{"id":6581,"date":"2020-09-21T11:42:27","date_gmt":"2020-09-21T11:42:27","guid":{"rendered":"https:\/\/outofsite.biz\/cynance\/?p=6581"},"modified":"2021-02-17T10:31:15","modified_gmt":"2021-02-17T10:31:15","slug":"cybersecurity-for-startups-essentials","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/cybersecurity-for-startups-essentials\/","title":{"rendered":"Cybersecurity for Startups: Getting the Essentials Right"},"content":{"rendered":"\n

Starting a new business is a crazy time. Your \u2018to do\u2019 list grows longer, not shorter, and you have so many important priorities to focus on that you simply don\u2019t know which one to pick first. But you are getting there, and you can see a bright rosy future ahead of you. And that would make now exactly the right time to focus on something you may not have thought of yet, your cybersecurity posture.<\/p>\n\n\n\n

We\u2019ve pulled together this introduction to the essentials of cybersecurity for startups to help you begin your journey.<\/p>\n\n\n\n

Why cybersecurity for startups is so important<\/h2>\n\n\n\n

Data protection and information security<\/strong><\/p>\n\n\n\n

The protection and security of user, partner, or customer data and information is your responsibility. If there is a breach of the security around that data, you, the individual, the managers, the employees, the entire company are held responsible, with potentially damaging implications for your business. You never know when a breach will hit you, and it will always seem to happen at the worst possible time, but a good plan will help you manage it with minimal disruption to your business.<\/p>\n\n\n\n

Customer perception and growth<\/strong><\/p>\n\n\n\n

Taking a smart approach to your cybersecurity planning is an investment in your company\u2019s future. By having a plan in place, you show your investors, partners, and customers that you have taken steps to ensure that your entire business is as secure as can be and can be trusted with their business.<\/p>\n\n\n\n

Regulation and compliance<\/strong><\/p>\n\n\n\n

The GDPR introduced a regulatory revolution, placing real importance on data protection best practices, and introducing heavy fines to transgressors. In just over two years since it was passed, the EU has shown that GDPR is here to stay, and compliance with these best practices is a must.<\/p>\n\n\n\n

These regulations also provide a framework for companies who are looking for new service providers. Many companies will look at your company\u2019s security and data protection policies when they are looking for a new service provider. You need to demonstrate your compliance in order to even be considered by them.<\/p>\n\n\n\n

Invest in cybersecurity for startups early and strategically<\/h2>\n\n\n\n

It\u2019s never too early to invest in improving your cybersecurity posture, and it may even save you time, money, and energy down the line. As a startup you are familiar with the need to prioritise, and stretching your limited resources between quick wins and must haves. <\/p>\n\n\n\n

Investing resources in cybersecurity for startups is the same as investing in any other part of your business: it\u2019s not how much<\/em> you invest in cybersecurity that yields the best results, it\u2019s when and how <\/em>you invest. The later you leave it to invest in comprehensive cybersecurity for your startup, the more it will cost, and the more complex it will be to get it right.<\/p>\n\n\n\n

\"\"
Strategy prioritisation matrix<\/figcaption><\/figure>\n\n\n\n
\"\"
The law of diminishing returns<\/figcaption><\/figure>\n\n\n\n

Creating your cybersecurity policies<\/h2>\n\n\n\n

The starting point for any startup implementing a cybersecurity for startups strategy is the policies you set for the company, and the practices you put in place to create a cybersecurity culture.<\/p>\n\n\n\n

Policies set out your intentions for cybersecurity across the entire organisation. The policies you create set the foundations for your information security programme. They set out the Dos and Don\u2019ts for employees, managers, and clients alike to understand your company\u2019s commitment towards information security and data protection. They allow you to address threats, engage and educate employees, and set controls.<\/p>\n\n\n\n

Your cybersecurity policy will typically be made up of several different policies as many regulations and standards, such as the GDPR, ISO 27001 or SOC2 require you to have certain policies in place, and there may be other policies that you require for your own business. Just some of the many policies you need to have include: Information Security Policy, Acceptable Use Policy, Data Retention Policy, External Party Management Policy, Incident Response Policy, and more.<\/p>\n\n\n\n

Proactive cybersecurity for startups<\/h2>\n\n\n\n

Offence is the best form of defence, and that is definitely true when it comes to your cybersecurity programme. By taking a proactive approach, your cybersecurity posture will immediately be in a much better place. The practices you put in place are how you will achieve your policies and obtain a cyber secure culture. They are the programmes, software, training that you implement in order to protect data and apply information security. Even before you have defined your most important assets, the \u2018crown jewels\u2019 of your company, you can apply quick wins for general cybersecurity. <\/p>\n\n\n\n

Proactive cybersecurity for startups measures include:<\/p>\n\n\n\n

Assess your systems for security vulnerabilities (Penetration test<\/a>)<\/strong><\/p>\n\n\n\n

Bring in an independent testing partner to assess your networks and applications for vulnerabilities. In many cases the testing partner can also support you to create plans to remediate these vulnerabilities, and some companies can even help you implement those plans. A professional security review carried out by an independent third party will help you reassure your clients that your applications, systems, and infrastructure are secure.<\/p>\n\n\n\n

Vulnerability management and patching<\/strong><\/p>\n\n\n\n

Proactively checking for, identifying, and mitigating IT vulnerabilities across your network, and preventing them from being breached. Remember – some of the worst recorded security breaches were caused by poorly configured systems or when administrators kept the default system permissions!<\/p>\n\n\n\n

