Risk and micro, small business
Risk; why is it so difficult?
Information security risk management, or if you wish cyber security risk management; either way it appears to cause a bit of a problem.
Over many years now I have seen and audited different concoctions, the majority of which fail completely to be effective in managing the risk.
That said, I have also seen some scarily good processes, many of which are application driven rather than spreadsheet driven. This is an out and out plug, but the best and most effective examples have usually be driven by Acuity Risk Management's Stream application.
However, for the micro or small business the best approach is to keep things simple, for the moment at least.
- Risk description - there are excellent definitions for risk published within various ISO documents. However it all boils down to the following:
- Source (what is the source of the thing that could happen - internal or external parties)
- Event (what is going to occur)
- Cause (why could it happen), and
- Consequence (what is the likely negative outcome to the business objectives).
- Example - a member of staff (source) accidently clicks on a link within an email that results in data being encrypted (event) due to the lack of training/awareness/admin/technical measures being in place (cause), resulting in a loss of availability of data, potential loss of reputation, regulatory fine and so on (consequence).
- Example - the MD decides to negotiate with a script kiddie (criminal) to reduce the ransom following a successful ransomware attack, resulting in the business now being tagged as an easy mark that could result in even further damage to the reputation of the business.
- You decide the source, the event, the cause, and the consequence.
In simple risk based terms then:
- Walk through some scenarios to describe risk, then
- Identify ways (measures) in which as a business the event, the cause, and the consequences can be reduced to a minimum (acceptable to your business and its context). These measures, by the way, will be administrative, physical and technical in nature,
- Where practicable put the measures in place (and review them every now and again to ensure they remain effective).
- Make sure that everything is documented; fire up a word processor or similar. Keep a record of what it is the business has done, it may be very useful in the future.
What you do not want to do is:
- Put measures in place (especially high cost technical measures; the ubiquitous magic box) until you can describe the risk to the business, and able to justify the spend.
Will the above simple process make you UK-GDPR (DPA2018) or EU-GDPR (it had to be said) compliant. No! It will certainly help, yes, but fully compliant. No! If the worst were to happen and despite your best efforts the business suffered a personal data breach, the documented actions that you have put in place, might help if the regulator (ICO) comes a-knocking.
If you need help or simply some guidance let me know
If you need help or simply some guidance let me know
KanSecurity (NL)