Watch on demand: Webinar looks at best practice to prevent and resolve cyber attacks

For public sector organisations, the coronavirus crisis has heightened the cybersecurity threats they have long faced – and created some new and complex challenges all of its own.

The risks presented by ageing legacy systems and technical debt were already well understood, but have become starker in light of the strain placed on resources by responding to the pandemic. Such risks have also been compounded and complicated by the widespread switch to home working. The increased sharing and analysis of sensitive data – particularly in support of Covid response – also creates potential major security dangers.

All the while, organisations’ biggest attack surface remains their people; a large proportion of successful attacks can be attributed to human error, with phishing emails an enduringly effective tool in the arsenal of cybercriminals.

The task faced in securing the likes of government departments, local authorities, schools, and NHS trusts may seem daunting. But programmes like the NCSC’s Cyber Essentials scheme have made it easier to understand where to begin and the most impactful actions to take, and how to perpetuate best practice throughout an organisation: from the chief executive to the front line, and from the datacentre to the desktop.

This webinar discussion, brought to you by PublicTechnology and Avast Business, looked at how public sector entities can take simple but significant steps to embed security across their operations, and why getting the basics right is the best defence against most attacks.

Discussion points included:

  1. How coronavirus has changed the cybersecurity threat landscape facing the public sector
  2. What are the major threats to be aware of
  3. What are the key considerations in ensuring your security technology is effective against these threats
  4. How can you encourage and ensure best practice among your workforce
  5. Using data safely, and the importance of encryption
  6. Dealing with issues caused by technical debt
  7. Using security as an enabler
  8. How threats – and the response to them – will evolve

 

Register to watch below

Please note that by accepting our terms and conditions you are agreeing to share your contact details with the author of this white paper, in accordance with our privacy policy published at http://www.dodsgroup.com/privacy-policy.

Tags

Categories

Related Articles

Home Office and BEIS first departments under the microscope in pilots of new independent cyber audits
16 January 2023

External supplier brought in to run the rule over government systems as rollout begins of ‘GovAssure’ programme

NCSC and law enforcement investigate major Royal Mail cyberattack
16 January 2023

Incident, which has been linked to Russian ransomware group, has left customers unable to send items overseas

NHS and HMRC among most-impersonated agencies by cyber-scammers
6 January 2023

Cyber intelligence unit reveals the government brands most often cited in attempted fraud and hacking

Government looks to boost resilience with new strategy and dedicated leader
3 January 2023

Existing initiatives in cybersecurity picked out as shining example of cooperation with commercial sector