- Comprehensive audit
Map every device, its purpose, and its access pathways. Identify which apps are installed on staff devices. Review permissions and revoke unnecessary access.
- Credential discipline
Eliminate all default passwords. Enforce unique, strong credentials for every system. Where possible, integrate systems into a single estate-managed authentication process.
Update and patch management
Establish regular cycles for firmware and software updates across all devices. Build responsibility for this into supplier contracts.
Data sovereignty controls
Prioritise solutions that keep data on-premises. Where cloud services are essential, select providers that host data within trusted jurisdictions with strong protections.
- Network segregation
Place smart devices on isolated networks, separate from the principal’s personal devices and core estate systems. Use monitoring to detect unusual traffic, signalling compromised devices.
- Governance and oversight
Make system approval part of a structured estate process. Every new device or app should be reviewed before it’s introduced, ensuring alignment with estate-wide standards.