© Systems AXIS Limited,
axisfirst is a trading style of Systems AXIS Ltd. Head Office: AXIS House, 53/55 St Mary Street, Bridgwater, Somerset, TA6 3EQ. Registered Company 2370905 | VAT No. GB 515 8599 12
Cyber security is constantly evolving and is a key component of GDPR compliance.
With the entire world online, there are hordes of opportunistic hackers looking to harvest financial and personal data from reputable businesses like yours.
Block the cyber threats that could lead to data breaches and know where personal data can be breached within your environment & team.
Conduct an exit interview with departing employees
Check for personal data in belongings - Names / Addresses / Numbers / Emails
Remember to remove their personal data from your system
Ensure confidential documents are destroyed securely not left in a bin
Train staff in handling personal data
Have a clear retention policy
Consider before giving personal details online, check hyperlink is genuine
Ensure website is secured with padlock and HTTPS:\\
Provide adequate cyber awareness training to ALL Staff
Ensure personal data is not on public display when unattended
Lock cupboards, cabinets and drawers containing personal data
Remove public facing contact and telephone lists
Ask yourself... is it your information to share?
Consider who else is listening
Always lock your computer screen when away from your desk
GDPR brings tighter controls on sharing personal data, think before talking about individuals
Company information is commercially sensitive or intellectual property, should it be given away freely?
Provide employees with training around handling company data / secrets
Have a data retention policy which states how long paper records are kept
Ensure sensitive / personal data is destroyed securely
Notify data subjects that their information has been destroyed
Raise IT equipment up off the floor to protect against flooding and make sure the room is well ventilated
Ensure you implement an offsite backup strategy as well as an onsite backup as part of your disaster recovery plan
Consider scanning your paper documents into digital form to reduce the risks of fire or flood damage
Implement device management tools to remote wipe lost or stolen devices
Ensure devices are locked down with appropriate security and authentication tools
Consider whether personal data is stored on mobile devices and what your business controls are
Assign appropriate permissions for the roles of your users
Apply security policies which may include disabling USB ports on certain devices
Ensure job roles and responsibilities are updated to include the handling of personal data
Make it clear what you are storing, what it will be used for and how long for when obtaining personal data
Display your privacy statement both online and for visitors to your premises
Don't hold onto data just because, consent can be withdrawn and people have a right to be forgotten
Free vulnerability scan is limited to 1 free test per company and will be conducted on a single public facing static IP address.
There are 100 free tests up for grabs and will be on a first come first serve basis.