Cybersecurity 101

How long do you have to respond to a Subject Access Request (SAR)?
September 3, 2019

How long do you have to respond to a Subject Access Request (SAR)?

The ICO (Information Commissioner’s Office) has updated its guidance (August 2019) on the timescale for a Subject Access Request (SAR).  First of all, what is a Subject Access Request (SAR)? Under the General Data Protection Regulation (GDPR), an individual can request a copy of the data an[…]

by
Back to School: Free tips and tricks to protect your business from cyber threats
September 3, 2019

Back to School: Free tips and tricks to protect your business from cyber threats

All through September, we will be sharing the free tips and tricks, that you can implement straight away to ensure your organisation protects itself from cybersecurity threats. Currently in the UK, 32% of SMEs experience cyber-attacks every year, a figure that is increasing, with costs running into[…]

by
Every device. Every user. Everywhere.
June 27, 2019

Every device. Every user. Everywhere.

CyberSmart has a bold mission to protect and empower SMEs. In order to do so, we need to provide continuous compliance through the entire organisation. This is no small feat, as today’s organisations have diverse systems and modern ways of working. We are extremely excited to announce[…]

by
Cyber Essentials: A BIG step in the journey towards GDPR compliance
May 23, 2019

Cyber Essentials: A BIG step in the journey towards GDPR compliance

GDPR, became a legal requirement in May 2018, and was put in place to bring transparency to, and homogenize, data privacy laws for citizens in the European Union. The regulation holds organisations responsible for data breaches and imposes heavy fines on them if they are found guilty[…]

by
Which businesses is Cyber Essentials mandatory for?
February 22, 2019

Which businesses is Cyber Essentials mandatory for?

Cyber Essentials is the UK Government-backed scheme that aims to help organisations protect themselves against common cyber threats. Organisations who achieve Cyber Essentials demonstrate they have considered and committed to bolstering their defences against common threats of cybercrime and reduce vulnerabilities of businesses to an accredited government[…]

Why Cyber Essentials is Important for SMEs
February 19, 2019

Why Cyber Essentials is Important for SMEs

Over the last few years, cyber attacks have become an imminent danger for businesses. With this growing threat, cybersecurity is now a responsibility rather than a luxury. Despite this, most SMEs are at risk of being breached either through a lack of awareness or the lack of[…]

How long is Cyber Essentials valid for?
February 13, 2019

How long is Cyber Essentials valid for?

Following on from our last blog post, “Steps to prepare and pass Cyber Essentials” this post builds on that advice and discuses the time it takes to achieve certification. Cyber Essentials scheme encourages businesses to adopt best practices to protect themselves against common security threats. With time,[…]

Steps to Prepare and Pass Cyber Essentials
February 7, 2019

Steps to Prepare and Pass Cyber Essentials

The Cyber Essentials scheme provides a basic yet effective framework for businesses to protect themselves against cyber attacks. Getting Cyber Essentials certified is one of the first steps that any organisations can take to protect their digital assets and their personal data, and for those seeking to[…]

My Business Is Scaling; How Do I Secure My Customer Data
November 24, 2018

My Business Is Scaling; How Do I Secure My Customer Data

Whether it be personal or operational, stolen data often results in disaster for small businesses. It can result in loss of revenue, customer trust, and reputation for the business. Data breaches are a growing concern for UK businesses, particularly the ones that are scaling to expand their[…]

Free Ways to Protect Your Business from Cyber Attacks
November 23, 2018

Free Ways to Protect Your Business from Cyber Attacks

Cyber attacks have grown significantly in number over the years. Among these attacks, small businesses and startups are the most common targets. Factors such as the lack of access control or absence of an information security policy make businesses vulnerable to breaches. It has become essential for[…]

Why do businesses only care about cybersecurity once they get hacked?
November 23, 2018

Why do businesses only care about cybersecurity once they get hacked?

Small and medium sized companies are putting a third (32%) of their revenue at risk because they are falling for some of the common misconceptions around cyber security, leaving them vulnerable to losing valuable data and suffering both financial and reputational damage. Organisations in any industry face[…]

Top 10 Antivirus Products to Use for Cyber Essentials
November 22, 2018

Top 10 Antivirus Products to Use for Cyber Essentials

Keeping computer systems protected against viruses and other forms of malware is one of the first steps towards cybersecurity for an organisation. This is one of the five key requirements of the Cyber Essentials scheme that organisations need to fulfil. The most effective strategy for meeting this[…]

6 steps to deal with a GDPR subject access request (SAR)
November 21, 2018

6 steps to deal with a GDPR subject access request (SAR)

A Subject Access Request (SAR) is the Right of Access allowing an individual to obtain records to their personal information, held by an organisation. GDPR, which became applicable in May 2018, provides individuals with the right of access to information. It is essential that your organisation is[…]

