Posts Tagged: SMEs

February 13, 2019
How long is Cyber Essentials valid for?
Following on from our last blog post, “Steps to prepare and pass Cyber Essentials” this post builds on that advice and discuses the time it takes to achieve certification. Cyber Essentials scheme encourages businesses to adopt best practices to protect themselves against common security threats. With time,[…]

February 7, 2019
Steps to Prepare and Pass Cyber Essentials
The Cyber Essentials scheme provides a basic yet effective framework for businesses to protect themselves against cyber attacks. Getting Cyber Essentials certified is one of the first steps that any organisations can take to protect their digital assets and their personal data, and for those seeking to[…]

November 24, 2018
My Business Is Scaling; How Do I Secure My Customer Data
Whether it be personal or operational, stolen data often results in disaster for small businesses. It can result in loss of revenue, customer trust, and reputation for the business. Data breaches are a growing concern for UK businesses, particularly the ones that are scaling to expand their[…]

November 23, 2018
Free Ways to Protect Your Business from Cyber Attacks
Cyber attacks have grown significantly in number over the years. Among these attacks, small businesses and startups are the most common targets. Factors such as the lack of access control or absence of an information security policy make businesses vulnerable to breaches. It has become essential for[…]

November 23, 2018
Why do businesses only care about cybersecurity once they get hacked?
Small and medium sized companies are putting a third (32%) of their revenue at risk because they are falling for some of the common misconceptions around cyber security, leaving them vulnerable to losing valuable data and suffering both financial and reputational damage. Organisations in any industry face[…]

November 22, 2018
Top 10 Antivirus Products to Use for Cyber Essentials
Keeping computer systems protected against viruses and other forms of malware is one of the first steps towards cybersecurity for an organisation. This is one of the five key requirements of the Cyber Essentials scheme that organisations need to fulfil. The most effective strategy for meeting this[…]

November 21, 2018
6 steps to deal with a GDPR subject access request (SAR)
A Subject Access Request (SAR) is the Right of Access allowing an individual to obtain records to their personal information, held by an organisation. GDPR, which became applicable in May earlier this year, provides individuals with the right of access to information. It is essential that your[…]

November 20, 2018
Cyber Essentials Network Firewalls Explained 🔥
One of the five major controls for the Cyber Essentials Scheme is to configure and deploy a network firewall. A firewall is a network security system that creates a buffer zone between your company’s network and external networks. In the simple terms, a secure zone is created[…]

November 19, 2018
Free Information Security Policy for Startups
A major challenge for startups is figuring out how to invest in cybersecurity. Despite the financial constraints, it is essential for startups to keep their online security in check, because the consequences are frightening. Statistics show that about 50% of all cyber attacks target small businesses and[…]

November 16, 2018
4 Ways to Get Your Information Security Policies Under Control
An information security policy is a set of rules and guidelines that an organisation issues for securing its confidential data. Employees of the organisation should understand and follow the information security policy. In this article, we list effective ways that you can use to develop a information[…]
Tags
Accelerator
Anti-Virus
Antivirus
AWS
Charities
Compliance
Cyber
Cyber Essentials
Cyber Security
Cyber smart
CyberSmart
Cylon
Data Protection
education
firewall
GCHQ
GDPR
IASME
Identifi Global
Information Security
ISO27001
IT Security
Legal Sector
Malware
Mr. Robot
Next Generation
Partner
Partner Hub
Password
Password Manager
Patching
Podcast
Policy
Secure Architecture
Security Fixes
Security Tips
SMBs
SMEs
Spies
Startup
Subject Access Request
university
Updates
User Access
Wayra