Stories are at the heart of every business Let us tell the world yours

Cyber Threat Protection Press Release

by Chris Fairbairn

Wednesday, February 17th, 2016

hackers SBRCA five point checklist has been created to help all Scottish businesses regain confidence and control of work mobile devices – and reduce the risk of becoming the next victim of a devastating cyber attack.

In response to the ever-spiralling use of mobile devices as essential work tools, the Scottish Business Resilience Centre has summarised the key points from an upcoming talk by renowned expert, Richard Hollis of Risk Factory, which will be presented at the Trading Securely for Business Cyber Conference, taking place at the National Museum of Scotland on March 9th.

The five measures are:

  1. Quantify – The first stage is to carry out an audit – how many devices have access to your system, and who controls them?

Who still has access to your system and is access always removed when an employee leaves the business?

It is vital to assess the current situation at the earliest stage, before adopting best practice.

  1. Create Policy – create a watertight policy on how work devices should be used or how people should access devices, i.e prohibit access to certain sites, servers or apps.

Is there a clear policy on what staff can do when using work and personal devices? This is not necessarily a censor, but to protect the system from negligence or devious cyber attackers infiltrating through unprotected channels.

  1. Configuration – configure devices with strong passwords and protection software – and regularly update them.

Do employees or systems have insecure passwords? All it takes is one person with a bad or obvious password for a seemingly secure system to be breached – putting personal and business data at risk.

  1. Encryption – Make sure devices are suitably encrypted.

Encryption protects data when sent and received, which creates a two-layer barrier above and beyond any current protection, limiting the ability of a hacker to access information

Recognised services such as Microsoft Office, Gmail and WhatsApp automatically protect your data in this way – as do some cloud services such as Dropbox.

  1. Be Alert – If something happens, have a plan of action – secure devices, change passwords and update any security software.

If anything suspicious or unusual is spotted make sure it is reported.

Actively keep to the best advised practice and carry out regular audits to ensure systems remain as safe as possible.

It is always advisable to stay abreast of developments in security and best practice advice from the SBRC.

For more information on Trading Securely for Business 2016 and to download the delegate and exhibitor packs, visit


Find out how your business could benefit from the expert PR services of our award winning agency

To find out how we can achieve results like this for you call us on 0131 561 2244 or fill in the contact

form below and we will get back to you.

Your Name (required)

Your Email (required)


Your Message

Chris Fairbairn of Scottish public relations agency, Holyrood PR in Edinburgh

Chris Fairbairn

Chris Fairbairn is an Account Director with award-winning public relations agency Holyrood PR. He is part of an expert PR team delivering PR services to a wide range of clients from headquarters in Edinburgh, Scotland.

View Chris's Profile

Related Posts


Keep ahead of your opposition by getting the free tips, insights and secrets we share for businesses. Straight to your inbox, every month.
Email address
First Name
Last Name