CyberTEC

This Is Your Bespoke Cyber Strategy

 

From all of us at CyberTec Security, we would like to thank you for your interest in working with us. We have a vision of reducing risk by 80% for every SME in the UK and we’re incredibly grateful that you’re part of the vision.

Now. Let's Get Started.

Your Report Card

10 /10

Current Threat Score*

UK Average: /10

Our Average: 9.5/10

0 %

Current Risk Level*

UK Average: %

Our Average: 5%

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Urgency Evaluation*

0 /10
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Existing Breaches

  • Email 1
  • Web Breach 1
  • List Item #1

Culprits

  • John Snow #1
  • List Item #1
  • List Item #1

Affected Systems

  • John Snow #1

*How we calculate scores

Scored are calculated by weighing your company against all of the other companies we have dealt with.

We then take the average of the companies we deal with, the UK average and the average with our clients and accurately score your company based on where you fit into this mix.

Your existing breaches are visceral. 

They are genuine issues we have found that need solving immediately (if they haven’t been already) and based on our research we are usually able to tell you exactly who in your organisation is responsible for these breaches. Please note that they might not even know that they have had a breach themselves. The affected systems is speculatory as until we run an in-depth network analysis we cannot fully comprehend the extent of any damage.

Diving In.

Bombproof Cyber Roadmap

Your Systems For Security

0 %

of UK

businesses

were breached from

2018 - 2019*

*According to the National Cyber Security Centre

Of These

32%

0 %

Experienced a

Phishing

Attack

What Is It?

Phishing attacks intend to obtain sensitive information such as usernames, passwords and payment details. We have all received this type of email, the sender pretends to be a trustworthy entity. 

What Systems Do I Need?

1) Check the email address of the sender, the sender can show a reliable name but the email address will expose whether they are truly who they say they are.

2) Look out for poor grammar. This is often a clear indicator of a phishing scam.

3) Look out for aggressive language like “Urgent! Your account is X days overdrawn Contact us IMMEDIATELY”

0 %

suffered from

impersonation

emails

What Is It?

An impersonation email is a form of phishing that masquerades as a known and trusted individual or company. 

What Systems Do I Need?

1) Promote awareness around the office of concepts such as always ‘think before you click’ 

2) Remember to confirm emails containing sensitive data with the person through a different channel. For instance, if your Finance Manager sends you an email containing payment links, call your finance manager and hear it from their voice. 

3) Promote a cyber security culture in the workplace 

0 %

suffered from

Malware

Attacks

What Is It?

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.  

What Systems Do I Need?

1) Keep your software up to date 

2) Use anti-virus software 

3) Use a pop-up blocker such as “AdBlock” to prevent spam tabs opening 

4) Turn off automatic downloads on your browser 

0 %

suffered from

unauthorised

access

What Is It?

Physical access to a server room by a stranger or staff member with no permission are examples of unauthorised physical access. Strangers can also access your data through your company’s WiFi.

What Systems Do I Need?

1) Implement identification cards to verify people entering the premises, including visitors, contractors and personnel 

2) By installing motion detectors and alarm systems you can attain an additional level of security 

3) Implement a guest WiFi 

0 %

suffered from

hacking

of their Bank Accounts

What Is It?

Hackers bypass security encryption to gain access to your bank accounts.

What Systems Do I Need?

1) Implement anti-virus software, ensuring all software is kept up to date 

2) Install an inclusive firewall program that can pinpoint unauthorised programs attempting to transmit data over the internet 

3) Change your online banking passwords several times throughout the year, ensuring the password is secure with a long mix of numbers, letters, both capital and lowercase letters. 

Certification Strategy

Competitive Advantage Blueprint

1

Reduce Unnecessary Cost


By investing into cyber security, you will avoid losing money and time when you are breached or attacked by cyber criminals who want your data to monetise.

2

Enhance Brand Image


Make sure to put the certification logos onto your website and email signatures to show your prospects how seriously you take the security of their data.

3

Increased Lifetime Value


Make sure to tell your clients that you’re taking care of their data; they’ll be more satisfied with your service and stay with your business for longer.

Compliance Curation

Risk Reduction Insights

We're Adding Even More Value.

So you can make more informed decisions

Most Common Reasons For a Breach

Stolen passwords are one of the simplest and most common causes of data breaches. Far too many people rely on predictable phrases like ‘Password1’ and ‘123456’, which means cyber criminals don’t even need to break into a sweat to gain access to sensitive information. 

