InfoSec / Cyber

"A graphic announcing 'October is Cyber Security Awareness Month,' with text explaining the importance of creating a cyber emergency contact list in preparation for a cyber attack. It also includes a 'Cyber tip' to assess passwords, turn on MFA, and review critical accounts, especially email. A shield icon with a checkmark and a lightbulb icon are visible."

October 10. Understanding Your Cyber Posture

Before you can effectively improve your cyber security, you must first understand where you are - Understand Your Cyber Posture. It involves a thorough evaluation of your existing security measures, identifying vulnerabilities, and understanding the risks you face.  You can't protect what you don't know you have or what weaknesses you might have hidden

For Individuals:

  • Inventory Your Digital Footprint: List all your online accounts (email, social media, banking, shopping, cloud storage). Are there old ones you no longer use? Delete them.

  • Password Health Check: Review the strength and uniqueness of your passwords across these accounts. Use a password manager's audit feature if available. Configure MFA where you can.

  • Privacy Setting Review: Check the privacy settings on your most used apps and social media platforms. Are you sharing more than you intend?

  • Device Security: Are your computers and phones password-protected? Do they have up-to-date antivirus software? Are they set to receive automatic updates?  Could you set up biometric password control?

  • Backup Status: When was your last backup of critical personal files? Is it stored securely?

  • Awareness Level: How confident are you in spotting a phishing email? Do you know what to do if you suspect a scam?

For Organisations:

  • Asset Discovery: Identify all hardware (servers, workstations, mobile devices, IoT devices) and software (operating systems, applications, databases) in your environment.  If you are a school or college, you should do this as part of the DfE Digital Standards.  All organisations should have loan agreements with any staff that use the organisation's equipment as an agreement of how they will treat the device, but also as part of asset discovery, so you can track who has what device.

  • Vulnerability Assessments: Conduct regular scans to identify known security weaknesses in your systems, applications, and network infrastructure.

  • Penetration Testing: Simulate real-world attacks to identify exploitable vulnerabilities and evaluate the effectiveness of your security controls.

  • Risk Analysis: Understand the potential impact and likelihood of various cyber threats to your specific assets and operations.

  • Compliance Audit: Assess adherence to relevant industry regulations and data protection laws.

  • Policy and Procedure Review: Evaluate whether your existing security policies are comprehensive, up-to-date, and effectively implemented.  Consider having an Acceptable Use Policy - DPE customers can download a template policy through our Knowledge Bank portal.

  • Employee Assessment: Gauge employee awareness levels through surveys or simulated phishing campaigns.

An honest and comprehensive assessment provides a clear baseline, highlighting your strengths and, more importantly, pinpointing areas that need immediate attention and guiding your subsequent cyber security investments and efforts. It's the essential first step on your journey to enhanced digital resilience.



💡Today's Cyber Tip: Reduce your digital footprint.

Today, take 15 minutes to conduct a "digital spring clean." Log into an old online account you no longer use (email, social media, shopping) and either secure it with a new strong password and MFA, or better yet, permanently delete it. Reducing your digital 👣 footprint reduces your attack surface!


Simple Cyber Checklist:

Organisations can use our simple checklist to determine where you are with cyber security - you'll need to be a customer to view this, but here's a sample question:

Have staff completed cyber security training?

Invalid Input


Amazing, you have ticked off an important item on the Information and Cyber Security checklist.  Staff should have cyber security training annually if they have access to the network.  This should also include training and awareness about passwords, data breaches and information security.

For further help and guidance and access to the full checklist, please contact This email address is being protected from spambots. You need JavaScript enabled to view it..




As a controller you are responsible for keeping any personal data safe that you collected.  Raising cyber security awareness is part of keeping personal data and systems safe.  The DfE Digital Standards for School and Colleges advises that all staff that have access to the network should have annual training. This should include a designated governor.  The NCSC provides free School Staff Training.  Further free training is highlighted in this article: Free Cyber Training for Staff

Harry the Hacker loves to take data that isn't protected!

 

Clipart cartoon with headphones on Please contact us for more help and advice about data protection compliance and cyber security standards: This email address is being protected from spambots. You need JavaScript enabled to view it. including the full checklist and best practice. 

 


Try asking the data protection lead in your organisation, or SLT digital lead or contact your DPO:

We can provide help and guidance with data protection compliance, cyber security standards and records management: This email address is being protected from spambots. You need JavaScript enabled to view it. including the full checklist and best practice.

(Access to the checklist will be via our Knowledge Bank portal, contact us on This email address is being protected from spambots. You need JavaScript enabled to view it. for more information or a demonstration).
{module title="Checklist: Cyber Security"}

DPE Knowledge Bank Guidance and Support:


For schools and colleges, six of the DfE Digital Standards are now mandatory. We have a DfE Digital Standards Tracker tool help you track your cyber resilience and your progress: 

   

Review our Cyber Security Best Practice Area for micro learning, support, guidance and policies:



Why not have a look at our 'specialist' trainer Harry the Hacker :





Search