Artwork

Content provided by James Eling. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by James Eling or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

11 - Cyber Incident Response Planning for Small and Medium Sized Businesses

29:30
 
Share
 

Manage episode 468803714 series 3559560
Content provided by James Eling. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by James Eling or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
A Cyber Incident can be an intimidating process for any business owner and management team. Sadly, Cyber Incidents, especially email attacks are increasing. This episode looks at Cyber Incident Response planning specifically from the point of view of a Business Owner. What are the steps you can use to make the process easier.
  • We discuss the PICERL methodology. Preparation, Identification, Containment, Eradication, Recovery and Lessons Learnt.
  • The most important part of the process is preparation. Without it, the rest of the process is a lot more difficult.

This podcast has a range of lessons for SMEs looking to prepare for a Cyber Incident and work towards making sure that the process is managed to the best of the ability of your company.

Have a listen and find out the steps you can take before an incident to prepare for a cyber incident.

Check out the free ACSC Essential 8 self assessment audit tool. After completing the audit, you will be have a bespoke action plan, based on your type of business and your current security measures to achieve the right ACSC Maturity Level for your business.

Cyber Security 4 Small Business is a set of resources to help small business owners understand the Cyber Threat and be able to defend their network in the most cost-effective way possible.

We believe that 95% of Cyber Security and Cyber Resilience can be achieved through good systems administration and good processes, without all the expense of engaging cyber security experts.

Check out the show notes for this episode.

  continue reading

12 episodes

Artwork
iconShare
 
Manage episode 468803714 series 3559560
Content provided by James Eling. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by James Eling or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
A Cyber Incident can be an intimidating process for any business owner and management team. Sadly, Cyber Incidents, especially email attacks are increasing. This episode looks at Cyber Incident Response planning specifically from the point of view of a Business Owner. What are the steps you can use to make the process easier.
  • We discuss the PICERL methodology. Preparation, Identification, Containment, Eradication, Recovery and Lessons Learnt.
  • The most important part of the process is preparation. Without it, the rest of the process is a lot more difficult.

This podcast has a range of lessons for SMEs looking to prepare for a Cyber Incident and work towards making sure that the process is managed to the best of the ability of your company.

Have a listen and find out the steps you can take before an incident to prepare for a cyber incident.

Check out the free ACSC Essential 8 self assessment audit tool. After completing the audit, you will be have a bespoke action plan, based on your type of business and your current security measures to achieve the right ACSC Maturity Level for your business.

Cyber Security 4 Small Business is a set of resources to help small business owners understand the Cyber Threat and be able to defend their network in the most cost-effective way possible.

We believe that 95% of Cyber Security and Cyber Resilience can be achieved through good systems administration and good processes, without all the expense of engaging cyber security experts.

Check out the show notes for this episode.

  continue reading

12 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play