
Sign up to save your podcasts
Or


Cyber Security Best Practices, What are they? | Data Defender
On this episode of Data Defender we discuss identifying the top five critical processes for your business. Hi my name is Renee Jones, owner of Defense-In-Depth. Welcome to Data Defender where our mission is to drive growth and revenue by reducing your vulnerabilities and risk and implement cybersecurity best practices. These best practices can also be used with the CMMC certification. Today we will identify the top five critical processes for your business. In 2018 I worked with an agency to identify those processes that if compromised would bring their revenue down 70%. In 2019 I worked with an organization that identified processes that would affect their revenue. The CMMC also identifies tasks that businesses should implement to identify those top critical processes. In order to identify your top five critical processes. The first and most important thing is to work with your team those end-users who are on the frontlines working with those applications processes and systems to determine what they do, how they drive revenue and from that information your team will be able to identify which of the processes are actually the most critical. Second, you would want to understand your user roles in those processes. Separation of duties is extremely important in this case. You want to make sure that your end-users are performing their duties and responsibilities in order to get the best out of your application systems and processes. Third, the value that comes out of identifying your top five critical processes is to give the information to your disaster recovery team or a third party were you are backing up your data. Your third party or the entity that is responsible for recovery of your data in the event of a breach or a compromise can now use this information to prioritize which processes will come online 1st, 2nd, 3rd, 4th and 5th.
By Renee JonesCyber Security Best Practices, What are they? | Data Defender
On this episode of Data Defender we discuss identifying the top five critical processes for your business. Hi my name is Renee Jones, owner of Defense-In-Depth. Welcome to Data Defender where our mission is to drive growth and revenue by reducing your vulnerabilities and risk and implement cybersecurity best practices. These best practices can also be used with the CMMC certification. Today we will identify the top five critical processes for your business. In 2018 I worked with an agency to identify those processes that if compromised would bring their revenue down 70%. In 2019 I worked with an organization that identified processes that would affect their revenue. The CMMC also identifies tasks that businesses should implement to identify those top critical processes. In order to identify your top five critical processes. The first and most important thing is to work with your team those end-users who are on the frontlines working with those applications processes and systems to determine what they do, how they drive revenue and from that information your team will be able to identify which of the processes are actually the most critical. Second, you would want to understand your user roles in those processes. Separation of duties is extremely important in this case. You want to make sure that your end-users are performing their duties and responsibilities in order to get the best out of your application systems and processes. Third, the value that comes out of identifying your top five critical processes is to give the information to your disaster recovery team or a third party were you are backing up your data. Your third party or the entity that is responsible for recovery of your data in the event of a breach or a compromise can now use this information to prioritize which processes will come online 1st, 2nd, 3rd, 4th and 5th.