How is your cybersecurity? 10 questions for top management

1. Are resources allocated for cybersecurity?

Ensuring cybersecurity requires financial, human, and technical resources. Company leadership should account for cybersecurity costs in their budgets and allocate sufficient funds for implementing and maintaining security measures. Besides finances, qualified experts and the right technology are essential.

Cybersecurity should be a priority for every organization, especially for top management, which should at least have a basic understanding of the company’s cybersecurity posture. Growing threats and new regulatory requirements demand increasing attention.
While cybersecurity may not be a top priority for companies that don't specialize in it, it's wise to view it in a broader context. How well are we protecting our systems and data? Are we prepared to face emerging cybersecurity challenges?
2. Where are our weakest points?

Asset and risk management is arguably the most critical aspect of cybersecurity. Identifying weaknesses starts with a thorough analysis of assets and risks. This process helps pinpoint the most critical assets and the threats they face. Setting priorities, is crucial since it’s impossible to address everything simultaneously. Risk management is a continuous process that requires regular updates and adjustments to new threats.

3. How aware are employees about cybersecurity? mezi zaměstnancfor example,?

The human factor is often the weakest link in a company’s security chain. Regular training and awareness programs significantly reduce the risk of successful attacks. Up-to-date and recurring training sessions yield the best results, helping employees develop essential skills and knowledge.

4. Do we back up our systems and data regularly?

Regular backups are invaluable, especially when recovering data after incidents like ransomware attacks. Backups should be securely stored and regularly tested to ensure their effectiveness.

Did you know...

...the new Cybersecurity Act, implementing the European NIS2 directive, increases demands on top management,which will now be directly responsible for ensuring cybersecurity compliance.
5. What will we do in case of an incident?

Quick and effective incident response can minimize damage significantly. Plans, such as business continuity plans and disaster recovery plans, should include clear steps for incident response and recovery. Chaos during severe incidents adds unnecessary stress, potentially worsening the situation.

6. What do we know about our suppliers?

Supplier management is another critical component of cybersecurity, as modern cyberattacks often target vulnerabilities in supply chains. Mapping out key suppliers, and understanding their access to your organization is essential.

7. Does the company have functional security documentation?

Incident response plans and other processes must be well-documented. For many organizations, this will become a mandatory aspect of cybersecurity, especially according to the new cybersecurity legislation.

Security policies should be regularly updated and actively utilized, not merely formalities. Documentation should serve as a functional tool, adaptable to current needs and threats.

8. Who has access to what?

Access control is the cornerstone of cybersecurity. Employees should only have access to data and systems necessary for their work. This approach minimizes the risk of unauthorized access and misuse of sensitive information.

Regularly review access rights, ensuring former employees no longer have access to company systems and data.

9. How are we managing physical security?

Physical security is also part of cybersecurity. Data centres and infrastructure must be protected against physical threats, like water, wind, or fire. Preventing unauthorized access, safeguarding equipment from damage or theft, and mitigating unauthorized interference are essential aspects of physical security. Do not underestimate and regularly review physical access.

10. What laws apply to us? 

Cybersecurity regulations are constantly evolving, introducing new requirements for organizations. New Cybersecurity Act (according to the NIS2 Directive) will likely take effect in mid-2025. Other regulations, such as the DORA regulation aimed at enhancing digital resilience in financial institutions or MiCA for crypto-asset markets, also apply.

Having an overview of your company’s cybersecurity status is key to protecting sensitive data, maintaining customer trust, and meeting regulatory requirements. You've likely heard this before, but prevention is always cheaper and more effective than dealing with the aftermath of cyberattacks.

Get ready

We can help you with practical preparation of your company for the new cybersecurity legislation.

More articles

Do you have an overview of your company's cybersecurity? Here are 10 questions to help management identify weaknesses and strengthen data protection and corporate systems.
The DORA regulation is here! As of January 2025, financial entities and their IT service providers must comply with it. What should you know about this regulation that fundamentally changes cybersecurity?
Do našeho malého marketingového týmu ve společnosti Cybrela hledáme novou posilu, která si vezme na starosti vývoj naší on-line vzdělávací platformy.

Newsletter

Do you want to be sure that your company is protected from cyber threats and at the same time comply with the applicable legislation? Sign up for the newsletter and get practical advice from our legal consultants.

By clicking submit, you consent to the processing of your personal data for marketing purposes.