Cyber criminals target everyone.
And we mean everyone, including targeting SMEs and – yes – YOU.
We help you defend your business against attacks.
Today many organisations require suppliers to be Cyber Essentials certified. We take you through the forms, help you fix any issues the process identifies and implement new policies so you’re not only protected, you can prove it.
How does Cyber Essentials work? (article)
Back up your business.
Businesses tend to think software is backed up somewhere, by someone else. That’s usually not the case. You need to take responsibility for the documents and data you can’t afford to lose, from emails to records in subscription software like Salesforce and Xero. That way, whether a single document is accidentally deleted, or a whole tech company goes down, your data can be restored. Best of all, it happens automatically, in the cloud, so you don’t have to remember to do a thing.
Outfox the fakers.
How do criminals break into your business? Usually staff unwittingly let them in - clicking on links, inserting USB sticks, using café Wi-Fi. Your team is your frontline defence, so cyber security training is crucial. But it doesn’t have to be boring! Our online system sends safe phishing emails to assess your overall vulnerability and each person’s knowledge gaps, then automatically delivers fun 5-minute videos tailored to each person’s need. Regular reminders reveal the latest scams and help people take a proactive approach to protecting your company.
Protect your passwords.
Passwords your staff use on personal phones and family computers can be discovered and sold. If staff re-use those same passwords at work, criminals can access your system too. We help your team create harder-to-crack passwords and store them securely and simply in a password safe. Get alerts about weak or breached passwords too, so you can act quickly to prevent harm.
Vaccinate against viruses.
Stop staff installing unauthorised and unchecked software and criminals installing malicious programs. We use the latest ‘Zero trust’ approach. You decide which software is essential and it goes on the trusted list. Staff need to request permission to install extra software, while hostile software doesn’t get a look-in, keeping you in control.
Stop annoying and suspect emails before they hit inboxes to protect busy staff from having to spot the fakes. No spam filter can block every unwanted email, but a good filter will weed out the majority – which can be many thousands a day.
Keep staff focused.
Make sure the only software staff can download is the software they need for your business, ensuring their time is spent on your work.
Ban the USB.
Stop people plugging in any old USB stick unless it’s been checked or authorised. Education is great, but controlling device access gives you a back-stop.
Use location as an extra layer of protection.
If security were a cake, passwords would be your sponge base and multi-factor authentication the icing, and the cherry on top would be location. By checking whether the access attempt is coming from a trusted location (your office, the team member’s home), we can set your system to spot unusual activity. So even if someone’s credentials have been stolen or faked, no one can take a slice of your pie.