Sign in or sign up. You are in preview mode.

14.42

Technical cybersecurity

14.42 Technical cybersecurity

Defining the threats to the business and actively protecting against them.

Overview

It’s imperative to have measures in place to protect your data and your customers’ data.

There’s too many heartbreaking stories of people losing everything from scams, hackers, phishing, malware, viruses, and other threats.

So if you’ve been putting this off, stop procrastinating. The bad guys aren’t. The good news is, there’s a lot of great information and help available now.

This is a place to keep anything related to the ‘technical’ aspects of managing your cybersecurity:

  • What is your overall plan and is it active?
  • Does your type of business have a higher risk profile?
  • What devices and software will you rely on?
  • Do you need to organise some professional advice?

Exceptions

This is for your overall cybersecurity plan, the devices or software involved are managed elsewhere (e.g. a firewall in 14.13, antivirus software in 14.32).

Also see

For the human side of things, see 14.43 Behavioural cybersecurity.

Further reading