Cybersecurity Approach

All services offered by nubesec utilise a business risk based approach to ensure that information security is addressed in line with the business objectives and strategy. Our cybersecurity approach is tailored to each individual business ensuring that security is implemented in a balanced sustainable approach.

Approach to cybersecurity

approach to cybersecurity

Throughout our service offerings elements of this approach will be evident. Whether your business is looking to migrate to the cloud or already there our cybersecurity approach is geared to follow a five-stage framework.

Our philosophy at nubesec is to make cybersecurity accessible for all type of business big or small, the only difference is a matter of scale. Our trusted advisors are skilled professionals who follow the cybersecurity framework below to determine what is right for your business. Whilst, each business is different, the cyber threat remains the same and the impact is variable dependent on the nature of the business.

Review our cybersecurity framework and get in contact to see how we can help your business protect your key assets from the growing cyber threat.

Cybersecurity Approach Framework

Our approach to cybersecurity is to utilise industry best security practices and tailor it to an approach which works for the small to medium sized business. This breaks down to the following five stages:

Understanding what and where your key assets are located is the first stage in the nubesec cybersecurity approach, as it's important to ascertain the criticality, sensitivity and business value before deciding what level of protection is required. The core areas being assessed during this phase include the following:

  • Asset Management;
  • Business Environment;
  • Governance;
  • Risk Assessment; and
  • Risk Management Strategy.

Having reviewed these categories its possible to determine what additional measures (if any) are needed to protect the key assets of the business.

Having completed the identification stage, a level of understanding now exists where key assets have been analysed. This provides valuable information to determine the threat to the business and what action is appropriate to handle the risk. The protection of these assets can be achieved in various ways however, the core areas would generally include the following:

  • Access Control;
  • Security Awareness Training;
  • Data Security;
  • Information Protection Processes and Procedures;
  • Maintenance; and
  • Protective Technology.

With protection measures now in place the business needs to ensure that any anomalies and security events are detected as early as possible. Defining a baseline of data flows is required to ensure that correlated events, alerts and thresholds are accurately reported upon when monitoring the network for malicious code, unauthorised code and unauthorised activity events.

All detection processes are also defined, communicated and tested ensuring all relevant personnel are aware of their roles and responsibilities.

Responding to any security event is key to effective containment and starts with a response plan. This will ensure response activities are communicated consistently and processes are executed during and after the occurrence of a security event. This leads to the analysis of each event, which are investigated and assessed against the impact to the business, before incidents are contained and mitigated.

Irrespective of the outcome, all security incidents are reviewed to understand where improvements can be made and how to enhance the effectiveness of future responses.

The final phase is all about recovery planning and restoration of systems after a security event has been contained and mitigated. Process improvements may also be needed based on the lessons learned from the previous phase so its important these are completed and communicated to all interested parties once services and systems have been restored.