Does cyber security need to evolve?

With the number of data breaches in 2014 affecting four in ten companies and the exponential rise in the number of cyber attacks, the focus on cyber security is making its way to the top of most organisations’ agendas.

The threat posed by cyber criminals has never been greater. Whether a breach results in the loss of sensitive data, fraudulent use of personal information, or the nuisance of having to de-bug your network, the financial, operational and reputational consequences can be quite severe.

Cyber crime is no longer a threat posed by lone operators, but rather comprises a sophisticated network of criminals exposing vulnerabilities in cyber defences in ever-changing ways. The scale of these attacks is such that no organisation is safe, from SMEs to global blue-chip companies.

In a world where cybercrime is thriving and able to adapt quickly, the question of whether or not cyber security needs to evolve is easy to answer.

In order to stay ahead of the risks posed by the threat of cyber attacks, security professionals need to:

• recognize that no single policy will 100 per cent protect their network environment
• focus on a three-pronged defence strategy of prevention, detection and recovery
• understand the data they are accessing and use it to identify the risks
• inform senior management on the issues and ensure capital is ring-fenced for investing in security
• educate the business so that security methods are common practice in the working environment
• be prepared for a breach and ensure there is an incident response plan in place
• make sure the company’s incident response plan is kept up to date and that all areas of the business are prepared
• perform regular testing of the incident response plan
• benchmark incident response times and procedures
• allow any breaches and the subsequent recoveries to inform the business’ ongoing cyber security policies.

With a potential breach inevitable for most companies, defence must take a pro-active approach – one that evolves in line with the rate at which cyber criminals are adapting to new technology.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy