Join speakers from the Department for Science, Innovation and Technology in Manchester (The National Football Museum) & London (The Gherkin) for CyberSmart Live. Register your interest today 🚀

New product: CyberSmart Phish – now live!

CyberSmart Phish

No matter what your line of business, phishing is by far the most common cyber threat you’re likely to face. And, while we all like to think we know a thing or two about spotting a scam, the figures suggest we might have some work to do. According to the most recent Cyber Security Breaches Survey, 84% of businesses and 83% of charities reported being targeted by one in 2024.

The most effective way to counter phishing scams is to recognise them before they do any damage, and this takes training. So, as part of our recently released cybersecurity awareness training platform, CyberSmart Learn, we’re also launching CyberSmart Phish.

What is CyberSmart Phish?

CyberSmart Phish allows your organisation to proactively strengthen its cybersecurity by simulating real-world phishing attacks. It includes real-time analytics, behavioural insights, and flexible campaign management — all seamlessly manageable from CyberSmart Learn.

7 key benefits of CyberSmart Phish

1. CyberSmart Learn integrated

Easily enable CyberSmart Phish for your customers, allowing for straightforward management of phishing simulations from inside the CyberSmart Learn portal.

2. Email template library

CyberSmart Phish includes over 70 pre-built email templates. And, you can create new templates with your specific brand and formatting.

3. Landing page customisation

You can create and manage spoofed landing pages that recipients are directed to after clicking on phishing emails. These pages can be educational, providing resources and guidance on recognising phishing attempts.

4. Simple campaign management

Build and manage phishing campaigns, selecting specific email templates, landing pages, and target groups. This allows for tailored simulations based on department or user behavior.

5. Reporting and analytics

CyberSmart Phish provides detailed reports on campaign performance, including metrics such as open rates, click rates, and data submission rates. This helps your business assess the effectiveness of your phishing simulations.

6. Behavioural insights

Track user interactions and identify who needs extra training or tailor your simulations to address gaps in knowledge.

7. Flexibility in frequency

Choose the frequency of phishing simulations based on your organisation’s needs, with recommendations for monthly or quarterly campaigns.

How do I access it?

CyberSmart Phish is integrated into CyberSmart Learn. So, if you’re already a Learn customer, you should now see CyberSmart Phish within the platform. For more information on set-up and how-to guides, head to our BeCyberSmart Community.

For any other questions, please get in touch, our team are happy to walk you through it.

Introducing CyberSmart Learn - now available!

CyberSmart Learn

We’re delighted to announce the launch of CyberSmart Learn, our new cybersecurity awareness training and learning management system.

At CyberSmart, we view security training for staff as one of the key pillars of Complete Cyber Confidence. So, we’ve launched CyberSmart Learn to build on our existing offering and provide your people with skills and knowledge to defend themselves (and your business). Here’s what you need to know.

What is CyberSmart Learn?

CyberSmart Learn is our new and improved cybersecurity awareness training and learning management system.

What makes CyberSmart Learn different?

CyberSmart Learn builds on our existing cybersecurity training offering. While CyberSmart Academy was a bolt-on for Active Protect, Learn is a dedicated LMS and a separate product in its own right.

Plus, it comes with a whole host of features that we couldn’t offer in CyberSmart Academy, these include:

Totally customisable

CyberSmart Learn is completely customisable to your needs. Choose what training employees receive and when, upload your own custom training, and white label it to match your brand. 

Advanced reporting

CyberSmart Learn offers advanced real-time reporting, allowing you to track training progress and cyber awareness across your business or network. 

New and improved content

All of our cybersecurity training content has been given a radical refresh with over 70 new modules, an enhanced user experience and a new look interface. 

Broadened scope

CyberSmart Learn isn’t solely dedicated to cybersecurity. Within it, you’ll also find HR and data protection modules. And, you can even add training from other providers. All you need to upload any training your business requires is a SCORM file of the content. 

