Icon big data protection

Cyber Security Readiness Program

According to security company Symantec, (IoT) cyber attacks increased from about 6,000 in 2016 to more than 50,000 in 2017, translating to a 600% rise in just one year.

Verizon's Mobile Security Index 2018 says only 14% of respondents have implemented even the most basic cybersecurity practices.

Given the frequency, magnitude and cost of cyber security incidents, it is critical that organisations take all required actions to educate staff and inform stakeholders about material cyber security risks and incidents in a timely fashion.

Take a Free Data Risk Assessment

SECURE CONTROLS
FOR CYBER SECURITY.

Cyber risks are ever evolving and pose a significant threat to business, especially SMEs. Certified By’s 8 Principles of Cyber Security Readiness Program highlight the essential elements every business should have front of mind.

Icon big data protection
Icon small computer

About You

Lorem ipsum dolor sit amet, consectetuer adipiscing elit

Icon small computer

Secure Controls

Ensure computers and network devices are properly configured

Icon small computer

Secure Controls Checklist

Restrict execution of known malware and untrusted software

Icon small computer

Requirement for IT Infrastructure

Restrict execution of known malware and untrusted software

Icon small computer

Questionnaires

Restrict execution of known malware and untrusted software

Icon small computer

UK Certification

Maintain visibility and compliance controls over cloud assets

GDPR Framework 2.0

- A Readiness Program

Icon small computer

Web Applications

Ensure robust development and testing in line with best practices

Icon small computer

Secure Configurations

Ensure computers and network devices are properly configured

Icon small computer

Malware Protection

Restrict execution of known malware and untrusted software

Icon small computer

Cloud

Maintain visibility and compliance controls over cloud assets

Icon small computer

Firewalls

Ensure safe and necessary network access from the Internet

Icon small computer

User Access Controls

Authorise approved access to apps, computers and networks

Icon small computer

Patch Management

Ensure devices and software are not vulnerable to known security issues

Icon small computer

Mobile

Map and mitigate risk exposure through mobile devices