Information Security
- Overview
- Guidance, Documents & Policies
- Key Topics
- Info/Cyber Security Checklist
- Examples & Advice
- Micro Learning
- FAQs
- Ask a Question
This section on information security provides our initial documents to support the information security programme.
Data Protection often looks at the security and legalities of personal data, information security looks at more practical steps to secure all data in your organisation - in reality, the two things are intrinsically linked and the DPE data protection framework utilised many approaches from information security frameworks.
The documents include:
- Cyber Essentials Guidance
- Business Continuity Template
- Information Security Policy
- Physical Security Policy
- Changing IT Provider Considerations
Whilst Cyber Essentials is a recommended framework, you may find it not right for you - however, the areas covered are those that your organisation needs to pay attention to, so it is worth reviewing.
For a complete Information Security programme, other resources and tools are necessary, as well as strategic coordination with your information technology and facilities specialists. However, it is important to remember that accountability and governance is the responsibility of leadership and practical security and data protection is everyone's responsibility.
Other policies and tools should be used as part of your information security programme and these are an important part of a data protection programme. These include:
- Clear desk policies
- Record of processing (supplier, systems and hardware due diligence)
- Retention schedules
- Records management
- Risk management
- Bring your own device
- Acceptable use
- Password Management
- User Access Control
- etc.
Nothing should be taken in isolation. These tools and resources all work together. This best practice area should be reviewed with the Cyber Security Best Practice Area.
Risk assessment is a key factor in information governance. We have therefore provided a new e-learning module on risk assessment.
Strong Password Policies: Enforce the use of complex passwords and regular updates.
Multi-Factor Authentication (MFA): Require MFA for all sensitive systems.
Role-Based Access Control (RBAC): Limit access to systems and data based on roles and responsibilities.
Principle of Least Privilege: Ensure users have the minimum level of access necessary to perform their job.
Access control also includes physical access to the building as well as systems, devices and software. Review the CCTV best practice area for information about surveillance. Visitor management systems can help with non-employee access to the buildings.
Cloud security is often managed by a third party, so ensure they understand your role based procedures and policies.

The role of Passkeys in Cyber Resilience and Cyber Security

Ransomware-Resistant Backups

Effectively communicating during a cyber incident

October is Cyber Security Awareness Month: 31. On the road to cyber essentials

October is Cyber Security Awareness Month: 24. Backups

October is Cyber Security Awareness Month: 30. Support

October is Cyber Security Awareness Month: 29. Admin controls

October is Cyber Security Awareness Month: 28. Phishing

October is Cyber Security Awareness Month: 27. Passwords

October is Cyber Security Awareness Month: 26. Physical Security

October is Cyber Security Awareness Month: 25. Server Security

October is Cyber Security Awareness Month: 23. Filtering and Monitoring

October is Cyber Security Awareness Month: 22. Hardware: Printers

October is Cyber Security Awareness Month: 21. Hardware: Asset Control

October is Cyber Security Awareness Month: 20. Hardware: Safe disposal

October is Cyber Security Awareness Month: 19. Anti-virus/anti-malware

October is Cyber Security Awareness Month: 18. Regular Updates

Christmas Pre-Holiday Cyber Check!

October is Cyber Security Awareness Month: 17. Access Control (Users)

October is Cyber Security Awareness Month: 16. Access Control (Wi-Fi/Network access)

October is Cyber Security Awareness Month: 15. Access Control (working from home/off site)

October is Cyber Security Awareness Month: 14. Access Control (MFA)

October is Cyber Security Awareness Month: 13. Awareness

October is Cyber Security Awareness Month: 12. Training

October is Cyber Security Awareness Month: 11. Policies and Procedures

October is Cyber Security Awareness Month: 10. Assess where you are with cyber security

October is Cyber Security Awareness Month: 9. A guide for education providers

October is Cyber Security Awareness Month: 8. How can your organisation prevent Ransomware attacks?

October is Cyber Security Awareness Month: 7. What does a Ransomware attack on a school look like?

October is Cyber Security Awareness Month: 6. Cyber Action Plan
Our videos can be shared with anyone by clicking on the Vimeo share button and copying and pasting the vimeo link:
