Protect against Cyber Attacks

Choose a level of protection to learn more

Cyber criminals are more active than ever, infiltrating organisations, stealing and ransoming data.  Protect your: 

• Clients
• Data
• Identities
• Financial
• Operational Uptime
• Reputation

Nothing can guarantee you won’t be hacked. But you can, and must, mitigate your cyber-risk.

Cyber Security needs to be layered.  It is much like home security: key lock, deadlock, chain/bolt, alarm and now cameras.  Each layer adds an obstacle, but that is all they are. None of them alone will stop someone going in. It hopefully turns them away to find an easier target.

Even the base standard of Multi Factor Authentication is not enough.  There are now 51 ways to hack MFA and they range from very sophisticated to simple user hacks.  

Here it is, easy to find, on Amazon!
https://www.amazon.com/Hacking-Multifactor-Authentication-Roger-Grimes/dp/1119650798

Choose a protection level:

Security S1 plan

Including Anti-malware, URL protection, ATP, Darkweb Monitoring, Exception Alerting, Phishing Tests and Security Briefings.

WE CONSIDER S1 AS THE MINIMUM LEVEL SECURITY MEASURES ORGANISATIONS SHOULD BE TAKING.

Security S2 plan

S1 plus Advanced EDR, Shadow IT Detection, Password Vault, Data Leak Protection, Breach Activity Scans and Deep Vulnerability Scans.

IF YOUR ORGANISATION RELIES ON DATA FOR ONGOING OPERATION OR REPUTATION, YOU SHOULD HAVE S2 LEVEL PROTECTION.

Download our latest executive “10 minute” briefing to share with colleagues

Your First Name (required)
Your Last Name (required)
Your Email (required)
Your Telephone (required)
Your Company (required)

Read some of the latest news on Cyber-Security

Bad news email attachments

Bad news email attachments

Some emails are more than just bad news No one likes bad news! But sometimes it can’t be helped. Sometimes it sneaks up on you. One of the most common ransomware attacks is through a compromised attachment in an email. It’s easy to say “only open stuff you expect” but...

When you willingly share data, how do you stop it leaking?

When you willingly share data, how do you stop it leaking?

Data Leak Protection (DLP) is the name of several policies in Office 365, setting up what data can, and can't be, shared and with whom. Imagine being able to automatically identify private information like passport numbers, Health IDs or bank account details and make...

Newsflash – US Nuclear secrets leaked online through Shadow IT

Newsflash – US Nuclear secrets leaked online through Shadow IT

This sounds like a nightmare that could never happen. US soldiers have been putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’ . It is alleged that US Soldiers...

“LOCK ‘EM UP AND THROW AWAY THE KEYS”

“LOCK ‘EM UP AND THROW AWAY THE KEYS”

   Password Vaults and You With more and more websites necessary for our everyday activities, it’s getting harder and harder to manage passwords. By now, you will know not to write passwords on post-it notes and paste them on your screen. Its not uncommon for...

Google Releases Security Updates

Google Releases Security Updates

 Chrome security fixes Google has released Chrome version 91.0.4472.101 for Windows, Mac, and Linux. This update includes 14 security fixes. Out of the 14 fixes, 1 is considered to be critical in nature. If you are supported by KARE Core Fundamentals or Premium KARE...

You probably have a cyber-insurance problem, but don’t know it

You probably have a cyber-insurance problem, but don’t know it

  Good practice last year isn’t good enough anymore.  Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims. With the number of claims skyrocketing insurers are increasingly asking, "What did you do to...