Watch on demand: Webinar looks at best practice to prevent and resolve cyber attacks

For public sector organisations, the coronavirus crisis has heightened the cybersecurity threats they have long faced – and created some new and complex challenges all of its own.

The risks presented by ageing legacy systems and technical debt were already well understood, but have become starker in light of the strain placed on resources by responding to the pandemic. Such risks have also been compounded and complicated by the widespread switch to home working. The increased sharing and analysis of sensitive data – particularly in support of Covid response – also creates potential major security dangers.

All the while, organisations’ biggest attack surface remains their people; a large proportion of successful attacks can be attributed to human error, with phishing emails an enduringly effective tool in the arsenal of cybercriminals.

The task faced in securing the likes of government departments, local authorities, schools, and NHS trusts may seem daunting. But programmes like the NCSC’s Cyber Essentials scheme have made it easier to understand where to begin and the most impactful actions to take, and how to perpetuate best practice throughout an organisation: from the chief executive to the front line, and from the datacentre to the desktop.

This webinar discussion, brought to you by PublicTechnology and Avast Business, looked at how public sector entities can take simple but significant steps to embed security across their operations, and why getting the basics right is the best defence against most attacks.

Discussion points included:

  1. How coronavirus has changed the cybersecurity threat landscape facing the public sector
  2. What are the major threats to be aware of
  3. What are the key considerations in ensuring your security technology is effective against these threats
  4. How can you encourage and ensure best practice among your workforce
  5. Using data safely, and the importance of encryption
  6. Dealing with issues caused by technical debt
  7. Using security as an enabler
  8. How threats – and the response to them – will evolve

 

Register to watch below

Please note that by accepting our terms and conditions you are agreeing to share your contact details with the author of this white paper, in accordance with our privacy policy published at http://www.dodsgroup.com/privacy-policy.

Tags

Categories

Related Articles

MoJ reprimanded by ICO after ‘bags of confidential documents’ exposed for over two weeks
25 May 2023

Sensitive data was left unsecured in prison holding area, according to data watchdog

‘Extremely concerned and disappointed’ – more councils caught up in Capita breach
24 May 2023

Authorities have complained about the lack of time taken to be notified by IT firm and wrongly being told personal data was not put at risk 

MoD seeks senior exec to boost ‘cyber awareness, behaviours and culture’ across defence sector
23 May 2023

Role comes with a remit to work with current and former military personnel, as well as officials and commercial suppliers

Interview: CDDO chief Lee Devlin on the ‘move from being disruptive to collaborative’
23 May 2023

In the first of a series of exclusive interviews, the head of government’s ‘Digital HQ’ talks to PublicTechnology about the Central Digital and Data Office’s work to unlock £8bn...