Simple controls your company can implement today to stay protected tomorrow!

Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started.

At CyberSmart believe that Cyber Security should be accessible and easy for everyone. Therefore we have compiled a series of actionable steps to help you protect your data. Each week we focus on one control, provide some background information and answer common questions. Read More

At every cyber security event, people talk about the new General Data Protection Regulation (GDPR). It seems as the Cyber Security industry is obsessed with this new law and makes sure that everyone else knows about it too. Companies, consultants and lawyers are hopping on the GDPR train, because there is a significant opportunity for new services and products. However, there is also a lot of misconception going around and scaremongering, which is stereotypical for the cyber security industry.

Read More

Simple controls your company can implement today to stay protected tomorrow!

Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started.

At CyberSmart believe that Cyber Security should be accessible and easy for everyone. Therefore we have compiled a series of actionable steps to help you protect your data. Each week we focus on one control, provide some background information and answer common questions. Read More

Data protection and information security are big news, with high profile cases like the 2017 ransomware attack on the NHS placing cybersecurity even more in the public spotlight. According to the UK Government, however, around 80% of cyber attacks could be prevented if businesses put basic cyber security controls in place.

London-based CyberSmart is a startup whose automated compliance platform, CE Smart, helps organisations to identify and fix system weaknesses and gain the Cyber Essentials (CE) certification. Their package also offers a year of ongoing support, regular security briefings, and cyber insurance. Read More

(1) AWS: Remove (or do not generate) root account access keys

To access Amazon Web Services (AWS), an access key is required to verify your identity and the identity of your applications. An access key consists of an access key ID and a secret access key. Anyone with the access key for your root account has unrestricted access to all of your account.

Read More

The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement of the basic controls all organisations should implement to mitigate the risk from common internet based threats, within the context of the Government’s 10 Steps to Cyber Security. Read More

Simple controls your company can implement today to stay protected tomorrow!

Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started.

At CyberSmart believe that Cyber Security should be accessible and easy for everyone. Therefore we have compiled a series of actionable steps to help you protect your data. Each week we focus on one control, provide some background information and answer common questions. Read More