Information Security
- Overview
- Guidance, Documents & Policies
- Key Topics
- Info/Cyber Security Checklist
- Examples & Advice
- Short videos
- FAQs
- Ask a Question
This section on information security provides our initial documents to support the information security programme.
Data Protection often looks at the security and legalities of personal data, information security looks at more practical steps to secure all data in your organisation - in reality, the two things are intrinsically linked and the DPE data protection framework utilised many approaches from information security frameworks.
The documents include:
- Cyber Essentials Guidance
- Business Continuity Template
- Information Security Policy
- Physical Security Policy
- Changing IT Provider Considerations
Whilst Cyber Essentials is a recommended framework, you may find it not right for you - however, the areas covered are those that your organisation needs to pay attention to, so it is worth reviewing.
For a complete Information Security programme, other resources and tools are necessary, as well as strategic coordination with your information technology and facilities specialists. However, it is important to remember that accountability and governance is the responsibility of leadership and practical security and data protection is everyone's responsibility.
Other policies and tools should be used as part of your information security programme and these are an important part of a data protection programme. These include:
- Clear desk policies
- Record of processing (supplier, systems and hardware due diligence)
- Retention schedules
- Records management
- Risk management
- Bring your own device
- Acceptable use
- Password Management
- User Access Control
- etc.
Nothing should be taken in isolation. These tools and resources all work together. This best practice area should be reviewed with the Cyber Security Best Practice Area.
Risk assessment is a key factor in information governance. We have therefore provided a new e-learning module on risk assessment.
Strong Password Policies: Enforce the use of complex passwords and regular updates.
Multi-Factor Authentication (MFA): Require MFA for all sensitive systems.
Role-Based Access Control (RBAC): Limit access to systems and data based on roles and responsibilities.
Principle of Least Privilege: Ensure users have the minimum level of access necessary to perform their job.
Access control also includes physical access to the building as well as systems, devices and software. Review the CCTV best practice area for information about surveillance. Visitor management systems can help with non-employee access to the buildings.
Cloud security is often managed by a third party, so ensure they understand your role based procedures and policies.
Ransomware-Resistant Backups
Effectively communicating during a cyber incident
October is Cyber Security Awareness Month: 31. On the road to cyber essentials
October is Cyber Security Awareness Month: 24. Backups
October is Cyber Security Awareness Month: 30. Support
October is Cyber Security Awareness Month: 29. Admin controls
October is Cyber Security Awareness Month: 28. Phishing
October is Cyber Security Awareness Month: 27. Passwords
October is Cyber Security Awareness Month: 26. Physical Security
October is Cyber Security Awareness Month: 25. Server Security
October is Cyber Security Awareness Month: 23. Filtering and Monitoring
October is Cyber Security Awareness Month: 22. Hardware: Printers
October is Cyber Security Awareness Month: 21. Hardware: Asset Control
October is Cyber Security Awareness Month: 20. Hardware: Safe disposal
October is Cyber Security Awareness Month: 19. Anti-virus/anti-malware
October is Cyber Security Awareness Month: 18. Regular Updates
Christmas Pre-Holiday Cyber Check!
October is Cyber Security Awareness Month: 17. Access Control (Users)
October is Cyber Security Awareness Month: 16. Access Control (Wi-Fi/Network access)
October is Cyber Security Awareness Month: 15. Access Control (working from home/off site)
October is Cyber Security Awareness Month: 14. Access Control (MFA)
October is Cyber Security Awareness Month: 13. Awareness
October is Cyber Security Awareness Month: 12. Training
October is Cyber Security Awareness Month: 11. Policies and Procedures
October is Cyber Security Awareness Month: 10. Assess where you are with cyber security
October is Cyber Security Awareness Month: 9. A guide for education providers
October is Cyber Security Awareness Month: 8. How can your organisation prevent Ransomware attacks?
October is Cyber Security Awareness Month: 7. What does a Ransomware attack on a school look like?
October is Cyber Security Awareness Month: 6. Cyber Action Plan
October is Cyber Security Awareness Month: 5. Responsibilities