{"id":1339,"date":"2019-07-29T12:19:00","date_gmt":"2019-07-29T12:19:00","guid":{"rendered":"https:\/\/spikes.be\/uncategorized\/10-tips-to-make-cyber-security-a-top-priority\/"},"modified":"2019-07-29T12:22:01","modified_gmt":"2019-07-29T12:22:01","slug":"10-tips-to-make-cyber-security-a-top-priority","status":"publish","type":"post","link":"https:\/\/spikes.be\/en\/blog-en\/10-tips-to-make-cyber-security-a-top-priority\/","title":{"rendered":"10 tips to make cyber security a top priority"},"content":{"rendered":"<ol>\n<li><strong><span class=\"TextRun SCXW42189342 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42189342 BCX0\">Make cybersecurity a top priority. As for management and team. <\/span><\/span><\/strong><span class=\"TextRun SCXW42189342 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42189342 BCX0\">Invest in a good training on all levels and save a fortune on repair, lost data and loss of face.<\/span><\/span><\/li>\n<li><span data-contrast=\"none\">Make sure that<\/span><span data-contrast=\"none\">\u00a0new employee gets training from its<strong> first day.<\/strong><\/span><strong>\u00a0\u00a0<\/strong><\/li>\n<li><span data-contrast=\"none\"><strong>Inform about legal obligations<\/strong>. Create guidelines for the use of personal devices, passwords, USB-Sticks and permissions for access to various datatypes.<\/span><\/li>\n<li><span data-contrast=\"none\">Teach colleagues what to do in case of the data leak.<\/span><\/li>\n<li><span data-contrast=\"none\">Use <strong>formal and informal ways to train<\/strong>: pop-up tests, a one-on-one training and e-learning or send a _fake_ email to measure how careful co-workers are. Collaborate and use their feedback on the trainings to improve.\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\"><strong> Create written guidelines.<\/strong> Formulate them easy and understandable for everyone. Explain them all, make sure that everyone understands them, discuss the consequences and punishments for non-compliance. Let them sign a document where they acknowledge the security rules, procedures and policy. That they understand and will follow them.<\/span><\/li>\n<li><span data-contrast=\"none\"><strong> Be sure that the guidelines are always up to date with the legislation,<\/strong> similar for new risks of course. Get legal assistance and do not forget to inform your employees about the changes.<\/span><\/li>\n<li><span data-contrast=\"none\">Engage the information manager for staff trainings. <strong>Consult a lawyer for the legal obligations and get technical expertise on hand<\/strong>. Show during the training that management actively is involved and takes data security seriously.<\/span><\/li>\n<li><span data-contrast=\"none\">Train<\/span><span data-contrast=\"none\">as long as<\/span><span data-contrast=\"none\">\u00a0needed but h<strong>ave one formal training yearly<\/strong>. The goal is the find gaps in the security plans and to solve them. Some of the departments might need more trainings. Create objectives so you can measure the effectiveness of the trainings.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\"><strong>Keep on communicating<\/strong> through newsletters, emails and personal contact. This is essential to prevent phishing. That is when people are misled to pass on business sensitive information.<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW229178537 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW229178537 BCX0\">Do you want to get started? Or are you looking for some guidelines? Contact us and we can find a way together to help you. Security is a very important theme.\u00a0<\/span><\/span><a href=\"https:\/\/spikes.be\/resultaten\/veiliger-werken\/\"><span class=\"TextRun Underlined SCXW229178537 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW229178537 BCX0\">Read also other tips<\/span><\/span><\/a><span class=\"TextRun SCXW229178537 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW229178537 BCX0\">, insides and tricks to solve security problems. Make from cybersecurity your top priority.<\/span><\/span><span class=\"EOP SCXW229178537 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span class=\"TextRun SCXW98505805 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW98505805 BCX0\">Work collaboratively saver with a Secure Way of Working- approach<\/span><\/span><span class=\"EOP SCXW98505805 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><strong><span class=\"TextRun SCXW11406188 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11406188 BCX0\">By now is everyone familiar with \u2018new working\u2019, NWOW or the New Way of Working. It is time for the next step. Spikes introduces a SWOW; the Secure Way of Working, everyone in an organization seeks liberty, but wants consciously handle security of company information.\u00a0<\/span><\/span><span class=\"EOP SCXW11406188 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/p>\n<p><span class=\"TextRun SCXW134289042 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW134289042 BCX0\">Spikes built, the latest years, a lot of experience in the security field.\u00a0<\/span><\/span><span class=\"TextRun SCXW134289042 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"ContextualSpellingAndGrammarError SCXW134289042 BCX0\">So<\/span><\/span><span class=\"TextRun SCXW134289042 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW134289042 BCX0\"> do we have an approach, with concrete worked out offers, together with Microsoft. The result: an approach where your organization can start immediately with a security program&#8230; Discover how your board members can create a safer collaboration, together.\u00a0 <\/span><\/span><\/p>\n<p><a href=\"https:\/\/spikes.be\/resultaten\/veiliger-werken\/\">Read more about our security approach<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Make cybersecurity a top priority. As for management and team. Invest in a good training on all levels and save a fortune on repair, lost data and loss of face. Make sure that\u00a0new employee gets training from its first day.\u00a0\u00a0 Inform about legal obligations. Create guidelines for the use of personal devices, passwords, USB-Sticks and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[166],"tags":[],"class_list":["post-1339","post","type-post","status-publish","format-standard","hentry","category-blog-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/posts\/1339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/comments?post=1339"}],"version-history":[{"count":0,"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/posts\/1339\/revisions"}],"wp:attachment":[{"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/media?parent=1339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/categories?post=1339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spikes.be\/en\/wp-json\/wp\/v2\/tags?post=1339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}