Scalability

Whether you’re a 5-person business, 500-person enterprise, or a managed service provider with a network of thousands of customers, CyberSmart Learn scales with your organisation.

Why this matters

It’s estimated that human error is the cause of between 88% and 95% of all cybersecurity breaches. In other words, if we could eliminate the little security mistakes all of us make from time to time, many breaches simply wouldn’t happen. 

Yet, employee training is often overlooked as a key component of cybersecurity. In our recent SME Mobile Threat Report, we discovered that 59% of SMEs didn’t provide any mobile security training to staff. This comes at a time when it’s becoming clearer that higher spending on cybersecurity tools doesn’t necessarily correlate with safer businesses.

CyberSmart Learn is our commitment to addressing this. We believe that employee training is one of the most cost-effective means of protecting your business and CyberSmart Learn can help you do it.

What does this mean for CyberSmart Academy?

CyberSmart Academy lives on. But, we’ve rebranded as CyberSmart Learn Lite. Nothing else has changed. It’s still included as standard with CyberSmart Active Protect and includes all the features you currently know and love.

However, one thing to bear in mind, is that CyberSmart Learn is a new platform requiring its own configuration of users and assignments so you’ll need to start afresh if you upgrade.   

How do I get CyberSmart Learn?

Get in touch. CyberSmart Learn is live and ready for use. So if you’re ready to get started please reach out directly or through your managed service provider.


Introducing improved software vulnerability detection and reporting in Active Protect – now live!

Software vulnerability detection and reporting

We’re thrilled to announce a major improvement to Active Protect that will help you stay more secure and in control of your systems: improved software vulnerability detection and reporting is now live.

At CyberSmart, we’ve always been committed to helping you maintain the highest level of security, and this latest enhancement is designed to make managing vulnerabilities easier and more reliable. Here’s a deeper look at what’s new and why these changes are so important for your organisation’s security posture.

What's new in Active Protect?

With this new update, Active Protect now delivers the following.

Improved reliability and accuracy

We’ve improved our software vulnerability report, ensuring you receive the most accurate information, exactly when you need it.

On top of this, we've reduced false positives. Active Protect now flags fewer non-issues, so you’ll only be alerted when something important needs your attention. The good news? We haven’t increased false negatives, meaning vulnerabilities are detected as reliably as ever.

Increased visibility

As part of this update, you’ll see more vulnerabilities in the system. This might seem overwhelming at first but, don’t panic, this is expected behaviour. More visibility into potential vulnerabilities means greater awareness of risks, and the ability to address them before they become a problem

Enhanced service experience

We’ve also streamlined how you access vulnerability data, delivering it faster than ever before, so you can take action quickly. This improvement helps you stay proactive and reduces response times when addressing security threats.

Why this matters

With cybersecurity threats constantly evolving, it’s more important than ever to stay ahead of potential vulnerabilities.

This update is designed to give you greater control and insight into your system’s vulnerabilities, enabling you to make informed decisions and act faster to secure your environment. Whether it’s patching software, upgrading systems, or simply staying aware of emerging risks, this enhanced vulnerability reporting will empower you to take better, data-driven actions to protect your organisation.

Next Step: Update to V5

To take full advantage of these improvements, you’ll need to be running at least version 5.2.0 of Active Protect for Desktop. Devices already on version 5.0 and above will automatically update to this latest version. For devices on version 4.14.10 or earlier, a manual removal of the old version and installation of version 5.2.0 will be required (see the handy guide on how to do this here). An automated process for updating is coming in March - more information to follow.

If you need any assistance or encounter any issues during the update process, our support team is available to help.

How to update

Updating is easy. Simply follow the instructions in our handy guide to ensure your system is running the latest version of Active Protect. If you need any assistance or encounter any issues during the update process, our support team is available to help.

We’re excited to bring you these enhancements and know they'll make a meaningful impact on your security. As always, our goal is to provide you with the tools and insights you need to stay secure, stay compliant, and stay ahead of the ever-changing threat landscape.

