Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Cyber Security Toolkit 2nd ed


ISBN13: 9781784461812
Previous Edition ISBN: 9781784460426
Published: October 2022
Publisher: Law Society Publishing
Country of Publication: UK
Format: Paperback
Price: £70.00



Low stock.

Cyber security is a central issue for legal services providers, their insurers and regulators. This second edition of Cyber Security Toolkit has been fully revised and updated to cover current cyber security threats and best practice approaches.

This practical toolkit is designed to increase awareness and understanding of cyber risks faced by businesses. It covers a range of cyber security issues, including prevention and mitigation strategies, staff training, and actions to take in the event of a successful cyber-attack. The toolkit also addresses the new reality of working from home, the additional risks that poses and how to address them.

As well as advice on how to safeguard digital information, the book provides a number of precedent documents. These customisable documents will help you to ensure that your organisation meets all of the legal and regulatory requirements relating to processing of personal data belonging to employees as well as clients, and include:

  • a risk assessment audit
  • a remote working policy
  • an IT security checklist, and
  • a breach reporting checklist

Subjects:
Legal Practice Management
Contents:
Part I – Understanding cyber security
1. What is cyber risk?
2. Cyber risks within business structures
3. Types of cyber attack
4. The impact of a cyber security breach
Part II – Mitigating cyber security risks
5. Legal and regulatory standards
6. Implementing and monitoring cyber security policies
7. Staff training
8. Cyber security solutions – technology
9. Cyber security solutions – personnel
Part III – Managing a cyber security breach
10. Reporting and response procedures
11. Hope for the best, plan for worst: preparing for a cyber attack
12. Mitigation