Get started yourself with our help!
Fortunately, you don’t have to start from scratch without a foundation or help. There is a lot of material available online with sample documents, sample plans, Excel sheets, etc.
The EU has also understood that this will be a challenge for SMEs and has given a consortium of EU companies the necessary resources to help SMEs get up to speed. With CYSSME, we have developed a complete improvement programme for SMEs to get your SME up to speed, with the support of the EU.
This starts with two (self-)evaluations where you can assess your position against two lists of basic requirements. You can do this yourself for free online via this link.
Actually, you want to be sure of three things:
- That no one can view or read your most important business data >confidentialiteit
- That the processes and data in your systems are accurate and traceable> integriteit
- hat the applications and data are there when you need them >beschikbaarheid
Let me first debunk a few marketing myths about information security:
- Cybersecurity is not a hype du jour that will disappear soon and in which you should not invest too much time. Just as it is certain that we will all eventually die and have to pay taxes, keeping our digital life secure will always remain important and on the agenda. Just as you have to submit your VAT declaration or organize workplace prevention, you will also have to get your cybersecurity in order.
- There is no one who can offer you a magical solution that allows you to get this in order without effort, no matter how many euros you transfer to their bank account, how impressive the marketing is, or how many lights are on the box they sell to you. You can seek a partner to help you with your security or parts of it, but you will have to be the driver of your cybersecurity yourself.
- Last but not least: absolute security does not exist. There is no one who can offer you a 100% guarantee. Therefore, it is also very important to plan for when things go wrong, so that you can react correctly at that moment, limit the damage, and quickly get back to work. Intelligent companies do not plan so much only for cybersecurity but also strive to be cyber resilient. Cyber resilience is how well an organization can handle a cyber attack and how quickly it can function normally again afterward. And there is one certainty: you will be attacked and sometimes these attacks will be successful.
Nice blah blah and theory, but how do you actually put that into practice?
The very first, boring task is to make an inventory. An overview of everything you have within your organization in terms of devices, infrastructure, applications, processes, and data. Because if you don’t know what you all have, how can you ever secure it? So grab a sheet of paper (or an Excel sheet) and start listing as much information as possible. The second important step is to list what you must comply with as minimum requirements:- Legal requirements: the EU privacy legislation GDPR, the NIS2 stricter cyber rules, the Cyber Resilience Act in general, and specific requirements that your type of business or vertical in particular must comply with.
- Contractual requirements: what have you contractually promised to your customers? What agreements have you made with them?
- Desirable requirements: what does your organization itself expect as minimum requirements regarding, for example, the availability of applications.
- With all kinds of technical or practical solutions
- On paper with policies, good procedures and good (contractual) agreements
- With additional measures such as cyber risk insurance