Cyber Security Tips

Individual Level

Cyber security concerns everybody, every one of us is exposed to cyber security risks when we go online. Here are some tips for cyber security at the individual level:

  1. Email and Password Security
  2. Computer System Security
  3. Tips for Using Public Wireless Services

Suggested Link
InfoSec 'Protecting Your Computer'
http://www.infosec.gov.hk/
english/computer/computer.html

Small and Medium Enterprises

Small and Medium Enterprises are suggested to implement the following cyber security measures within your company: -

  1. Asset Security: Devise standing procedure for the collection, handling and protection of critical data. Each priority item should be guarded, tracked and encrypted.
  2. Information Systems and Related Architecture Security: Conduct regular scans for system vulnerabilities and apply remedial actions as soon as practically feasible. Build information systems and related architecture that continue to deliver the required functionality in the face of threats that may be caused by malicious acts, human error, hardware failure and natural disasters.
  3. Communication and Network Security - Implement security mechanisms, such as firewall, intrusion detection/prevention systems, at the network gateway for protecting the network against external attacks. The settings on each communication and network device must be subject to centralized management and enforcement.
  4. Identity and Access Management – Implement meticulous systems to identify the people and manage their permissions. Conduct periodic review of staff access permissions to establish or re-establish eligibility, based on individuals' work responsibilities. For example, revoke all access and accounts of a staff that had left the organization or transferred to other unit of the organization.
  5. Incident Response - Periodically review logs and audit trails on computer / network equipment for anomalies and possible attacks. Implement automated system and intelligent analytics to monitor system operations. Establish rapid response protocols and automated response capabilities to promptly deal with security incidents including suspicion of intrusion.
  6. Risk Management Culture: Conduct periodic risk assessment and review to ensure cyber security risks are properly managed. Build a risk-aware culture and then spread the message throughout the entire organization.

Suggested Links: -

  1. Cyber Security Information Portal '8 Security Essentials for Managing Business Operations'
    http://www.cybersecurity.hk/en/
    expert-2015-9-7-8-security-essentials
    -for-managing-business-operations.php
  2. InfoSec 'Protecting Your Business'
    http://www.infosec.gov.hk/
    english/business/security.html