If you have any questions or need support, don’t hesitate to get in touch. Stay secure








Introducing: The new look CyberSmart Active Protect for Mobile

Active Protect for Mobile

Today marks the launch of our new and improved CyberSmart Active Protect for Mobile application. Along with a dramatic facelift, the new app includes a range of new mobile-specific security features. Here’s everything you need to know. 

What is CyberSmart Active Protect for Mobile?

Active Protect for Mobile safeguards your devices and company data from mobile security threats while empowering employees to manage their own cyber risk.

Downloadable from your device's app store, Active Protect takes just minutes to set up. The app scans for security misconfigurations, unsafe apps, malicious content and more. And, all while ensuring the privacy of personal messages, locations, and browsing history.

Why have we relaunched Active Protect for Mobile? 

The way cybercriminals target businesses is changing. And mobile threats are at the forefront of this.

For example, 80% of phishing sites specifically target mobile devices or are designed to function on desktop and mobile. What’s more, it’s estimated that the average employee is six to 10 times more likely to fall for SMS phishing attacks than email-based attacks.

However, at the same time, there’s a lack of mobile-specific solutions designed for small businesses. So, we’ve decided to step up by overhauling our previous mobile version of CyberSmart Active Protect to ensure customers are secure no matter what device they’re using.

What’s new?

As we mentioned earlier, Active Protect for Mobile really has undergone a radical overhaul. This isn’t the place for a complete spec sheet (but please get in touch if you would like one), but here are a few of the key benefits.

Updated security controls 

Active Protect for Mobile includes a glut of new security controls. For a full run-down of the new checks, we recommend reading our guide (available on request). However, some of the top security checks include:

- Unsafe apps

- Malicious content checker

- Wi-Fi checker

- Device rooting/not jailbroken

- Security patches 

- Operating system up to date

- Timeline of device changes

- Unlock authentication

Intuitive new design

Designed with the latest UX principles in mind, our mobile app is easy to use and quick to protect your employees and customers from cyber threats.

Privacy-first 

Although Active Protect for mobile protects employees’ personal information from cyber threats just as effectively as companies’ data, it only gathers security settings. This makes it perfect for bring-your-own-device (BYOD) environments.

Brandable app

You can now add your company logo to the app and make it your own. This is ideal for managed service providers and value-added resellers looking to add our mobile app to your existing offer to customers. 

MDM compatible 

Active Protect for Mobile is compatible with all major mobile device management (MDM) software, making it simple to administer devices at scale. 

Push notifications

Push notifications keep users informed about critical security issues, in real time. So, if something changes in a device’s security, you’ll know about it immediately.

EU and UK data centres

All data is stored in UK and EU data centres and is encrypted in transit and at rest. This means company and customer security data is protected at all times.

Smart policies enabled

With our smart policies enabled for our mobile app, you’ll be able to distribute and gather company policy agreements from all employees, wherever they are, in minutes.

Connects to CyberSmart dashboard

All Security Controls are reported back to the CyberSmart web dashboard, so you can manage mobile, tablet and desktop devices from one place.

How can I get the app? 

If you’re an existing customer, CyberSmart Active Protect for Mobile can be downloaded from the Android or iOS app stores. Although, we recommend reading our knowledge base article on how to install it.

If you’re a new customer, get in touch! We’d love to talk you through Active Protect for Mobile and how CyberSmart can help you and your customers.

Introducing: The new and improved desktop app for CyberSmart Active Protect

CyberSmart Active Protect

CyberSmart is excited to announce the relaunch of our desktop app for Active Protect. Designed to safeguard users and devices from cybersecurity threats, it comes complete with cybersecurity awareness training, endpoint monitoring, device misconfiguration assessments and the ability to enforce compliance with company policies. 

How does Active Protect work?

Active Protect runs an unobtrusive agent in the background on your devices, checking configurations, training modules passed, and policies read and acknowledged. 

