Sirelark Divider Graphic
Divider graphic

Cyber Liability Toolkit

Businesses both large and small need to be proactive in order to protect against growing cyber-threats. As larger companies take steps to secure their systems, smaller, less secure businesses are becoming increasingly attractive targets for cyber-criminals.

This planning toolkit is designed to help employers protect their business, information and customers from cyber-threats. This guide is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. It is generally recommended that businesses using sophisticated networks with dozens of computers consult a cyber-security expert in addition to using this toolkit.

As you begin taking control of your cyber-liability, use the checklist at the beginning of the toolkit and revisit it as you progress. You will also find sample policies at the end of the toolkit to help you implement your cyber-liability initiatives.

Table of Contents

Getting Organised

Cyber-liability Toolkit Checklist ……………………………………………………………………….. 3-7

Understanding the Risks

Understanding and Responding to a Data Breach ……………………………………………… 8-10

Defining, Identifying and Limiting Cyber-crime…………………………………………………. 11-12

Spam, Phishing and Spyware Defined……………………………………………………………. 13-14

Identifying and Managing Your Exposures

Data

Keeping Your Data Secure …………………………………………………………….. 15-16

Physical Protection of Cyber-assets………………………………………………….. 17-18

Devices

Mobile Device Security………………………………………………………………….. 19-20

Safely Disposing of Your Device ……………………………………………………… 21-22

Systems

Network Security …………………………………………………………………………. 23-24

Website Security …………………………………………………………………………. 25-27

Protecting Your Email …………………………………………………………………… 28-29

Reducing Your Risks

Basic Loss Control Techniques ……………………………………………………………………. 30-31

Managing Password Threats ……………………………………………………………………….. 32-34

Policies to Manage Cyber-risk ……………………………………………………………………… 35-36

Protecting Against Online Fraud …………………………………………………………………… 37-38

Proper Employee Management to Reduce Occupational Fraud……………………………. 39-40

Sample Policies

General Email/Internet Security and Use Policy ………………………………………………. 41-47

Data Breach Response Policy………………………………………………………………………. 48-49

For the full toolkit, please email: info@sirelark.com

Latest blog posts