Loading
Over the past few years there has been a significant increase in cyber crime targeted at the SME market. There are two factors contributing to this rising epidemic. First, is the rise of crypto-currencies, which has enabled anyone in the world to be paid a sum of money without being identified or held accountable (e.g. ransomware). Second, is the increased focus on security by the enterprise sector, meaning that targeting a large number of small businesses has become far more effective than attacks aimed at high-security large companies.
60% of small businesses who experience a breach go out of business within 6 months.
Over 90% of breaches are the result of human error. All it takes is one person clicking one wrong link.
SMEs are often the easiest targets. Almost half of all recorded cyber attacks are targeted against SMEs.
Complete our online cyber risk assessment to determine where your business is most at risk. Share these reports internally and benchmark your results with businesses of similar size and/or in similar industries.
More InformationComplete the cyber risk assessment to visualize your risk and
benchmark against similar businesses.
Please see a list below of the categories covered in our security framework.
Each category contains professionally prepared, ready to use policy templates, actionable checklists, and vetted vendors.
Covering cyber security basics and base policy documents every business should have.
Action steps to define what information is important and how that information should be handled.
Steps to review and implement strong/robust authentication security for all systems and staff.
Actions to ensure that your networks are configured and maintained with cyber security considerations.
Actions to ensure the company's email security is robust and defends you from the most common threats.
Actions to ensure that software and operating systems are configured and maintained to ensure security.
Secure your web browsers, and implement controls to ensure safe internet usage by all staff.
Actions to ensure the security and availability of your website environment.
Actions to ensure that your company's devices are safe both in and out of the office.
Actions to review and implement best practice endpoint protection and management.
Ensure that all staff have an understanding of the risks of removable media and safe behavior.
Actions to ensure you operate within applicable local and international privacy/security regulations.
Actions to ensure staff are aware of safe behavior and systems are set up correctly for remote connection.
Actions to test and implement a robust and reliable disaster recovery system.
Process to ensure, that should an incident occur, you have a clear course of action to follow.
Actions to address your human cyber risk and foster a cyber aware culture.
Actions to ensure that your operational team has resources and procedures to be cyber safe.
Actions to ensure you have clear, meaningful policies to address and reduce your cyber risk.
Keep cyber security front of mind with engaging awareness posters around the office.
Get access to an extensive collection of print-ready high definition posters.
You can significantly reduce your cyber risk by providing awareness training to your team. Staff are invited to your training program via an email invitation and are sent one training course every 3 months. Staff engagement and completion is tracked and available in dashboard reporting.
Phishing Explained
Password Hygiene
Being Safe Online
Information Security
CEO Fraud
Social Engineering
We are offering this comprehensive package of tools as we are passionate about helping all businesses lift their cyber posture. These tools are accessible for free, forever!
Take our cyber health check and get a clear overlay of your cyber security risks in just a few moments.
Forget spending thousands on legal fees. Use our kickstarter toolkit, and custom policy templates for strong coverage that doesn't break the bank.
Our content is short, engaging and fun! Deliver quarterly awareness training to staff, accessible on-the-go and on any device.
Be notified if your email address is exposed on the dark-web. Our system will perform an identity scan on all staff email addresses to keep you safe.
You can easily enrol staff via an active directory sync, manually or via a CSV upload. If you have developers you can also manage enrolment with our fully featured API.
Monitor your progress and identify areas of risk on cyber risk dashboard. Export your risk profile directly from our reporting suite for management and board reporting.