- Purpose
This policy outlines the cybersecurity framework for Arc network to protect digital assets, maintain data integrity, and ensure business continuity in an evolving threat landscape. - Scope
This policy applies to all employees, contractors, vendors, and any individuals with access to Arc network systems, networks, and data. - Governance & Responsibility
- The group operations director is responsible for overseeing cybersecurity measures.
- Department heads must ensure compliance within their teams.
- All employees must adhere to security guidelines and report any suspicious activity.
- Access Control & Authentication
- Employees must use strong passwords and multi-factor authentication (MFA) for all systems.
- Access is granted based on the principle of least privilege.
- Regular access reviews will be conducted to ensure only authorized personnel have access to sensitive data.
- Data Protection & Privacy
- All company and customer data must be encrypted in transit and at rest.
- Employees must follow GDPR, California Consumer Privacy Act, and other relevant data protection regulations.
- Personal and sensitive data must only be stored on approved devices and platforms.
- Network Security
- Firewalls, intrusion detection systems (IDS), and anti-malware tools must be used to safeguard networks.
- All company devices must have up-to-date security patches and antivirus software.
- Incident Response & Reporting
- A formal incident response plan is in place to manage security breaches.
- Employees must report any suspected breaches or phishing attempts immediately.
- Security incidents will be logged, analysed, and remediated to prevent recurrence.
- Employee Training & Awareness
- Cybersecurity training is mandatory for all employees.
- Regular phishing simulations and awareness programs will be conducted.
- Employees must undergo refresher training at least annually.
- Third-Party & Vendor Management
- Vendors must comply with Arc network’s cybersecurity standards, detailed in this policy.
- Third-party access to company systems must be monitored and reviewed regularly.
- Contracts must include cybersecurity clauses and compliance requirements.
- Business Continuity & Disaster Recovery
- Regular data backups are conducted and securely stored.
- A disaster recovery plan is in place and tested annually.
- Systems have redundancy and failover mechanisms to ensure minimal downtime.
- Policy Compliance & Enforcement
- Non-compliance with this policy may result in disciplinary action.
- Regular audits and assessments will be conducted to ensure policy adherence.
- Employees are encouraged to provide feedback for continuous policy improvement.
- Review & Updates
- This policy will be reviewed annually and updated as necessary by the group operations director or deputy.
- Any major cybersecurity incidents will trigger an immediate review of the policy.
Appendix A: Cyber Breach Incident Response Protocol
This document is a best-practice guide for the best way to respond to a cyber security breach, for use by senior management, marketing, digital, and IT, depending on the exact nature of the breach.
- Basic Response Protocol
- Verify the nature of the breach. See separate response protocol for customer data breach.
- IT lead or deputy, digital director and group operations director meet, plus supplier representative if relevant.
- Confirm exact nature of the breach, which partners are involved, its impact on the business, and time to resolution.
- Alert senior management team and local exec team. Information included in point C should be communicated to them.
- If we have been hacked, break contact with the hacker.
- Agree timeline for resolution with supplier and action required to resolve it.
- Broadcast all-staff email so teams are informed of the breach and expected time for resolution.
- If the breach is of a customer-facing system, alert customer services and give them a list of FAQs to answer questions we are most likely to receive.
- Once our response is complete and we have informed all relevant parties, undertake a wash-up meeting to review approach to date and further actions required.
- Specific Response Protocols by Threat
- DDOS Attack
Note that our first line of defence against DDOS attacks is our CDN Cloudflare.- A DDOS attack is reported by Cloudflare or one of our technical partners.
- Response team meet to identify severity of attack and appropriate response.
- Response approach is put into effect. Working with Cloudflare and affected CMS/platform/s.
- Group operations director informs senior leadership team and local leadership team of attack, response timeline and any implications to business performance.
- Only in exceptional circumstances will an all-staff email be required.
- Conduct post-mortem to agree how to sharpen up our future response to this kind of attack.
- Successful Email Phishing Attack
- A member of staff reports a successful phishing attack.
- IT lead or deputy puts together a response team of local CMO, group operations director, local digital lead to identify severity of attack.
- Break contact with phishing agent.
- Agree and implement response, timeline for implementation and any implications to business performance.
- Group operations director informs senior leadership team and local leadership team of attack, response timeline and any implications to business performance.
- Only in exceptional circumstances will an all-staff email be required.
- Conduct post-mortem to agree how to sharpen up our future response to this kind of attack.
- Network/Connectivity Outage
- A network/connectivity outage is reported at one of our offices.
- Local MSP, IT lead and group operations director conduct a conference call to identify severity of outage.
- Local MSP agrees and implements response, timeline for implementation and any implications to business performance.
- Group operations director informs senior leadership team and local leadership team of attack, response timeline and any implications to business performance.
- In the event of a prolonged outage, staff are asked to work remotely until further notice.
- Only in exceptional circumstances will our IT lead and group operations director need to talk directly with Transputec’s systems engineers to agree a solution.
- Conduct post-mortem to agree how to sharpen up our future response to an outage.
- Ransomware Attack
Note that we do not pay ransom demands.- A ransomware attack is reported/a system goes down as the result of a ransomware attack.
- Dependent on the system attack, local MD, IT lead and group operations director meet to identify severity of attack.
- Break contact with attacker.
- Agree and implement response, timeline for implementation and any implications to business performance.
- IT lead informs senior management team and local exec team of attack, response timeline and any implications to business performance.
- Only in exceptional circumstances will an all-staff email be required.
- Conduct post-mortem to agree how to sharpen up our future response to this kind of attack and implement these learnings.
- DDOS Attack
Appendix B: Customer Data Breach Incident Response Protocol
- Verify the nature of the breach, ie screen for phishing and/or malicious breach notifications from third parties.
- Initial response team meets to agree response: local CMO, digital director, head of IT, group operations director.
- Formally record when we were first aware of a verified breach. Document breach timeline, including meetings, conversations, phone calls, and emails.
- Confirm exact nature of the breach, which partners are involved and the volume and type of customer data that has been exposed.
- Alert the Arc network senior leadership team. Information included in point 4 should be communicated to them.
- Take legal advice on how best to respond to the breach, and whether we need to self-report to the ICO.
- Resolve the data vulnerability and agree how and when to inform affected users.
- If appropriate, self-report to the ICO with a 72-hour window of having verified the breach.
- If we have been hacked, break contact with the hacker.
- Inform key business individuals in data and marketing to let them know the data has been kindised and a summary of the action taken so far and subsequent action to follow.
- Agree and sign-off messaging to be used to affected users. Ensure that wording is accurate and legally correct.
- Broadcast all-staff email so teams are prepared for question.
- Communicate the breach to affected users within an agreed time limit of being made aware of the breach. This will routinely be done via email.
- Alert customer services of the email broadcast and give them a list of FAQs to answer questions we are most likely to receive.
- Keep a log of all customer service questions for future review.
- Once our response is complete and we have informed all relevant parties, undertake a wash-up meeting to review approach to date and further actions required.