Research has shown that one in ten UK businesses has experienced a cyber attack with an average cost of £330,000. Online attacks are becoming increasingly sophisticated with more hitting the headlines than ever before.
The pressure for small businesses to keep their data secure is understandably increasing. However, uncertainty around what steps to take means that many small business owners ignore the issue until they are forced into action by either becoming, or knowing, a victim of cyber crime.
Some of the most common cyber threats you could face are:
A type of malware that infects users’ computers and restricts access to their files or permanently destroys files unless a ransom is paid.
Business Email Compromise (BEC)
This is a type of payment fraud that involves the compromise of legitimate business email accounts often belonging to the Chief Executive or Chief Financial Officer.
Intellectual Property Theft
Involves robbing individuals or companies of their creative expressions, ideas & inventions.
What can you do?
Credibility and trustworthiness are key components for all companies. To demonstrate these qualities to your customers there are 2 processes you can go through:
The Cyber Essentials certification process includes a self-assessment questionnaire (SAQ) and an external vulnerability scan.
Cyber Essentials Plus
Cyber Essentials Plus certification includes all of the assessments for the Cyber Essentials certification but includes an additional internal scan and an on-site assessment.
Cyber Essentials is a Government backed and industry supported scheme to guide businesses in protecting themselves against cyber threats. Here are a few reasons for investing in your Cyber Essentials Qualification:
Prevent around 80%
of Cyber Attacks
Increase your service continuity and
enhance your business reputation
Open new commercial opportunities
with larger PLCs
Prove to your customers and
suppliers that you take the security of
their information seriously
It is mandatory for any
central government contracts involving
handling personal information
What we can do for you...
Provide assurance that the technical controls in place at the perimeter and internal boundary levels, as well as in the user and server environments, are effective.
Audit & Assurance
Review the efficiency of your administrative, personnel, technical and physical areas of your security operations.
Test the technical area of your security including the logical perimeter, internal boundary and websites.
Provide your staff with the skills and knowledge to identify security threats and understand the importance of their role to the security of your organisation.
We understand that every company’s security needs are unique. With this in mind, we also offer additional services such as drafting policies and procedures, reviewing system architecture, third party supplier management, etc. Please contact us so we can talk through your requirements with you.