This is the third in the series of Audit insights: cyber security reports. It focuses on the substantial gap in cyber security maturity levels caused by complex legacy IT environments and how business needs to adopt a smarter approach to cyber security laws and standards.
Find out whether you should consider encrypting your data, how encryption works in practice and what types of appropriate technical and organisational measures are common.
While the fundamentals on how to protect yourself, your business and your clients remain essentially unchanged, the context in which we write about them continues to shift. Cyber criminals are always finding new means of attack and we all need to keep up to keep them out.
This example password/pass phrase policy could be used by an organisation to help protect client and employee data. It is jointly published by ICAEW's Business Law and IT Faculty.
Features and articles
Find out what steps an organisation should consider taking if they have been the victim of a cyber attack.
Pillow May chartered accountant fell prey to the actions of a hacker over the summer. Jessica Pillow, managing director, explains how to avoid the same fate.
Top tips on practical considerations when implementing Robotic Process Automation, from finance professionals who have been piloting RPA in their organisations.
The National Cyber Security Centre explains the importance of government and industry working together to reduce the impact of cyber threats to the UK.
Technical helpsheet issued to help ICAEW members understand the requirements of the GDPR in relation to a data breach. Detailed guidance is available from the Information Commissioner’s Office (ICO).
Use of Cloud services continues to grow rapidly.
During the introduction of Making Tax Digital (MTD), ICAEW is sharing the latest information about the software that taxpayers and agents will need to keep digital records and to submit information to HMRC.
Standards and regulations
Cyber Essentials is a Government-backed and industry supported scheme to guide businesses in protecting themselves against cyber threats. Certification against this scheme is increasingly required for any company bidding for government contracts and sometimes their supply chain too.
Navigating the expanding landscape of information security standards can be a challenge. If you don't know your PCI DSS from your ISO 27001, Lesley Meall's at-a-glance guide can help.
The General Data Protection Regulation (GDPR) came into force on 25 May 2018. It applies to everyone trading within the EEA (including UK individuals and organisations).
Finance in a Digital World
ICAEW is collaborating with Deloitte to ensure its members and students have the knowledge and skills to take advantage of the opportunities offered by the fourth industrial revolution and to meet its challenges head on. Log-in to access exclusive content, including: eLearning, webinars and bite-sized summaries on individual technologies and the broader impact of digital technologies on finance.
Webinars and recordings
Stuart Jubb, MD of Consulting at Crossword Cybersecurity, and Nikki Cole, an experienced Non-Executive Director, discuss the processes that Boards should have in place to manage their cybersecurity risks.
Dr Jane Berney, Business Law manager at the ICAEW and Professor Jim Gee, Head of the Forensic and Counter Fraud Services Team discuss cybercrime and GDPR in the manufacturing sector
In this webinar, cyber security expert George Quigley, offers advice on how practitioners can keep their own data secure, plus what advice and services they could offer to their clients to help them keep their data secure.
The Library & Information Service provides a hand-picked collection of industry press articles as a benefit of membership. If you are unable to access an article, please see our Help and support or contact email@example.com
The article offers information on important points about mainframe security. Topics including the mainframes' mission-critical to several businesses and organizations, with 71 percent of the Fortune 500 storing countless instances of personally identifying information (PII), financial information, and health data on the systems, the conspiracy of silence around mainframe vulnerability disclosure, and the importance of automation to vulnerability management, are discussed.
The article focuses on the importance of understanding data assets and their value to attackers for effective cyber defence. It discusses why the security industry, and increasingly digital organisations must change the way they have approached information security. According to chief executive officer Mark Raeburn, the only real change is that there is already a lot more on the corporate IT network, with almost everything connected.
The article discusses several ways to protect corporate and personal data in the cloud. These ways include ensuring that the network perimeter is appropriately configured, setting guidelines for staff and upskilling them, and carefully choosing cloud software. It notes that hackers are getting more sophisticated and it can be hard to detect attacks.
The article offers information on the importance for businesses to report cyber crime. Data breach investigations show that some organizations can take months or weeks to discover a cyber attack, but some are identifiable such as ransomware and distributed denial of service attacks.
Government campaign to raise cyber security awareness. Gives advice on: protecting your device; protecting your data; and protecting your business.
Advice from the National Cyber Security Centre to help protect organisations against cyber attacks. There are three levels of engagement , two of which leads to accreditation for certified cyber security.
Practical guidance for organisations including 10 steps to cyber security. Also provides information on cyber security threats detected in the UK.
Free expert advice from the Government supported public/private partnership. Personal and business guidance is provided in areas such as hardware, information security, online safety and security, rules, guidelines and procedures, software and ways of work.
ICAEW accepts no responsibility for the content on any site to which a hypertext link from this site exists. The links are provided ‘as is’ with no warranty, express or implied, for the information provided within them. Please see the full copyright and disclaimer notice.
Email scams follow data hacks as surely as night follows day. And the Marriot/Starwood data breach case is just another in a very long line, says Leo Waldock.
The 2018 ICAEW Tax Faculty Conference was chaired by Mary Monfries and Frank Haskew. This article includes commentary from Nigel Holmes (Catax) on R&D tax relief and patent box; John Cassidy (Crowe Clark Whitehill) on HMRC enquiries; and practical points from the Tax Faculty team.
This month, technical expert Julia Penny tackles the confusion around how the General Data Protection Regulations work with money laundering rules.
What happens when data protection goes completely wrong? Leo Waldock answers this question by detailing how things went wrong for NCIX.
Good security practices
Information security is the branch of risk management that seeks to manage threats to organisational information. There are of course all kinds of information security risks. They all need to be assessed and businesses need to decide how to treat each one. This guide is solely concerned with the mitigation of information security risk.
As an auditor you face the challenge of addressing a burgeoning new form of service delivery that is not directly controlled by the organisation that has entrusted their data to the cloud. This helpsheet is intended to assist internal and external auditors to understand the risks associated with moving organisational activities to the cloud and scope a cloud-based services audit.
This guide is aimed primarily at SME organisations that need an overview of what BYOD (Bring Your Own Device) actually is, how it can be used to the organisation’s advantage and how to start developing their own BYOD and mobile strategy for using and managing mobile devices successfully within their business.
Resilience and recovery
In an IT world without obvious boundaries, Amar Singh explains how to avoid cybercrime and bounce back after an attack.
This article takes a timely look at the importance of IT Continuity Management and its relationship with Business Continuity Management (BCM), its corporate benefits, key business drivers and milestones in the process, the current threats to operations, and the impact it is having on the resilience agenda.
Risk and return
Kirstin Gillon reports from the second of our roundtable series on cyber security, with guest speaker Ian Livingston, exploring how boards are becoming more engaged in the need to protect their business.
With cyber attacks on the rise, the need for businesses to insure against threats is imminent. Arvind Hickman talks to the experts about why prevention is better than cure
In the first of a series of faculty roundtable discussions, information security professionals discuss how boards can help in the fight against cyber risk. This article first appeared in the September/October 2013 edition of Chartech Magazine.