Endpoint security<\/strong><\/p>\n\n\n\n

Employee laptops and production servers can both be weak links in your networks. By adding the appropriate security software to each and every machine, you can compensate for human error, and significantly reduce security risks, such as ransomware entering your networks and harming your data or users, even in the event of human error.<\/p>\n\n\n\n

Infrastructure security<\/a><\/strong><\/p>\n\n\n\n

It is worth your while to take steps to create a secure configuration that supports your security objectives. Support your infrastructure security by applying best practices in your devops, such as patch management and secure architecture practices to ensure that everything is working as intended, and you are made aware as soon as it is not; using logging and monitoring technologies and processes to track and store data and be alerted when something goes wrong; and applying effective security by design principles to configuration management, passwords and secrets.<\/p>\n\n\n\n

Security awareness training<\/strong><\/p>\n\n\n\n

Carry out regular training sessions to support your employees to adopt security working practices. Human error is often the cause of cybersecurity breaches, and it is important that you arm every single member of your team with basic information security and data protection knowledge so that they can support your efforts to meet customers\u2019 security requirements, and achieve compliance with security standards, data protection regulations and acts.<\/p>\n\n\n\n

Planning your response to an attack<\/h2>\n\n\n\n

Sadly, it is usually not a question of \u2018if\u2019, but of \u2018when\u2019 will a cybersecurity breach happen. Proactive security is there to ensure that the \u2018when\u2019 happens less often, and is less severe when it does happen, but attackers are always looking for the smallest opportunity to attack. <\/p>\n\n\n\n

Failing to plan for an incident is planning to fail, and it is therefore vital that you have a good incident response plan in place for such an eventuality. Incident response plans help you address incidents including malicious attacks, data breaches, data loss incidents, and more. They contain the instructions to help your team identify the problem, contain it, eradicate the threat, recover any lost data, and set out a framework for learning how to prevent an attack like this from happening again. It should be a living document that is reviewed regularly to ensure that everyone knows what to do in the event.<\/p>\n\n\n\n

Incident response plans (and their current relevance to your company) are also super important to your customers who are looking for reassurance that you will be on top of any kind of incident. <\/p>\n\n\n\n

Data protection<\/h2>\n\n\n\n

Data protection regulations such as the GDPR in the European Union, or the California Consumer Privacy Act (CCPA) in the United States have changed the discussion around data privacy, placing new requirements on every company who processes data within their geographic boundaries or for their citizens wherever they may be in the world.<\/p>\n\n\n\n

These regulations place many requirements on you, but we suggest the following GDPR inspired activities as a good place to start:<\/p>\n\n\n\n

Data mapping<\/strong><\/p>\n\n\n\n

For most of you, data is the \u2018new oil\u2019. Data is the most valuable resource you have, enabling you to add value to your customer, whatever your business is. The GDPR requires you to properly document your every data processing activity, from collection, to retention, sharing and eventually, disposal.<\/p>\n\n\n\n

Data protection impact assessments (DIPA)<\/a><\/strong><\/p>\n\n\n\n

The GDPR also requires you to carry out periodic assessments evaluating how your business protects personal data, identifying and minimising the data protection risks of projects and reducing risks for the entire organisation.<\/p>\n\n\n\n

Appoint a Data Protection Officer (DPO)<\/strong><\/p>\n\n\n\n

The GDPR again requires you to appoint an official data protection officer who will lead your company\u2019s data protection activities, and act as the point of contact for all internal and customer data protection queries.<\/p>\n\n\n\n

GDPR gap analysis<\/strong><\/p>\n\n\n\n

If you operate within the territories covered by the GDPR, and you utilise personal data to drive your business, you should carry out a GDPR gap analysis to ensure that you are fully compliant with all of the regulation\u2019s requirements. If you don\u2019t align with any of these requirements, you are in infringement of the law, and could end up having to pay a fine, or losing business opportunities. Many countries across the EU have made it clear that they are very ready to hand out these fines, so make sure you have everything in order.<\/p>\n\n\n\n

Creating an effective cybersecurity plan for your startup<\/h2>\n\n\n\n

Investing more in security does not necessarily mean investing better, as at some point your returns on security investment (ROSI) will decrease. How and why this happens is a discussion for another time, but the bottom line is that you need to invest smartly in your cybersecurity.<\/p>\n\n\n\n

\"\"
Thank smart and don’t accept diminishing returns<\/figcaption><\/figure>\n\n\n\n

Customer expectation and compliance frameworks have placed the responsibility for your company\u2019s cybersecurity firmly on your shoulders. The buck stops with you, and you can\u2019t pass the responsibility to an employee or external service provider. As a startup leader, you have to be on top of how your business processes and secures clients\u2019 data.<\/p>\n\n\n\n

At Cynance<\/a>, we pull together our years of cybersecurity for startups and data protection experience to help support start ups just like yours to put in place the culture, policies, practices and mindsets necessary to effectively secure your business. The responsibility for data protection and information security may seem like a daunting task, but we are here to support you every step of the way.<\/p>\n\n\n\n

Wishing you a safe and secure future. Stay safe.<\/p>\n","protected":false},"excerpt":{"rendered":"

Your startup is up and running, but how secure are you? Begin your cybersecrurity journey with our introduction to the essentials of cybersecurity for startups.<\/p>\n","protected":false},"author":10,"featured_media":6585,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[61,59,58],"_links":{"self":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/6581"}],"collection":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/comments?post=6581"}],"version-history":[{"count":0,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/6581\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media\/6585"}],"wp:attachment":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media?parent=6581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/categories?post=6581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/tags?post=6581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}