This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here

United Kingdom

Select your regional store:


Getting Cyber Secure

Cyber security is about far more than investing in hardware and software. First and foremost, cyber security is a business matter. This means that top management is accountable for ensuring its organisation’s cyber security strategy meets business objectives. In fact, organisations need competent people and effective processes in order to maximise the value of security technology.

The three fundamental domains of effective cyber security are: people, process and technology. This page explains in further detail how those domains are connected.

A cohesive cyber security approach

In order to achieve real cyber security, today’s organisations have to recognise that expensive software alone is not enough to protect them from cyber threats. For example, the deployment of anti-malware software requires people’s skills and has to be managed by a process. Organisations who fail to understand these interdependencies won’t withstand the ever-growing onslaught of cyber attacks.
Additionally, just trying to prevent an attack is no longer a solution. Organisations need to be prepared for rebuffing, responding to, and recovering from a range of possible attacks. This can only be achieved if people, process and technology are taken into account.

Assess your cyber security risk

There are ten key areas that should form part of an effective cyber security strategy. The principle of people, process and technology also applies to these areas, which are as follows:

  • Board-led Information Risk Management Regime
  • Secure Home and Mobile Working
  • User Education and Awareness
  • User Privilege Management
  • Removable Media Controls
  • Activity Monitoring
  • Secure Configurations
  • Malware Protection
  • Network Security
  • Incident Management

Assess your organisation against the above critical risk areas by completing our free online Cyber Security Self-Assessment Questionnaire. We will provide you with a high-level cyber security report.

Alternatively, contact us for an in-depth cyber security risk assessment which will enable you to identify your weakest areas and take measures. A risk assessment looks at what might happen, works out the probabilities and the impacts and then selects controls to deal with it. It is a classic example of the connectivity between people, process and technology.

You can use existing cyber security standards and frameworks to achieve cyber security. In order to do this you also need a coherent set of products and servces that will help you do this effectively.
See what cyber security products and services are available to you >>>

BUY Cyber Security BOOKS

CyberWar, CyberTerror, CyberCrime

Buy Now


Cyber security - a critical business issue

Download Now

live chat support software