Once Active Protect has run its scans, passes and fails are reported back to the user and administrator(s) with tips for addressing any misconfigurations. Plus, the employee(s) responsible for cybersecurity in your organisation can view this information through several different dashboard views. 

For desktop users, the app can be downloaded via email once an administrator has sent out the enrollment link. And, for mobile, through the app store relevant to your device.

What’s changed? 

Radical redesign

The first thing you’ll notice upon opening the new and improved Active Protect is how it looks and feels. We’ve updated the design with the latest user experience (UX) principles in mind, making it easier to use than ever before. 

Renamed security controls 

We felt ‘device checks’ wasn’t clear enough so we’ve renamed them ‘security controls’ to reflect their purpose better. We’ve also renamed each check to give users a more accurate picture of their status. 

Updated security controls

All Active Protect’s security controls have been updated with new logic to help them stay up-to-the-minute with changes to manufacturers’ operating systems. This dramatically reduces the risk of false positives and makes them our most accurate security controls yet. 

Improved memory usage

Memory is an important resource for any small business. So, to free up as much as possible for our customers, we’ve rebuilt our security controls to minimise CPU usage when running a check.

Consolidated reporting

You can now see every desktop version of Active Protect in your business in one place. This makes it simpler than ever to ensure everyone in your organisation has the highest protection levels. 

Legacy devices page

Manage devices on older versions of Active Protect and give them access to the latest features and security enhancements.

Vulnerable software security control

Most excitingly of all, we’ve added a brand new security control that analyses a user's desktop for software vulnerabilities, complete with a severity rating system, so you know which fixes to prioritise first. 

Changes to security controls

As we mentioned earlier, we’ve made some changes to the names of Active Protect’s security controls. To help you avoid confusion, here’s a handy list of the changes.

CyberSmart Active Protect

How to get access

From the 24th of June 2024, all new devices will be automatically enrolled on the latest version of Active Protect. For existing devices, there are in-platform buttons and simple instructions in our Knowledge Base on how to get access to the latest version.

Cost of living CTA 3

How CyberSmart enhances protection against Qilin ransomware

Qilin ransomware

The emergence of Qilin ransomware as a formidable cyber threat requires robust cybersecurity measures. In this blog, we'll look at how CyberSmart is helping organisations defend against this sophistacted malware.

What is Qilin ransomware?

Qilin ransomware is distinguished by its advanced encryption techniques. It uses a blend of AES (symmetric) and RSA (asymmetric) encryption to secure data. This makes decryption very difficult without the corresponding keys.

Qilin ransomware is adept at exploiting unpatched vulnerabilities, allowing it to infiltrate and persist within systems undetected.

How does it get in?

Given it's sophistication, you might expect Qilin ransomware to require an eqaully refined delivery method. But that's not the case. Most Qilin attacks are launched via common phishing scams. Once in, it exploits vulnerabilities to spread quickly across systems.

Qilin’s Operational Tactics

Qilin's operational tactics are what make it so tricky to deal with. For example, it can customise its payload to avoid detection or change its approach to exploit the target's weaknesses.

It also uses lateral movement techniques to spread accross networks, encrypting valuable data and altering file extensions. This makes file recovery extremely difficult.

Global Impact

Qilin primarily targets sectors where data access is critical. These include industries like healthcare and manufacturing which offer criminals the chance for maximum disruption.

All this demonstrates the importance of an adaptive approach to cybersecurity to counter the threat – which is where CyberSmart comes in.

CyberSmart’s defensive strategies

CyberSmart's comprehensive suite of tools can significantly mitigate the risks posed by threats like Qilin. Here's how.

1. Endpoint monitoring and compliance assurance

CyberSmart Active Protect continuously monitors endpoints. This ensures that every system in your business complies with the latest security standards. In addition, it quickly identifies vulnerabilities and provides simple instructions for mitigating them – depriving Qilin of gaps to exploit.

