Icon big data protection

Cyber Security Readiness Program

According to security company Symantec, (IoT) cyber attacks increased from about 6,000 in 2016 to more than 50,000 in 2017, translating to a 600% rise in just one year.

Verizon's Mobile Security Index 2018 says only 14% of respondents have implemented even the most basic cybersecurity practices.

Given the frequency, magnitude and cost of cyber security incidents, it is critical that organisations take all required actions to educate staff and inform stakeholders about material cyber security risks and incidents in a timely fashion.

SECURE CONTROLS
FOR CYBER SECURITY.

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat.

Icon big data protection
Icon small computer

About You

Lorem ipsum dolor sit amet, consectetuer adipiscing elit

Icon small computer

Secure Controls

Ensure computers and network devices are properly configured

Icon small computer

Secure Controls Checklist

Restrict execution of known malware and untrusted software

Icon small computer

Requirement for IT Infrastructure

Restrict execution of known malware and untrusted software

Icon small computer

Questionnaires

Restrict execution of known malware and untrusted software

Icon small computer

UK Certification

Maintain visibility and compliance controls over cloud assets

GDPR Framework 2.0

- A Readiness Program