“BUSINESS CRITICAL DATA” SECURED?
Discreet Cyber Security Services for SME Businesses within East Anglia & London
Areas we monitor constantly
Your Business "Domain"
A problem for any organization is maintaining control over those assets so that they are managed securely and patched. The dynamic nature of cloud based systems means marketing (or anyone) can throw up an application (web site) that is soon forgotten and therefore becomes a vulnerable entry point onto your network
Your Business "Vulnerabilities"
Systems become “vulnerable” when they become obsolete or do not have the latest update version or patch applied. We offer a scheduled service which is up to date Vulnerability Management Scan of all your IT assets facing the Internet – automatic reports emailed “by exception”
Nothing to lose or have you?
A hard won business reputation is easily lost
Areas we monitor specifically
Wi-Fi & VPNs
Always use a VPN (Virtual Private Network) when using unknown or “free” Wi-Fi connectivity as data is normally sent in “clear text” and is easily readable, stealable and interuptable
End Point Security
The perimeter of your IT system has now expanded to include every single mobile device – all of which need to be protected and secured as they are the gateways to your system
Your best assets are your staff, they are also one of the weakest links in the defence chain – help them by training them in cyber security awareness and social engineering attacks
Mobile devices and mobile working are both difficult to secure – the security boundaries are ever changing – the mobile end point devices must be secured
New data protection laws come into effect on May 25th 2017 – the General Data Protection Regulations aim to improve a user’s privacy of data; take simple steps to ensure you’re compliant
You may be required to conform to regulatory compliance markers. Having a full compliance scan run against the regulatory requirements will ensure to comply with those requirements
With written permission we will mount an attack against a specified part of your IT systems to see how robust the defences are; no damage will be caused and full report will be issued
Multi-factor Authentication – a single user id and a password are no longer secure enough to prove a persons identity – use multi-factors.
Before GDPR can be implemented successfully within the business, you need to find all of the personally identifiable information – we can scan, report, move and protect the data
Unsure if your systems are robust and secure? Get a vulnerability scan run; it will give you a snap shot of the status of your systems regarding vulnerabilities – no errors, no charge
Prove to your supply chain that you take cyber security seriously – ensure you pass a basic “Cyber Essentials” or a more complex “Cyber Essentials Plus” assessment – needed for UK Gov tender.
Ensure that all mobile devices have had “full hard disk encryption” installed – don’t use a “free” version, always pay for a CESG approved product that fits with the data protection level needed
Sure you’re 100% secure?
Any doubts – get your systems checked