2. Education to combat phishing

According to a study from IBM, 95% of all cyberattacks are caused by human error. And, this is especially true of ransomware attacks. CyberSmart Academy focuses on reducing human error. It does this through targeted training to help employees recognise and avoid phishing attempts and other social engineering tactics.


3. Proactive vulnerability management

Routine vulnerability scans are critical in preempting attacks. They help to identify and address the security loopholes threats like Qilin try to wriggle through.

4. Data recovery and continuity planning 

With our partners’ support, we encourage all businesses to implement data recovery and backup plans. This approach minimises the downtime and operational impact caused by a breach. So, even if the worst-case scenario happens, you’ll recover quickly.

5. Install and maintain anti-malware solutions

Although CyberSmart doesn’t directly handle malware detection, it ensures that anti-malware solutions are installed and configured correctly. Again, this provides confidence that your whole network is adequately protected.

The need for layered cybersecurity strategies

The threat Qilin poses highlights the need for a layered cybersecurity strategy. What do we mean by that?

Well, in short, protection against sophisticated ransomware is about more than anti-malware tools. Organisations must maintain rigorous update protocols, regularly monitor systems and enhance employee awareness to properly mitigate risk.

By integrating CyberSmart's advanced security solutions, businesses can strengthen their defences and ensure greater resilience against cyber threats.

Jamie Akhtar, CEO at CyberSmart, adds:
"In an era where cyber threats are increasingly sophisticated, it's vital that our defences not only match but exceed the level of threat we face. Sectors like healthcare, previously considered off-limits, are now actively targeted due to legacy systems, interconnectedness, and the necessity to restore services quickly. CyberSmart is committed to collaborating with our extensive partner network to deliver complete cyber confidence for organisations against complex threats like the Qilin ransomware. This commitment is crucial for maintaining the trust and safety of the digital systems that power our everyday lives."
SME cost of living crisis






CyberSmart announces expansion into the Australian market with HAT Distribution partnership

HAT Distribution partnership

The move will streamline and simplify Essential Eight assessment for Australian SMEs and MSPs

Wednesday 08 May 2024 – London, UK: CyberSmart, the UK’s leading provider of complete cyber confidence to UK SMEs is excited to announce its partnership with Australian technology distributor, HAT Distribution. The partnership will provide businesses in Australia with fast, hassle-free Essential Eight assessment and year-round assurance.

CyberSmart is the world’s first complete SME solution, offering all-in-one cybersecurity monitoring, optimisation and training, proven to defend against cyber threats. With its user-friendly platform, simplified progression framework, year-round protection and unlimited support, implementing Essential Eight controls has never been easier for Australian businesses.

As cybercrime escalates in Australia, with 94,000 incidents reported in 2023* alone (equivalent to one report every 6 minutes!), completing Essential Eight – the recognised Australian government standard for cybersecurity – is not just advantageous but also crucial in certain industries. CyberSmart’s solutions are specifically designed to help businesses implement these strategies effectively so they can attain and maintain a government-approved standard of cybersecurity, reducing cyber risk.

The platform is tailored for MSPs and SMEs, who represent a critical segment in the economy but often face challenges with maintaining robust cyber defences due to limited resources and expertise. With CyberSmart, MSPs can enhance their service offerings by delivering comprehensive and cost-effective solutions to their clients, while SMBs gain access to straightforward Essential Eight assessment, without the need for extensive resources. 

Australian SMEs will also gain access to CyberSmart Active Protect,  a powerful on-device agent that delivers comprehensive endpoint monitoring, risk management, policy enforcement, and cybersecurity awareness training. Active Protect regularly monitors and reports the status of a device by running through a series of security controls, identifying any vulnerabilities and providing simple step-by-step walkthroughs on how to fix them. 

