It is unfortunate but in todays digital world every business no matter on size, sector or location is vulnerable to cyber attacks, therefore putting layers of protection in place backed by some sensible policies will make sure you are not the easy target, however there is a fine line between the right level of protection and becoming over protective and implementing ‘business disablers’, after all we all still need to be able to do our work and keep our customers happy while being as secure as possible.
Using NJC to implement Cyber Essentials will offer you a good level of protection and ensure you are not the easy target, this can be done in a very cost effective manor, we will work with your existing in house IT or your external provider to secure your systems and network and obtain your certification, having an objective third party outside audit of your systems will provide you the level of confidence you require in your cyber attack protection.
Why use us?
Since 2002 NJC have been providing Managed IT services to companies of all sizes, in 2017 we made a decision to move into the Cyber Security side of IT after 15 years of providing sensible security to our customers and never having a security breach we would like to share our experience and best practice with everyone.
What we do differently
We are always looking to be different from others, providing extra value to our customers, if you use our services to provide you with Cyber Essentials you will receive regular updates on issues that could affect you, we will also let your IT people know of any new threats and advise on how to add protection for your systems, we believe this to be invaluable to ensuring you stay protected in an ever changing world.
A major area of any Cyber defence is the human element, you will be given early access to training events and material provided by us to ensure you keep your human side of cyber protection fully informed and trained on sporting potential issues before they arise, and when they do happen knowing how to respond to limit the impact on the business.
The Benefits of a Cyber Essentials Certification
Show commitment to security
To win public sector work
Safeguard commercially sensitive data
Attract new business
Gain independently verified accreditation
Protect your company’s profits and reputation
Clear system view
Why did hackers target us?
because you were vulnerable!
Hackers go for the easy targets, and then use the information gained to create more targeted attacks.
A simple 5 step approach
Of Breaches are due to weak or stolen passwords
of businesses have a formal policy that covers cyber security risks
of businesses have spent money on their cyber security, most of it after a breach!
of breaches are related to staff receiving fraudulent emails
The 5 Steps to Cyber Protection
User Access Control
Secure Client Configuration
Virus and Malware Protection
Our experience is that most businesses have these steps in place already, some are better than others but formalising these as part of your Cyber Policy will provide a better level of protection.
The most common types of breachesThis highlights how, as well as having good technical measures in place, the awareness and vigilance of all staff are important to a business’s cyber security.
- staff receiving fraudulent emails 72% 72%
- viruses, spyware and malware 33% 33%
- people impersonating the organisation in emails 27% 27%
- Ransomware 17% 17%
We've Rethought Cyber Security
a question you’d like answered or would just
like an informal chat, contact us.