If you need to talk about cyber security our consultants can provide expert guidance. We have extensive experience in all areas of cyber security so we can help whatever the challenge.
When you engage with us we will let you know how much effort we expect will be needed and clear pricing to ensure you know the impact to your business in advance.
You are an expert in what you do, that's why it's your business. But you shouldn't also need to be an expert in cyber security, that's where we come in. Don't struggle trying to figure out how to deal with the seemingly complex world of cyber threats. Talk to us and we'll guide you through the murky depths.
When you engage with us we'll work on a clear set of requirements to make sure you get what you need. We'll provide pricing based on how much time it will take to deliver against those needs. And we'll agree what the output should be. So you'll understand what you're looking, understand what you'll get, and you'll have clear pricing on how to get it.
Using an industry standard toolset we will scan your endpoints on a monthly basis for vulnerabilities and provide reports to you that identify issues that should be addressed
If a malicious actor is able to get into your environment they there's an opportunity to destroy your sensitive data. Sometimes it's as simple as finding the data and pressing delete, but sometimes it's a bit more work. Sometimes the malicious actor takes advantages of weaknesses in the software you use to make themselves more important (privileged escalation), which means they can do a lot more than you expected. With the right permissions they can jump between workstations and servers (lateral movement) and get to your most critical data.
By understanding the vulnerabilities you have on your devices you can then organise fixing those issues, many of which you will not even know are there.
There's a few parts to the services
Pricing is quite simple, there's a monthly licence cost for the agent software, this is based on the numbers of devices the agent is installed on, the standard report is included in this cost. For an additional cost we'll produce the enhanced report providing the additional detail.
Understand what malicious actors can see about your business. We can scan your external web presence and internal environment to identify vulnerabilities that could be exploited. We can also tell you what malicious actors can find out about you on the web
It's impossible now to know your digital footprint! Whether it's your email address, or your business website, or your FTP server, the Internet knows about it. You can't avoid this but it's important to know where your weaknesses are. With our Attack Surface Analysis we can quickly identify what the Internet know about you and your business, and let you know where there are potential risks.
Even with our automated tools a full search can take days so we start by check the obvious. First off what does your web presence looks like, do you know what you're exposing to the Internet? Malicious actors will look for a way in, so we'll do the same (with your permission). We'll also look for signs of identity theft, so which of your businesses email addresses appear on the web and if they've appeared in any breaches.
We'll scan for your company email addresses and if they've been involved in breaches. We'll have a look for interesting aspects of your website. We'll have a look for what services you have on the Internet. We'll see if there's any vulnerabilities on these systems. It's also possible to check to see if you have default logins available, although that is a bit more intrusive!
A simple search with a report will take a day, you'll just pay for our time to do that.
Cyber security has many Frameworks and Standards and it can be confusing knowing which is right for your business. We can help select the right approach for your business and support you in understanding your level of compliance or maturity
There are many types of compliance in the cyber security, each framework or standard is slightly different, and it's an effort even deciding which one applies to your business. However depending on your line of business compliance might be mandatory. Even if compliance is not a requirement, it can provide a structure to your cyber security strategy, identifying the areas where you have coverage, but also highlighting where you need to focus your efforts.
We have experience in most cyber security frameworks and standards. We can assess how you to comply to the relevant framework or standard, and provide you with a report showing the gaps and providing guidance on how you can improve. First we would discuss with you your requirements, agreeing the most appropriate framework or standard. Next through a series of interviews we would establish your current security controls based on the chosen framework or standard. Finally we'll develop a report that details the current security posture, provide our gap analysis, and provide recommendations for improvement. Pricing is based on the amount of time required to perform the assessment and produce the report.
Cyber security can seem complex and sometimes you don't know where to start. We can help ensure you consider the basics for your business and provide clarity on cyber security priorities for your business
Getting the basics right is the first step. Even before you consider compliance to a framework or standard you need to ensure your have the basics in place.
Would you be able to recover for a cyber attack? Do you know what's important to your business? Is your data secure? These are important questions that you need to answer in case the worse happens, we can help you understand the answers to these questions
NCSC Respond & Recover is resources for individuals and organisations in the UK who have experienced an online scam or cyber attack
It is the most populous city in the United Kingdom, with a metropolitan area of over 13 million inhabitants.
Police CyberAlarm is an award-winning free tool, provided by your local police force and funded by the Home Office, to help your business or organisation monitor and report the suspicious cyber activity it faces.
Have I Been Pwned? allows you to look up your email address to see if it has appeared in any data breaches. This is valuable information as not only does it mean your email details are out there ready for spam, it may mean your password has also been compromised. You can also check to see if your password has been leaked.
Pentest Tools allows you do a lot of the testing yourself. They have a range of tools that can provide you information about your presence on the web.