Free Information Security Policy for Startups
November 19, 2018

Free Information Security Policy for Startups

A major challenge for startups is figuring out how to invest in cybersecurity. Despite the financial constraints, it is essential for startups to keep their online security in check, because the consequences are frightening. Statistics show that about 50% of all cyber attacks target small businesses and[…]

4 Ways to Get Your Information Security Policies Under Control
November 16, 2018

4 Ways to Get Your Information Security Policies Under Control

An information security policy is a set of rules and guidelines that an organisation issues for securing its confidential data. Employees of the organisation should understand and follow the information security policy. In this article, we list effective ways that you can use to develop a information[…]

What’s the difference between Cyber Essentials Vs. ISO 27001 Vs. PCI DSS
November 14, 2018

What’s the difference between Cyber Essentials Vs. ISO 27001 Vs. PCI DSS

Cyber security is a growing need for SMEs, particularly because of the regulatory demands that enforce information protection. Regardless of their size or industry, SMEs face similar risks. Governments and regulating bodies come up with various standards such as Cyber Essentials to make sure that everyone has[…]

by
Understanding GDPR Data Controller in 5 easy steps
July 16, 2018

Understanding GDPR Data Controller in 5 easy steps

Understanding GDPR Data Controller in 5 easy steps   We’ve all heard of GDPR but in case you haven’t, it is a piece of legislation enacted by the European Union which strengthens and prevent the misuse of data of EU residents. If you have failed to adequately make[…]

by
9 Secrets To Make Your Medtech Startup Compliant
July 3, 2018

9 Secrets To Make Your Medtech Startup Compliant

Running a startup is hard especially in a heavily regulated sector like MedTech and because of the nature of the industry and the types of data Medtech startups typically handle it’s even more important to do compliance the right way. While you may be compliant with CQC[…]

by
How could Cyber Essentials certification benefit your customers?
June 18, 2018

How could Cyber Essentials certification benefit your customers?

Cyber Essentials is a UK-Government-backed cyber-security scheme which encourages businesses to take steps in order to prevent and protect themselves against the threat of cyber-attack. What you might not be aware of, however, is how beneficial a Cyber Essentials certification can be for you and your customers.

by
Who’s ready for GDPR?
May 18, 2018

Who’s ready for GDPR?

In this podcast, our co-founders Jamie Akhtar and Mariella Thanner had a chat with James Gill from GoSquared about the topic of the month: GDPR! And CyberSmart’s story 🙂

by
What GDPR is going to look like in practice
April 30, 2018

What GDPR is going to look like in practice

Speaking at the lecture for the Institute of Chartered Accountants in England and Wales in London earlier this year, Elizabeth Denham of the ICO, discussed the role of accountability in GDPR and how people must adjust their mindsets in regard to how we think about data protection[…]

by
The 5 control areas of Cyber Essentials (minus the technical jargon!)
April 11, 2018

The 5 control areas of Cyber Essentials (minus the technical jargon!)

Step 1 to CE: Boundary Firewalls and internet gateways A firewall or gateway protects internal networks and systems against unauthorised access from the internet. They are designed to provide a basic level of protection for internet users. All business networks should have a properly configured firewall in[…]

by
Four steps towards GDPR
February 27, 2018

Four steps towards GDPR

The ICO (Information Commissioner’s Office) has produced a checklist, highlighting the main steps organisations can take immediately to prepare for the GDPR, which will apply from 25th May 2018. It is important to use this checklist and other ICO resources to identify the main differences between the[…]

by
Cyber Security Standards 101
January 29, 2018

Cyber Security Standards 101

The cyber security sector is a pretty crowded place when it comes to different standards, certifications, rules and regulations.

by
5 security tips to kick off the New Year
January 17, 2018

5 security tips to kick off the New Year

Here’s what everyone should be doing in 2018 in terms of cyber security and data protection:

by
Time for the UK education sector to prioritise cybersecurity
January 9, 2018

Time for the UK education sector to prioritise cybersecurity

As you probably know already, schools and universities are not immune to attacks from disgruntled employees or other insiders. However, there is another key issue for school leadership teams that is unique to the education sector: students!

by
Cyber Security in the Legal Sector
December 12, 2017

Cyber Security in the Legal Sector

The legal sector remains a hot target for the full spectrum of threat actors; cyber-criminals, hacktivists, state-sponsored groups. This is largely due to the wealth of sensitive data held within the industry. That includes; patent data, merger and acquisition information, protected witness information and negotiation information. The[…]

by
Tax experts under income-tax lens for valuation
December 8, 2017

Tax experts under income-tax lens for valuation

Business software is helps your company grow without limits and take an unique performance of software fields, obira is a social collaboration of dropbox software platform, that employees really love to use, with rich personalized interface Objectively innovate empowered manufactured products whereas parallel platforms. Holisticly predominate extensible[...]

by
GDPR: What is it and why is it important?
November 16, 2017

GDPR: What is it and why is it important?

