abour cybersecurity

What are the real needs of a cybersecurity strategy?

Once you start putting a strategy together, then you will notice that cybercrime and cybersecurity start snowballing in a large number of ways.

Now cyber security strategy you can't come up with a car cybersecurity strategy until you understand exactly what you have inside your organization.

Now, those assets within your organization's are a pinnacle component of working out how you are going to protect them, how you're going to identify the risks, how you're going to mitigate those risks and how you are going to go forward as an organization.

So most of the time, yes, there is a real need for strategy, but you have to have that strategy within the bounds of a framework or the capability that allows you to do that.

Where can I learn more about securing my business

Where can I learn more about security in my business?

In most cases, when it comes to information about security, there is lots of information on the internet.

But the trouble is you've got to understand that in a lot of cases the information is attached to the sales process of a product.

Now, when it comes to cybersecurity, most organizations want to sell you the next best thing but it's not necessarily going to do make your organization any more secure than if you buy another component of whatever needs to be employed implemented.

Cybersecurity is what we call holistic, Its Security in depth.

Now, in security in-depth means you have a number of processes in place, whether that's technological, maybe that's people maybe that's a policies and procedure that will allow your organization to actually have that depth of an organization to protect itself.

Now to do that, you need to actually understand how security works.

Why do cloud-based technologies create new cybersecurity issues

Why do cloud systems create new cybersecurity issues?

Before the introduction of cloud systems, everybody was terrestrially based. So in other words, we had a connection to the internet.

Everybody was connected to that connection.

And that single point of contact was your connection to the internet.

Everybody could do what they needed to do. Everybody could connect to the internet-connected everything else.

If they needed to get data from your system outside the organization.

Then you had to connect either via VPN or some other means with the introduction of cloud systems and cloud technology, we now have a a, we don't have that first point of protection in place anymore.

Yes, we can put a system around the cloud technologies and allow that to to secure the organization in some way.

But it makes it because of the the sales process of what cloud technology is, means that any device from anywhere in the world can connect to that system. So you've no longer got that internal connection process.

Now you've gone from a single point of failure, which was your internet connection to everybody having access to your data, if they have the right username, password, two factor authentication component, or something along those lines. So what Cloud has actually done is increased the cybersecurity footprint.

And because of that, we now have to make decisions about what components of that cloud system are what we really need for an organization

Is privacy part of cybersecurity

What is the average cost of a cyber event

What is cyber hygiene

What is a firewall and do I need one?

How can a business prevent a cyber event?