Stay up to date with the latest technology trends delivered straight to your inbox every month.


Cyber Security Advice: Risk Management (step 1)

bluegrass group

Cyber Security Advice: Risk Management (step 1)

The actions and measures detailed in each of these advice blogs collectively represent a good foundation for effective information risk management.  This blog focuses on managing the risk to your business of cyber attacks.


It’s best practice for a business to apply the same degree of rigour to assessing the risks to its information assets as it would to legal, regulatory, financial or operational risk.  This can be achieved without having time-consuming systems in place.  Implement a method of assessing and managing risk that’s supported by the Board, senior managers, and staff.  Sharing your approach to your employees ensures that they’re aware of risk boundaries and what to keep a watchful eye out for.

What’s the risk of not managing your security risks effectively?

  1. Increased exposure to risk
  2. Missed business opportunities
  3. Ineffective security policy implementation
  4. Poor reuse of security investment

How can you manage the risk?

  1. Establish a governance framework.  A governance framework needs to be established that enables and supports a consistent and empowered approach to information risk management across the business.
  2. Determine the business’s risk appetite.  Agree the level of information risk the business is prepared to tolerate in pursuit of its business objectives.
  3. Maintain the Board’s engagement with information risk.  The risks to the business’s information assets from a cyber-attack should be a regular agenda item for Board discussion.
  4. Produce supporting policies.  An overarching information risk policy needs to be created and owned by the Board to help communicate and support risk management objectives, setting out the information risk management strategy for the business as a whole.
  5. Adopt a lifecycle approach to information risk management.  The components of a risk can change over time so a continuous through-life process needs to be adopted to ensure security controls remain appropriate to the risk.
  6. Apply recognised standards.  Consider the application of recognised sources of security management good practice, such as the ISO 27000 series of standards.  This may not be suitable for all businesses.
  7. Make use of endorsed assurance schemes.  Consider adopting the Cyber Essentials Scheme.
  8. Educate users and maintain their awareness.  Provide appropriate training and user education that is relevant to their role and refresh it regularly.
  9. Promote a risk management culture.  Risk management needs to be business-wide, driven by governance from the top down, with user participation demonstrated at every level of the business.

As always if you need any advice please get in touch.



Complete the form and one of our team will be in touch.

Or view our calendar and book a call when it suits you.Book Date

If you want to speak to someone today, give our team a call on 01392 796 779. We'd be delighted to help.

Find out more about our IT support packages

To speak to us today simply call 01392 796 779
or complete the form below

Please enable JavaScript in your browser to complete this form.