Streamline your cloud experience and maximise your cloud investment with Microsoft Azure-aligned public cloud services.
Host all of your workloads in the most appropriate location while experiencing the simplicity of one cloud from Six Degrees.
Enhance your cyber security and safeguard your organisation with our cyber security strategy and advisory, consultancy, and managed services.
Connect your business through a comprehensive connectivity portfolio delivered via our owned and operated core Next Generation Network (NGN).
Secure your productivity on any device, anywhere, any time.
Streamline your hosting with comprehensive colocation services delivered from three UK data centres.
Gain clarity and control of your 5G estate, ensuring ongoing cost efficiencies are managed on your behalf through our managed service.
Gain confidence in your cloud direction and achieve accelerated time to value through our assured and optimised cloud services.
Master today’s complex threat landscape and protect your business with our intelligence-led security services.
Videos and webinars are a great way to digest the latest technology insights.
Our eBooks and whitepapers provide in-depth insights from our experts.
Our thought leaders publish regular blogs on up-to-the-minute topics.
Learn all about the latest news from Six Degrees as we continue to evolve.
We host regular in-person and virtual events for our clients.
Discover how Six Degrees has driven success for others.
Learn how we enable our clients to achieve more; providing superior secure solutions, powered by our passionate people.
We are proud to partner with many of the world’s leading vendors, enabling you to leverage our continual investment in difference-making technology.
Learn how CNS at Six Degrees delivers intelligence-led security services that protect organisations in today’s hostile landscape.
We are committed to operating in an environmentally and socially conscious way. Learn more about our commitments as a business.
We are proud of our secure cloud credentials. Learn why we’re one of the most highly accredited providers in the UK.
We are a friendly and passionate bunch here. Whether you want to work with us or for us, we think you’ll enjoy the Six Degrees experience.
Home » Blogs » Cybersecurity Insights: The Importance of Asset Management
At Six Degrees we work with regulated firms throughout the finance sector to help them improve their cybersecurity postures. We’re operating in a commercial climate where cybersecurity is becoming an important decision making factor, as organisations don’t want to engage with third parties that have the potential to introduce risk. Robust cybersecurity makes sound business sense – to fail to address your organisation’s cybersecurity posture is to risk significant commercial disadvantage.
The FCA recently published an industry insights document that aims to improve cybersecurity practices amongst regulated firms. In our previous blog we expanded upon the FCA’s guidance on how to implement cybersecurity governance best practices. For this next blog in the series, we delve into the FCA’s guidance around identifying what you need to protect: consider what you need to know. This means talking about asset management – an essential element of you organisation’s cybersecurity posture.
An information asset is essentially any form of data that an organisation owns. This is not only written information that is stored on a file server or written on a piece of paper; it can also be the content of meetings, conversations, voicemails, messages or social media posts. As information comes in so many forms, it is important that information assets are handled with care.
Not all information should be treated equally. This could result either in data getting into the wrong hands, or your organisation not working as efficiently as it could. All data needs to be categorised, in order to ensure that information assets are handled in an appropriate manner. To illustrate this, consider the following two examples:
In order to maintain a robust cybersecurity posture, all data needs to be handled in an appropriate manner that minimises the threat of accidental or malicious breach.
All information assets are classified in terms of their confidentiality, integrity and availability:
A threat is a potential cause of an unwanted incident, which may result in harm to a system or organisation. Threats to information assets are based on three areas:
All of your information assets need to be owned by individuals within your organisation. The asset owner will take responsibility throughout the information lifecycle: asset creation, processing, storage, transmission and destruction.
An organisation’s asset management approach is defined by its Information Asset Register (IAR). Information assets should be divided into different groups of classification. These groups estimate potential risks, and verify which individuals will have access to the information assets.
IARs keep track of an organisation’s information assets, along with what level of security is needed for individual assets. In an IAR, an owner is determined for each individual asset. This owner will ensure that the asset is secured. The information asset owner should understand the asset’s value within the organisation. If an IAR is kept up-to-date, it will greatly increase the security of an organisation’s information.
Asset management is a key aspect of any organisation’s cybersecurity preparedness, but the truth is that staying safe from cyber-threats is a constant challenge. If you’re keen to benchmark your firm’s cybersecurity preparedness, take our cybersecurity quiz. It only takes five minutes, and will give you a snapshot of where you are and what steps you can take to improve your cybersecurity posture.
Foreign exchange company Travelex has become the latest high-profile victim…
Every business needs to protect its information assets from accidental…
More information on our Privacy and Cookies Policy can be found here: https://www.6dg.co.uk/privacy-cookies/. You can update how we contact you in the future by visiting our Communications Preference Centre here: https://www.6dg.co.uk/preference-centre/.