Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Identity and Access Management
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
FAQs
We've put together a comprehensive list of frequently asked questions - along with our responses - to the most common GRC and SAP security issues.
20 April 2020

7 ways to include cyber security in your business continuity plans

Over the past few weeks many organisations will have found themselves implementing their Business Continuity Plans (BCP) - trying to keep their operations running, while the pandemic impacts their supply chains, workforces and operations.

And for some, this may have been a rude awakening to the shortcomings in their preparation. For others, it might have highlighted opportunities to improve their plans. Not only to mitigate the risk of future events, but also to prepare for how the current pandemic may evolve.

One particular challenge for businesses as they implement their BCP, is ensuring cyber security is properly considered, and their critical systems and data remain protected. 

In their haste to implement remote working for example, organisations may not apply the appropriate controls to non-corporate devices. At the same time, opportunistic cybercriminals are ramping up efforts to target vulnerable home workers. A threat which is compounded by the impact of reduced staffing levels in critical cyber security and IT teams.

The best way to prepare for these risks, is to ensure they are properly considered in your BCP. So, in the following infographic we explore 7 ways you can include cyber security in your business continuity plans - helping you respond to one risk, without creating another.

Below we give you an outline of 7 ways to include cyber security in your business continuity plans:

 

500-min

 

About Turnkey

Turnkey Consulting is helping to make the world a safer place to do business by specialising its expertise across Integrated Risk Management, Identity and Access Management, and Cyber and Application Security. We provide business consulting, technology implementation and managed services to help customers safeguard their application environments - protecting critical ERPs (such as SAP, Oracle and MS Dynamics) and wider enterprise systems.