135 Pages

You can change the print size of this book

Easy Steps to Managing Cybersecurity

Gain access to the library to view online
Learn more


An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats.

Providing an insight to the extent and scale a potential damage could cause when there is a breech in cyber security.  It includes case studies and advice from leading industry professionals, giving you the necessary strategies and resources to prevent, protect and respond to any threat:
  • Introduction to cyber security
  • Security framework
  • Support services for UK public and private sectors
  • Cyber security developments
  • Routing a map for resilience
  • Protecting financial data
  • Countermeasures to advance threats
  • Managing incidents and breaches
  • Preparing for further threats
  • Updating contingency plans


Not so long ago, looking after national security was an exclusive government responsibility. The digital age has changed that – and permanently. These days it is not just the organs of the state and its infrastructure which are the direct object of cyberattack, it is also the private sector, and at all levels. Individuals and corporate entities have of course always been expected to take reasonable precautions against crime but in the past they have not been called upon to be active players in helping create the framework for secure conditions. But as the private sector is both victim and solutions provider, partnership with government in combatting cyber predators on the economy and security of the nation has become essential. Indeed, it is not too much to say that good cybersecurity and cyber resilience have become a duty for the corporate sector to which these essays are addressed.

  But, as the authors point out, not everyone has got the message. As three of them put it: “there is a schism between the reality of cybersecurity risk and the number of businesses engaging sufficiently seriously with the threat”. Better reporting of breaches may account for some of the estimated rise in the huge losses attributable to cyber crime but, however one reads the figures, there is only one conclusion to draw: we are currently losing the battle. The types of actors, their motives and their modus operandi vary, but they all have the following features in common: stealth in breaking in, difficulty of detection and attribution and, in consequence, a high likelihood of success at low cost.



Published by
Published 24 September 2018
Reads 0
EAN13 9781787197954
Language English
Document size 1 MB

Legal information: rental price per page 0.0500€. This information is given for information only in accordance with current legislation.