This website uses cookies. View our cookie policy
Select regional store:

Getting Cybersecure

Cybersecurity involves far more than hardware and software. Cybersecurity should always be a business issue, not just an IT one: the board should be responsible and accountable for ensuring the organization’s cybersecurity strategy meets its business objectives. This requires competent people and effective processes in order to maximize the value of security technology.

The three fundamental domains of effective cybersecurity are: people, process, and technology. This page explains in further detail how domains are connected.

A cohesive cybersecurity approach

In order to achieve real cybersecurity, today’s organizations have to recognize that expensive software alone is not enough to protect them from cyber threats. For example, the deployment of anti-malware software requires people’s skills and has to be managed by a process. Organizations that fail to understand these interdependencies expose themselves to the growing threat of cyber attacks.

Merely trying to prevent cyber attacks is no longer a solution, either. Organizations need to be prepared to rebuff, respond to, and recover from, a range of possible attacks. This can only be achieved if people, process, and technology are taken into account.


People, Process, Technology Cyber Security Diagram


Assess your cybersecurity risk

There are ten key areas that should form part of an effective cybersecurity strategy. The principle of people, process, and technology also applies to these areas, which are as follows:

  • Board-led Information Risk Management Regime
  • Secure Home and Mobile Working
  • User Education and Awareness
  • User Privilege Management
  • Removable Media Controls
  • Activity Monitoring
  • Secure Configurations
  • Malware Protection
  • Network Security
  • Incident Management

You can begin your planning by assessing your organization’s cybersecurity stance. This can be done by a cybersecurity risk assessment, which will enable you to identify your weakest areas. A risk assessment looks at what might happen, works out the probabilities and the impacts, and then selects controls to deal with it. It is a classic example of the connectivity between people, process, and technology.

You can use existing cybersecurity standards and frameworks such as ISO/IEC 27001 to achieve cybersecurity. IT Governance provides a wide range of products and services that will help you do this effectively.

See what cybersecurity products and services are available to you >>