What is Cybersecurity?
Today most of the world runs on information. There are few aspects of our lives that don’t produce data, and we struggle to secure this world of data because we can’t see it. Unlike physical security measures (armed guards protecting valuable assets), the ways that we can protect our data are not always tangible.
Cybersecurity, sometimes also known as information security or information security risk management, is an attempt to build good practices around securing the data we use in business. The people, business processes, and information technology employed on a daily basis are all vulnerable to attackers - since we can make money from these things, it makes sense that others might try to steal them. Most small & medium sized enterprises (SMEs) don’t have the necessary skills within their teams, and lack the budget for expensive cybersecurity personnel.
That’s where Cyber Safety comes in. We provide a simple, easy-to-use set of services that cover many of the basics a cybersecurity officer would perform, backed by our team’s decades of collective experience in the industry, professional certifications, and passion to make the cyber world a little safer.
Cyber Safety: People, Processes, and Technology
1. People
Your people are your most valuable resource; unfortunately they’re also your most vulnerable. A majority of the hacks you read about today were the result of somebody failing to be cyber aware - either clicking a phishing link, giving up their password, or circumventing security protections. Attackers look for ways into your systems starting with people who don’t follow good security practices, so it’s important to train your staff to be cyber safe.
The Security Training module provides training tailored to your staff’s unique needs. Start with a knowledge check to identify each person’s strengths/weaknesses, then deliver training prioritized based on the results of the knowledge check. Everybody gets the same set of courses, but delivered in an order that prioritizes their weakest areas to help them stay secure.
Learn more about our Cybersecurity Training in the Training Overview.
Looking for more details? Be sure to check out the in-depth Training Feature Guide.
2. Process
Business processes combine technology systems we use and the people using them to achieve an organization's mission. Processes define how we create value and deliver products, goods, and services to customers, and we generally use or create sensitive data in the execution of these processes.
Security Policies are a crucial way for business leaders to communicate their vision for a company’s operations, and act as instructions for processes. Policies can set rules, guidelines, and mandates for conducting operations, and security policies are a vital way to govern the cyber activities of your business. Without guidance from management, which takes into account concerns for security and compliance, your staff will lack the knowledge they need to conduct operations securely.
Security Policies are basic, easy-to-use templates that cover important policy areas required in many compliance frameworks, such as network security and data breach response. We’ve created these to take the majority of the work off your plate, giving you a faster way to create policy documents your business needs to be cyber safe.
Learn how to get started with Security Policies in the Security Policies Overview.
3. Technology
A majority of our information exists in computer systems (and even when we print it in hardcopy, we still need to keep it secure). It makes sense, then, that we put special effort into keeping our technology systems secure. Systems that are exposed to the internet, such as websites (web apps) that allow users to enter, see, and/or manage information are particularly vulnerable (think of your online banking sites). This is an especially challenging area for many SMEs, given how rapidly technology changes and how complicated it can be.
Web App Vulnerability Scans provide you a simple-to-understand way to identify security weaknesses in your web apps, which hackers could exploit to gain access to your data or systems. Provide the web addresses you’d like to scan, and choose a scan depth, from Lightning (minimal amount checked, fastest to run) to Normal (most intrusive, takes the longest, but will find the most vulnerabilities). Once your scan is finished, the results are available in a convenient PDF, which contains details your IT team will need to fix these vulnerabilities before hackers have a chance to exploit them.
Learn how to get started with our Monitoring module in the Monitoring Overview.
Looking for more details? Be sure to check out the in-depth Monitoring Feature Guides.