Jamie Ahktar, CEO at CyberSmart said, “We’re excited to expand into the Australian market with HAT Distribution. Cybercrime is a worldwide business, and the interconnected nature of global commerce in 2024 means that the more geographies we are able to offer SMBs complete cyber confidence in, the better. Almost half of Australians reported experiencing cybercrime in 2023, and we believe that the comprehensive protection we’re bringing to the Australian market will be able to limit both the success and impact of these incidents moving forward.

Josh Gammer, General Manager of HAT Distribution said, “Amidst the ever-evolving cyber threat landscape, we are thrilled to partner with CyberSmart, a leader in cybersecurity innovation, to help more Australian businesses comply with the government’s endorsed Essential Eight framework. 

With CyberSmart, even smaller players gain access to the tools required for assessment, and for MSPs, the partnership is a consultative business opportunity to guide their clients on a transformative journey toward stronger cyber defences.”

For more information about CyberSmart’s cybersecurity solution for Australia, please visit https://www.cybersmart.com/au

SME cost of living crisis

Press release: Heightened risk of insider threats during cost-of-living crisis, according to SME study

insider threats

Our latest research (to be released as a report) reveals fear among UK SMEs about insider threats. Some key findings include:

  • Nearly half of UK SMEs (47%) believe they are at greater risk of a cyberattack since the cost-of-living crisis.
  • 38% believe this is due to increased malicious insider threats, and 35% believe it is due to negligent insider threats.
  • 1 in 4 believe staff are overwhelmed or concerned about meeting their financial commitments.
  • 20% believe employees will steal sensitive or proprietary data from the company to sell for profit or for a competitive advantage.
  • 17% believe employees will seek to harm the company's reputation due to resentment over salary cuts/stagnation and/or layoffs.

London, UK (15th June 2023) – Nearly half of UK SMEs (47%) believe they are at greater risk of a cyberattack since the onset of the cost-of-living crisis. Of these respondents, 38% believe this is due to increased malicious insider threats (i.e., disgruntled employees making decisions that are not in the best interest of the company) and 35% believe it is due to negligent insider threats (i.e., overworked or distracted employees making mistakes). This is according to a survey of a thousand SME senior leaders across the UK, commissioned by CyberSmart, the category leader in simple and accessible automated cybersecurity technology for small and medium-sized enterprises (SMEs), and conducted by Censuswide.

In light of the economic uncertainty, almost 1 in 3 employers (29%) admit that employee salaries have stayed the same: in effect, resulting in a decline of real wages to accommodate for inflation. A further 11% have even gone so far as to reduce salaries. What’s more, nearly a quarter (24%) of SMEs have hit pause on recruitment, while 16% have laid off employees for budgetary reasons.

It is no coincidence then that 1 in 4 employers (24%) are finding that their staff are overwhelmed or concerned about meeting their financial commitments, while nearly a fifth (18%) find they are feeling overworked. Moreover, 16% believe their staff are less engaged or productive due to the stress, 14% think they are more disgruntled and 11% have noticed an increased rift between senior leadership and employees.

Remarkably, employers expect their employees might engage in the following activities whilst in this unhappy state.

  • 22% believe employees will take on a second or third job during contractual hours.
  • 22% believe employees will be more likely to make mistakes such as clicking on a phishing link.
  • 20% believe employees will steal sensitive or proprietary data from the company to sell for profit or for a competitive advantage.
  • 17% believe employees will seek to harm company reputation due to resentment over salary cuts/stagnation and/or layoffs.
  • 14% believe employees will use AI such as ChatGPT to do their job for them.
  • 14% believe employees will steal money from the company or commit financial fraud.

“Not all businesses are experiencing a negative company culture as a result of the crisis. In fact, 20% believe the cost-of-living crisis has brought the company closer together and 16% of employees are becoming more motivated to impress senior leaders. Nevertheless, in times like these, it is crucial that employers are mindful of how their staff are coping,” said Jamie Akhtar, CEO and Co-Founder of CyberSmart. “It only takes one disgruntled or overworked member of staff to make a decision that could put the entire business at risk. This research highlights the importance of conducting regular security awareness training, but also the need to show up for employees with empathy and support.”

