1
Start with Secure Thinking. Ask for a Fujitsu Information Security and Risk Assessment. Contact the team at Fujitsu on: 0870 242 7998 or visit uk.fujitsu.com/securethinking Keep up-to-date on everything! Cyber threats are constantly evolving, meaning it’s not adequate to simply ‘fit and forget’. It’s essential to keep all defences up to date. Many organisations fail to refer to security risk assessments to identify the people, processes or technology that need to be brought up-to-speed. The result is that gaps start to creep in. 5 ACTION Know your risks and ensure your security matches your organisation’s data protection obligations. Invest the time to recognise your risks Cyber criminals target complacency. An organisation might not understand the full risks or think there is nothing worth targeting. It is this mindset that leaves it vulnerable to attack from a range of vectors: ADVANCED PERSISTENT THREATS MALWARE LOSS OF DATA CYBER STALKING PHISHING SCAMS IDENTITY & ACCESS MANAGEMENT FRAUD OR IDENTITY THEFT COMPUTER VIRUSES DENIAL- OF-SERVICE ATTACKS 1 ACTION Get a complete risk assessment of your Cyber Security to understand the risk of every potential attack. Know precisely what needs protecting Once you know the risks you will know what you need to protect. This does not have to be a costly process. It is all about developing a plan that covers cyber security across every area of your organisation: from your people and your processes to your technology. INFORMATION SECURITY AND RISK ASSESSMENT PEOPLE PROCESSES TECHNOLOGY TRAINING COMMS SKILLS GOVERNANCE POLICIES CONTROLS NETWORK DATACENTRE STORAGE APPLICATION 2 ACTION Analyse your infrastructure through an audit and allocate a sliding scale of resources according to the potential impact on the organisation. Be clear what you are protecting against Anti-virus and URL filtering used to be sufficient protection from cyber attacks. Not anymore. The increasing sophistication of targeted attacks has changed everything. Today’s advanced attacks occur in seven stages that can result in the theft of your data. But are your defences ready? 3 ACTION Look for evidence of advanced threats or data theft and take preventative measures to protect the organisation from future attacks. RECON Gather online information to build targeted lures 1 LURE Two Types: email and web 2 CALL HOME Calls home for more malware to expand attack 6 DATA THEFT Cybercrime reaches outinto internal systems for data to steal. 7 DROPPER FILE If vulnerability exists, malware dropper file is delivered. 5 EXPLOIT KIT User’s system is inspected for an open vulnerability 4 REDIRECT Funnels and sends the user to a hidden server. 3 FREE GIFTS CYBERCRIME OPERATIONS What should you be looking out for? stages of advanced threats & data theft Train your people to recognise the threats A report by the National Audit Office claims the IT security skills gap will take up to 20 years to close, leaving the UK vulnerable to regular attacks. Public and private sector organisations must train staff to follow security policies and procedures and provide them with the essential skills to tackle cyber crime. More than that, senior management must invest the time in understanding the risks and what investments to make. Trust in the ability of government organisations to protect citizen data is at an all-time low. Fujitsu presents: 5 practical ways you can start to protect citizen data. Source: National Audit Office & Information Commissioner’s Office 4 ACTION Understand which skills already exist and which ones are missing and then create a programme of staff training for all levels of the organisation. 44m cyber attacks in 2011 in the UK £2.6 MILLION Fines handed out by the ICO to government organisations in 2012 80% Proportion of cyber attacks that could be prevented through simple computer and network ‘hygiene’ Working together with expert security partners: PROTECTION PROTECTION RISK HACKERS THEFT SECURITY CONNECTED CITIZENS 5 ways to protect citizen data. Source: Fujitsu Source: Clearswift 80% Number of councils that experienced a security breach in 2012 Those with ‘implicit trust’ in central government to use data securely 6% 2013 14% 2003 The question is: Are you taking them seriously? Meanwhile, cyber attacks are on the increase.

ACTION - Fujitsu · 2014-06-19 · TRAINING COMMS SKIllS GOVERNANCE POlICIES CONTROlS NETwORK DATACENTRE STORAGE APPlICATION 2 ACTION Analyse your infrastructure through an audit

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ACTION - Fujitsu · 2014-06-19 · TRAINING COMMS SKIllS GOVERNANCE POlICIES CONTROlS NETwORK DATACENTRE STORAGE APPlICATION 2 ACTION Analyse your infrastructure through an audit

Start with Secure Thinking.Ask for a Fujitsu Information Security

and Risk Assessment.Contact the team at Fujitsu on:

0870 242 7998or visit

uk.fujitsu.com/securethinking

Keep up-to-date on everything! Cyber threats are constantly evolving, meaning it’s not adequate to simply ‘fit and forget’. It’s essential to keep

all defences up to date.Many organisations fail to refer to security risk assessments

to identify the people, processes or technology that need to be brought up-to-speed. The result is that gaps start to creep in.

