• Sales: 01494 976939  Support: 01494 444065
Preparing for an MHRA Inspection - Part 5
  • IT Support Services
    • IT Support Services
    • MY SERVICE DESK
    • MY INSIGHTS
    • MY SECURITY
    • MY RECOVERY
    • My CIO
    • IT Project Services
    • Cyber Essentials Certification
    • REMOTE WORKING
    • DIGITAL SERVICES
    • Pharma Digital Toolkit
    • OTHER SERVICES
  • CUSTOMERS
  • Solutions
    • SME Managed IT Services Bundles
    • SharePoint for SMEs
    • Industries
      • Pharmaceuticals
      • Legal
      • Recruitment
  • Free Resources
  • Blog
  • About
    • About Epoq IT
    • Leadership
    • Our Mission & Values
    • Careers
Get in Touch
  • X
  • IT Support Services
    • IT Support Services
    • MY SERVICE DESK
    • MY INSIGHTS
    • MY SECURITY
    • MY RECOVERY
    • My CIO
    • IT Project Services
    • Cyber Essentials Certification
    • REMOTE WORKING
    • DIGITAL SERVICES
    • Pharma Digital Toolkit
    • OTHER SERVICES
  • CUSTOMERS
  • Solutions
    • SME Managed IT Services Bundles
    • SharePoint for SMEs
    • Industries
  • Free Resources
  • Blog
  • About
    • About Epoq IT
    • Leadership
    • Our Mission & Values
    • Careers
Preparing for an MHRA Inspection – Part 5

Preparing for an MHRA Inspection – Part 5

Pharmaceutical | August 2018

In my last blog I talked about the importance of securing your information systems from internal threats with appropriate access control measures.

In today’s article I wanted to talk about the other side of the coin: securing your information systems from external security threats.

We only have to open a newspaper or turn on the news these days to hear about some new cyber security threat or data breach that has occurred. Protecting against such breaches forms an important part of compliance, and as such needs to be factored into your processes and procedures when preparing for an MHRA inspection.

There are a wide range of factors to consider here, which will include:

1. How is your network secured from threats like malware, ransomware and hackers?

In days gone by a firewall and some antivirus software would largely do the job, but with the constantly evolving threat landscape this is no longer the case and a much more sophisticated suite of business procedures, processes and technologies is needed to provide full protection.

2. What are your procedures for applying security updates to your systems?

New security threats are emerging daily and software vendors are releasing a constant stream of fixes and patches to try and mitigate the risks from these threats. Therefore it is critical that you apply these security fixes to both your servers and your PCs and laptops in a timely fashion. Indeed, the timeliness of updates has now become even more critical since some cyber criminals are now reverse engineering the fixes from vendors such as Microsoft, in order that they can see what vulnerabilities have been fixed, and using that information to directly target those vulnerabilities in customers who have not applied the appropriate update to their systems.

3. What are your procedures around physical security of your servers and IT equipment?

Having good cyber security in place is critical, but if someone can walk into your building and pick up a laptop or access your server room then the very best cyber security systems can be rendered useless.

4. How do you manage secure disposal of old PC and server equipment?

Equipment that is end-of-life and being replaced will often contain confidential business data or emails, and therefore it is important that it is properly wiped, and certified accordingly, to guarantee that data cannot be restored.

5. How are your staff educated to ensure they are aware of the latest cyber security threats?

It is all too easy to click on seemingly legitimate attachments or web links which may actually contain malicious code, and with new threats constantly emerging, the vigilance of your staff in being able to spot such scams which will form part of your defence strategy.

6. How and when are your procedures around cyber security reviewed and updated?

Given the constantly changing threat landscape, it is critical that procedures and controls around cyber security are regularly reviewed and updated.

Subscribe
  • This field is for validation purposes and should be left unchanged.

Categories
  • Business Continuity
  • CIO
  • Cyber Essentials
  • Cyber Security
  • Digital Transformation
  • Disaster Recovery & Backup
  • Innovation
  • IT Security
  • IT Service Management
  • IT Support Services
  • Legal
  • Microsoft 365
  • News
  • Pharmaceutical
  • Recruitment
  • Remote Working
  • SMEs

Unit 9 Anglo Office Park
Lincoln Road
Cressex Business Park
High Wycombe
HP12 3RH

Sales: 01494 976939

All Other Enquiries & Support: 01494 444065

Company Registration No. 4506070

VAT No. 795 3850 80

© 2023 Epoq IT, all rights reserved

CLIENT
Client portal login
LOGIN
QUICK LINKS
  • Contact Us
  • About
  • Leadership
  • Who we work with
  • Privacy Policy
  • Managed IT Services FAQs
Sign up for our Newsletter

Keep updated with the latest news & blog posts, we don't spam and you can unsubscribe at any time.

Email Address

  • This field is for validation purposes and should be left unchanged.

 

By entering your information, you consent to your data being processed in accordance with Epoq IT's Privacy Policy

FOLLOW US