Our UK Cyber Essentials, Cyber Essentials Plus and ISO 27001 services
Data is one of the most important assets a business has, and protecting it from compromise, corruption or total loss is of paramount importance. The Cyber Essentials and Cyber Essentials Plus services and ISO 27001 framework exist to help organisations with their information protection needs.
Our UK Cyber Essentials and Cyber Essentials Plus services aim to protect data and programmes on networks, computers, servers and other elements of an IT infrastructure.
Our team of security and compliance experts can help businesses become certified to both frameworks, giving you and your customers reassurance that data is secure.
ISO 27001 Framework
ISO 27001 can be a complex and time-consuming activity so why not enlist the help of our security and compliance teams who, can conduct a Cyber Essentials or Cyber Essentials Plus audit, having been through our own certification process several times. They can carry out a Cyber Essentials company check and are in a great position to complete this process for you. Our UK based Cyber Essentials services can:
Establish the scope of the ISMS (Information Security Management System)
Perform a gap analysis against ISO27001 controls
Create an asset register and risk assessment
Create the policies and establish the organisation of the ISMS including roles and responsibilities
Embed the policies and procedures through staff awareness and implementation of processes
Take your business through a mock audit and prepare for ISO 27001 audit
Cyber Essentials Framework
The Cyber Essential Certification is a Cyber Essentials audit built around five basic technical controls, specifically designed to prevent the most common cyber-attacks, which include malware, ransomware, and phishing. Obtaining this standard enables certified organisations to demonstrate and reassure their customers that they are serious about safeguarding the integrity of their data.
Internet Connection
Boundary firewalls and Internet gateways
Devices & Software
Securest settings and minimum functionality
Access Control
Least privilege and reduced access control
Viruses & Malware
Protect yourself from viruses and other malware
Continuous Patching
Ensure devices and software are kept updated
Our Cyber Essentials and Cyber Essentials Plus Services Bundles
Our four bundles offer varying Cyber Essentials services with differing support levels towards obtaining your certification. Whether that’s a simple Cyber Essentials company check, or our Cyber Essentials Plus package. Each tier works to ensure you are compliant with the standards set by IASME and provides a one-time certification at the point of completion and must be renewed each year.
Managed Cyber Essential and Cyber Essentials Plus Services
Once Cyber Essentials or Cyber Essentials Plus certification has been achieved, we recommend you keep your security posture maintained to this standard on an ongoing basis using our Managed Cyber Essentials service. Our team of security experts will manage, report on, and remediate any technical issues and ensure your annual re-certification is trouble-free.
Asset discovery
Patch management
Network device management
Threat and vulnerability & scan and report
Antivirus management
Firewall NAT and access rules review and remediation
Software firewall status review and remediation
Local user account review and remediation
Security / GPO Policy review
Administrative account report
Catch22 is now Cyber Essentials Plus certified, thanks to Wanstor and its incredible UK Cyber Essentials team for guiding, assisting and working with us to the tightest of deadlines. The team have all gone above and beyond to keep Catch22 on track and get us over the line, without their dedication, long hours, and effort we wouldn’t have reached this milestone. Wanstor truly is an amazing partner and a pleasure to work with. We look forward to our next project!"
Catch22
Chat to one of our Solution Experts about how technology can enable your business.
Why should you undertake a Threat and Vulnerability Assessment?
- External scan of your network and infrastructure
- Identify known vulnerabilities and readily available exploits
- Receive tailored recommendations and remediation actions