Information Security
Tiger Supplies recognises that information security is a critical component of operational resilience, customer confidence and regulatory compliance. The business operates a structured, risk-based approach to information security designed to protect data confidentiality, integrity and availability across systems, people and processes.
Information security controls are embedded within day-to-day operations and reviewed at senior management level to ensure they remain effective as the business scales and technology evolves.
Information Security Governance
Information security at Tiger Supplies is governed through formal policies, documented procedures and defined responsibilities.
Senior management retains accountability for information security, supported by competent personnel responsible for implementation, monitoring and continuous improvement. Information security risks and controls are reviewed as part of wider business governance and operational planning.
Policies are reviewed regularly to ensure alignment with regulatory requirements, industry best practice and emerging threats.
Data Protection & Privacy
Tiger Supplies manages personal and commercial data in line with UK data protection legislation.
Controls are in place to ensure:
• Data is collected and processed lawfully and transparently
• Access to data is restricted to authorised personnel
• Data is retained only for as long as necessary
• Data is protected against unauthorised access, loss or misuse
Data handling responsibilities are clearly defined, and employees receive guidance and training appropriate to their roles.
Access Control & User Management
Access to systems and data is controlled through role-based permissions.
Key controls include:
• Unique user accounts
• Strong password policies
• Restricted administrative access
• Segregation of duties where appropriate
• Timely removal of access when roles change or employment ends
These controls ensure users can only access the information and systems necessary to perform their role.
System Security & Infrastructure
Core business systems, including ERP and supporting platforms, are protected through layered security controls.
These include:
• Secure hosting environments
• Network firewalls and monitoring
• Antivirus and endpoint protection
• Regular software updates and patching
• Secure configuration of systems and devices
System availability and performance are monitored to identify and respond to issues promptly.
Cyber Security Controls
Tiger Supplies operates defined cyber security controls to reduce the risk of unauthorised access, malware, ransomware and data breaches.
Measures include:
• Managed endpoint protection across devices
• Email filtering and anti-phishing controls
• Secure remote access controls
• User awareness training to reduce human risk
• Incident response procedures for cyber events
Cyber security measures are reviewed and updated in response to evolving threat landscapes.
Incident Management & Response
Information security incidents are managed through a formal incident response process.
This includes:
• Identification and containment of incidents
• Investigation and root cause analysis
• Remediation and corrective actions
• Review of controls to prevent recurrence
• Escalation to senior management where required
Incidents are logged and reviewed to support continuous improvement and accountability.
Backup, Recovery & Data Integrity
Tiger Supplies maintains secure data backup and recovery arrangements to protect against data loss, corruption or system failure.
Backups are:
• Performed on a scheduled basis
• Stored securely
• Tested periodically to confirm recoverability
These controls support business continuity objectives and ensure data integrity is maintained.
Third-Party & Supplier Security
Information security risk extends beyond internal systems.
Tiger Supplies applies due diligence to third-party service providers who process or store data, ensuring appropriate security controls are in place. Contracts include obligations relating to data protection and information security where applicable.
Supplier security performance is reviewed as part of ongoing supplier management.
Training & Awareness
Employees receive information security awareness training appropriate to their role.
Training covers areas such as:
• Password management
• Phishing and social engineering awareness
• Secure handling of data
• Reporting of suspected security incidents
Training effectiveness is reviewed and refreshed periodically.
Monitoring, Review & Continuous Improvement
Information security controls are monitored through:
• System and access reviews
• Incident trend analysis
• Policy reviews
• Management oversight
Findings are used to strengthen controls, address emerging risks and ensure alignment with business and regulatory requirements.
In partnership with Zensec
Cyber Essentials Certification
Commitment
Tiger Supplies is committed to protecting information assets and maintaining the trust of customers, suppliers and stakeholders. Information security is treated as a core operational discipline and is continuously reviewed to ensure it remains effective, proportionate and aligned with business growth.