Protect Your Digital Assets,
and Your Reputation.
Data is the lifeblood of any organisation, big or small.

Get certified to build credibility and trust... to Power Growth 
Cyber Essentials Programs - Maturity Levels 1-3
Protecting your business from cyber attacks is more important than ever, but it can be hard to know where to start.
According to a study by IBM, 60% of businesses that suffer a cyber attack are out of business within six months.
The Cyber Essentials Program is the essential first step in protecting your business from cyber attacks. Our program provides you with the tools and knowledge you need to identify, protect, detect, respond and recover from a cyber breach.
How it Works
REGISTER
Simply click the green Get Started button at the top of this page to start your program.
ASSESS
Each Program provides a smart self assessment with a range of (mostly multiple choice) questions.
Some questions require evidence be provided, IF you require a Program Review in order to receive a Certificate of Assessment. to evidence your results
CERTIFY
To evidence results a Program Review is conducted by an human account manager.
Once approved users are issued a Certificate of Assessment to provide relevant stakeholders: clients, insurers, investors, etc.
ALL PROGRAMS include access to a digital library of amazing tools & resources
This Program Includes
-
8 Components
-
Smart Self Assessment
-
Risk Report: High-Med-Low
-
1 Hour Coaching
-
Digital Library of Resources
-
24/7 Access: Mobile & TV
Program Modules
Admin Privileges
Assess, assign and monitor user privileges.
Patch Updates
Mitigate ‘extreme risk’ vulnerabilities of computers and network devices within 48 hours.
Multi Factor Authentication
For all users when they perform a privileged action.
Daily Backups
Daily Backups of important data, software and configuration settings.
Application control
Prevent execution of unapproved / malicious programs.
Patch Application
Prevent ‘extreme risk’ vulnerabilities within 48 hours.
Application Hardening
Configure web browsers and features.
Configurations
Block macros from the internet.
Download the eBook
Please enter the information below to download the
Cyber Security & Data Protection eBook.