It should be noted that SME business leaders also consider external forces to be responsible for the growing risk of cyberattacks, with 32% attributing it to higher rates of supply chain fraud and 31% expressing concern about nation-state interference from hostile countries such as Russia and China.

Want to know more? Read the report in full here.

SME cost of living crisis

CyberSmart joins Kickstart’s new accelerator

Another week, another good news story at CyberSmart. We've joined Kickstart’s new accelerator. Here’s what it all means.

What is Kickstart? 

Kickstart is one of Europe’s largest innovation platforms. It helps start-ups in a variety of sectors from FinTech to food and retail to innovate and scale sustainably. 

Since its founding in 2015, Kickstart has helped create over 220 commercial partnerships and supported 323 start-ups. 

What does the accelerator involve? 

Companies selected for the accelerator take part in a ten-week programme. It’s designed to breed commercial partnerships and encourage collaboration between start-ups and Kickstart’s partners. Its partners include AXA, Co-op, Swisscom, La Mobilière, PostFinance, Sanitas, The City of Zurich, Canton de Vaud, Credit Suisse, Galenica, CSS Insurance and others.

What does this mean for CyberSmart?

We’re delighted to be picked for the accelerator's InsurTech cohort. Not only did we beat some strong competition, with applications coming from 58 countries, but we’re also set to work alongside some of the biggest names in the FinTech and InsurTech industries. 

This represents a massive opportunity for us. We’ll learn from and collaborate with some of the best. And, it’ll help us generate new ideas, refine our current products, and reach more small businesses than ever before.

All in all, it’s another step in our journey to protect every small business from cyber threats. Stay tuned for what comes next.

Protecting your business on a budget is tricky. Calling in the experts or investing in the latest tools is expensive. So what can you do? CyberSmart Active Protect secures your business around the clock with no need for costly consultants, tools or an in-house team. Try it today.

Active Protect CTA

Double delight as CyberSmart scoops two awards

We love an awards ceremony at CyberSmart. It’s a chance to wear long-neglected formal wear, snaffle a free dinner, and meet up with the people that make cybersecurity such a great industry to work in.

However, what we love even more than the glitz and glamour is winning. So imagine our delight when we were nominated for the 2022 SC Awards Europe and CompTIA Spotlight Awards and took home a gong at each. 

What were the awards?

The SC Awards Europe, run by SC Media UK, is one of the most prestigious events in the cybersecurity industry’s calendar. It aims to recognise and reward products and services that continue to stand out from the crowd, exceeding customer expectations to help defeat imminent threats and cybersecurity attacks.

The nominees and winners of these awards usually, read like a who’s who of the cybersecurity sector. So we were very happy to be nominated, particularly as we narrowly missed out on an award last year.

The Computing Technology Industry Association (CompTIA) is a global leader in the training and upskilling of IT professionals. And, it’s one of the leading voices in our sector. Perhaps unsurprisingly, this makes the organisation’s annual awards ceremony a must-attend within the cybersecurity industry. 

What did we win? 

We won both the CompTIA UK Innovative Vendor Spotlight Award and SC Awards Europe’s Best SME Security Solution award.

We’re incredibly proud to win two such prestigious awards, especially amongst such impressive competition. We’d also like to say congratulations to all the other nominees and winners.

What comes next? 

Although we’re always thrilled to win awards, our work is far from done. We won’t stop until every small business has the knowledge and protection to keep themselves safe from cyberattacks.

As we write this, SMEs are being targeted like never before and there are still too many without adequate protection. And these awards, while proving we’re on the right track, only spur us on to help more small businesses.

To find out more about what drives us, read our latest guide, The State of UK SME Cybersecurity. It’s full of useful insights on the risks small businesses face and what can be done to counter them. Get your copy here.

State of SME cybersecurity