5

ACTIONKnow your risks and ensure your security matches your

organisation’s data protection obligations.

Invest the time to recognise your risks Cyber criminals target complacency.

An organisation might not understand the full risks or think there is nothing worth targeting. It is this mindset that leaves it

vulnerable to attack from a range of vectors:

ADVANCEDPERSISTENT

THREATS

MAlwARE

lOSSOF DATA

CYBERSTAlKING

PHISHING SCAMS

IDENTITY& ACCESS

MANAGEMENT

FRAUD OR IDENTITY

THEFTCOMPUTER

VIRUSES

DENIAl- OF-SERVICE

ATTACKS

1

ACTIONGet a complete risk assessment of your Cyber Security

to understand the risk of every potential attack.

Know precisely what needs protecting Once you know the risks you will know what you need to protect.

This does not have to be a costly process. It is all about developing a plan that covers cyber security across

every area of your organisation: from your people and your processes to your technology.

INFORMATION SECURITY AND RISK

ASSESSMENT

PEOPlE PROCESSES TECHNOlOGY

TRAINING COMMS SKIllS GOVERNANCE POlICIES

CONTROlS NETwORK DATACENTRE STORAGE APPlICATION

2

ACTIONAnalyse your infrastructure through an audit and

allocate a sliding scale of resources according to the potential impact on the organisation.

Be clear what you are protecting against Anti-virus and URL filtering used to be sufficient protection

from cyber attacks. Not anymore.The increasing sophistication of targeted attacks has changed

everything. Today’s advanced attacks occur in seven stages that can result in the theft of your data.

But are your defences ready?

3

ACTIONLook for evidence of advanced threats or data theft

and take preventative measures to protect the organisation from future attacks.

RECONGather online information to build targeted lures

1

lURETwo Types: email and web

2

CAll HOMECalls home for more malware to expand attack

6

DATA THEFTCybercrime reaches outinto internal systems for data to steal.

7

DROPPER FIlEIf vulnerability exists, malware dropper file is delivered.

5

ExPlOIT KITUser’s system is inspected for an open vulnerability

4

REDIRECTFunnels and sends the user to a hidden server.

3

FREE GIFTS

CYBERCRIMEOPERATIONS

FREE GIFTS

CYBERCRIMEOPERATIONS

FREE GIFTS

CYBERCRIMEOPERATIONS

FREE GIFTS

CYBERCRIMEOPERATIONS

FREE GIFTS

CYBERCRIMEOPERATIONS

FREE GIFTS

CYBERCRIMEOPERATIONS

FREE GIFTS

CYBERCRIMEOPERATIONS

what should you be looking out for?

stages of advanced threats & data theft

Train your people to recognise the threats A report by the National Audit Office claims the IT security skills gap will take up to 20 years to close, leaving the UK

vulnerable to regular attacks.Public and private sector organisations must train staff to

follow security policies and procedures and provide them with the essential skills to tackle cyber crime. More than that, senior management must invest the time in understanding the risks

and what investments to make.

Trust in the ability of government organisations to protect citizen data is at an all-time low.

Fujitsu presents: 5 practical ways you can start to protect citizen data.

Source: National Audit Office & Information Commissioner’s Office

4

ACTIONUnderstand which skills already exist and which ones

are missing and then create a programme of staff training for all levels of the organisation.

44mcyber attacks in

2011 in the UK

£2.6MIllION

Fines handed out by the ICO to government

organisations in 2012

80%Proportion of cyber attacks

that could be prevented through simple

computer and network ‘hygiene’

Working together with expert security partners:

PROTECTIONPROTECTION

RISK

HACKERS

THEFT

SECURITY CONNECTEDCITIZENS5 ways to protect citizen data.

Source: Fujitsu Source: Clearswift

80%Number of councils that experienced a

security breach in 2012

Those with ‘implicit trust’ in central government to use data securely

6%2013

14%2003

The question is: Are you taking them seriously?

Meanwhile, cyber attacks are on the increase.