Our Trusted Partners are an integral part of the ECRC, being able to accredit cyber essentials. But here is a little more information about the people behind the partner.
Tell me who you are and what you do within 3B Data Security?
I am Benn Morris, founder and Managing Director of 3B Data Security; I get involved in all things 3B but mainly I am here to help my staff and our customers prevent and react to cyber security incidents and help get them compliant and secure.
How did you get into cyber resilience?
I started as a digital forensic investigator within the police, then moved to the private sector investigating breaches of credit card data and other hacking cases.
What’s the best thing about working at 3B Data Security?
Helping People! Be that to improve their cyber security proactively, or if we need to drop everything and jump to help someone on an incident response hacking case.
What size companies do you work with?
Anything from small start up businesses to multi-national organisations, but we spend a lot of time helping small to medium enterprise organisations.
What do you see small/medium companies struggling with in terms of cyber resilience?
As a business owner I understand just running the business can be a struggle at times; then you add the everyday threats and risks associated with protecting data of your staff and customers. More specifically, I would say keeping on top of the daily evolution of threats and keeping educated on all the cyber security topics and tasks that businesses need to do.
Why should companies get Cyber Essentials accreditation?
It not only proves to your staff and customers you have taken positive steps on the cyber security improvement journey; it is a great way to highlight and remediate some of the most basic security needs for the organisation. It also allows you to tender for government contracts.
What three tips would you give a company with little knowledge of cyber resilience?
If you don't need it, don't store it!
If you do need it, then store it encrypted and back it up (offline and separate to the source systems).
You ARE large enough (or small enough) to be a target to a hacker; you are just an IP address or web address to them, more often than not they don’t care of your size or who you are; they will still try and hack you.
Do you order starters or desserts?
Starters for sure, sometimes even after my main course as a desert.
Suppose you have been given an elephant and you can’t give it away or sell it. What would you do with it?
Scan it to ensure it’s not a Trojan (horse) elephant.
Comentarios