The GDPR is Europe’s new framework for data protection laws – it replaces the previous 1995 data protection directive, which current UK law is based upon.

by
Why every company should get Cyber Essentials
November 2, 2017

Why every company should get Cyber Essentials

Don’t risk it – Cyber secure it! Cyber threats are affecting businesses of all sectors and sizes, reducing productivity and costing millions. And it is a problem that is getting worse, not better. 

by
Cyber Security Policies 101 – Info Sec Policy
October 5, 2017

Cyber Security Policies 101 – Info Sec Policy

Simple policies your company can introduce today to stay protected tomorrow! Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started. At CyberSmart believe that Cyber Security[…]

by
Five simple steps to (actually) securing your company’s sensitive information
September 28, 2017

Five simple steps to (actually) securing your company’s sensitive information

Ignore this at your peril… You’ve built a business, solved a problem, hired a team and planned for your future. There’s only one thing that can bring your empire crashing down before you can say “two-factor authentication”, and that’s a data leak. Since we’re literally obsessed with[…]

by
Cyber Security 101 – Passwords
September 20, 2017

Cyber Security 101 – Passwords

Simple controls your company can implement today to stay protected tomorrow! Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started. At CyberSmart believe that Cyber Security[…]

by
Tips for a successful ISO 27001 implementation
September 7, 2017

Tips for a successful ISO 27001 implementation

Top tips from our ISO 27001 certification process as a SMB:

by
Ciao Compliance™ – Traditional compliance is dead
September 1, 2017

Ciao Compliance™ – Traditional compliance is dead

In cyber, traditional compliance models are ineffective, inefficient and can sometimes cause a headache. So we decided to say CIAO to traditional compliance.

by
Cyber Essentials and Charities
August 25, 2017

Cyber Essentials and Charities

Charities to benefit from Cyber-Security campaign We are thrilled to be partnering with IASME and Tresor Security to offer discounted Cyber Essentials Certifications for £225 plus VAT (instead of £300 plus VAT) and FREE platform use for one year for registered charities.

by
One more GDPR post
August 17, 2017

One more GDPR post

At every cyber security event, people talk about the new General Data Protection Regulation (GDPR). It seems as the Cyber Security industry is obsessed with this new law and makes sure that everyone else knows about it too. Companies, consultants and lawyers are hopping on the GDPR[…]

by
Cyber Security 101 – User Access Control
August 8, 2017

Cyber Security 101 – User Access Control

Simple controls your company can implement today to stay protected tomorrow. Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get started. At CyberSmart, we believe that Cyber Security[…]

by
Using AWS and automated deployment processes securely
July 21, 2017

Using AWS and automated deployment processes securely

(1) AWS: Remove (or do not generate) root account access keys To access Amazon Web Services (AWS), an access key is required to verify your identity and the identity of your applications. An access key consists of an access key ID and a secret access key. Anyone[…]

by
What is Cyber Essentials?
July 12, 2017

What is Cyber Essentials?

The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement of the basic controls all organisations should implement to mitigate the risk from common internet based threats, within the context of the Government’s 10 Steps to Cyber[…]

Cyber Security 101 – Updates
July 7, 2017

Cyber Security 101 – Updates

Simple controls your company can implement today to stay protected tomorrow! Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started. At CyberSmart believe that Cyber Security[…]

by
Cyber Security 101 – AVs
June 29, 2017

Cyber Security 101 – AVs

Simple controls your company can implement today to stay protected tomorrow! Cyber Security and Data Protection can be overwhelming. There is an enormous amount of advice on the Internet, but it is quite difficult to know how to get to started. At CyberSmart believe that Cyber Security[…]

by
Why you don’t need the Next Generation Cyber Solutions
May 30, 2017

Why you don’t need the Next Generation Cyber Solutions

With the latest media attention on cyber security incidents and data breaches, I hope you agree with me when I say that we are past discussing the importance of data protection and cyber security. If you still think cyber security is not relevant for start-ups and SMBs,[…]

by
Introducing the new Cyber Essential Standard
March 2, 2017

Introducing the new Cyber Essential Standard

Easier, better and more cloud-friendly Almost three years after its inception, the UK Government has released the first update to the Cyber Essentials Scheme. The new standard aims to increase the adoption rate amongst businesses by making the guidelines more relevant and easier to understand.

by
Is Cyber Essentials really effective?
November 12, 2016

Is Cyber Essentials really effective?

Case studies around the effectiveness of Cyber Essential Controls The Cyber Essentials scheme was developed by the UK Government. The scheme provides a clear statement of the basic controls all organisations should implement to mitigate the risk from common Internet-based threats. The Government believes that implementing these[…]

by

Get the latest from CyberSmart, straight into your inbox