Even moderately secure passwords can be cracked with the help of a computer programmes that run through millions of the most popular credentials, so you need to think hard to create something original whenever you choose your password. You’re also vulnerable if you leave your password written down or use the same phrase for multiple accounts. 

All software has technical vulnerability that crooks can exploit in countless ways. That’s why the organisations that maintain those programs routinely look for and address exploits before they are discovered by criminals. 

Any time a vulnerability is fixed, the software provider releases a patch, which needs to be applied by the organisations that use the program. This must be done promptly, because crooks – now alerted to the vulnerability – will be actively looking for organisations that are still exposed to the threat. 

Malware is a perfect example of just how simple cyber crime can be. Crooks purchase a piece of malicious software, find a system that contains a known vulnerability, plant the malware and scoop up the rewards. 

What those rewards are depends on the type of malware. It could be anything from a keylogger, which tracks what a user types into a machine, to ransomware, which locks a system and demands payment for the user to regain access. 

Employees don’t have to act maliciously to commit a data breach. They might simply make a mistake, such as including the wrong person in the Cc field of an email, attaching the wrong document or losing a laptop. 

They could also be vulnerable to giving away information to someone they shouldn’t by being subconsciously manipulated into doing so – this is called social engineering.

How to Prevent These

Preventing breaches takes education from the ground up within an organisation. Work with your team to correctly educate them about threats and how you can prevent them. We have included a downloadable workbook and tests we will give to you for free so you can educate your staff and make an effort to become more cyber secure.

Our 5 Technical Controls

Use These As Your Technical Starting Point

(mouse over for more info)

Firewalls

Use a firewall to secure you internet connection
We require all devices that are connected to the internet to be protected with a firewall. This in its simplest form, means a buffer zone between your computer (or computers) and ‘the Internet’.

Settings

Use secure settings for your devices and software
Factory settings for hardware and software make it quick and easy to start using products. However leaving them this way makes it easier for cyber attackers to gain access to your data. We help configure your settings for security.

Access

Control who has access to your data and services
To reduce the possibility of an attacker infecting your devices, user accounts should only have access to software, settings to perform the role intended. Admin permissions should only be given to those who need them.

Viruses

Protect yourself from viruses and other malware
All devices including laptops, PC's, phones and tablets, unless protected are open to attacks using malware. Viruses and malware can infect devices and software quickly and can infect any other devices or software that is connected to it.

Updates

keep your devices and software up to date
It is important that all phones, tablets, laptops or computers are kept up to date at all times. This is because attackers will search for devices with a known fault and exploit them. Out of date systems are one of the easiest ways to infiltrate a company.

These are the 5 most vital elements to keep any business safe. Without these any other efforts you make are essentially redundant. If needed, we are a certifying body for IASME (there are only a handful of these in the UK) so we can work with you towards your certification of the government backed scheme Cyber Essentials.

(it’s highly likely this will become a legal requirement for business in the coming future)

Switch ON and listen UP.

What's Next?

Here's What You Have To Do

1

Choose Your Path

Choose from one of our three packages specifically designed to reduce your risk based upon the stage you’re at in business

2

Renumeration

Place down your deposit, agree to our simple terms and condition and make your first real step to becoming a more secure organisation

3

Download Handbook, Tests & Email

Download our employee cyber security handbook, send it to your organisation using our email template and then test your staff when the time is right.

REMEMBER!​ If we don't meet our KPI's, you stop paying us until we do!

Employee Education

We have created a simplified guide to cyber security within an organisation. Help your staff become more cyber secure by distributing it.

Our Method

1

Certify

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

2

Comply

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

3

Reduce Risk

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

You now feel fully equipped.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
John Doe
Designer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
John Doe
Designer
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
John Doe
Designer

It's Time To Make An Exciting Decision.

Here are our

Outstanding

Paths

(Built for businesses that want to scale at delightfully reasonable prices)

Your Route To Becoming

SECURE

Need Something Bespoke?

Let us know!

Let Us Tell You A Story

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
0 %
Decreased Risk
0
Attacks Prevented
0 %
Client Satisfaction

Add address

United Kingdom (UK)

Loading...

Processing Order...

Please wait while we process your payment...

Please wait while we redirect you...