Cyber Advisory Service

Cyber Advisory Service

For Business

I need General Advice

Did you know?

60% of small businesses reported a security breach in 2014 and only 26% of businesses use the Government’s Ten Steps guidelines.

I need General Advice

Did you know?

70% of companies where security policy was poorly understood suffered staff-related breaches, compared to 41% where the policy was well understood

I need General Advice

Can’t find the answer you’re looking for? Submit your own query and ask our Advisory Partners!

Menu

Please complete the below form to continue with your question


Get Instant Answers to your popular questions

All the FAQs in Terminology

What are the 10 Steps to Cyber Security?
The 10 Steps to Cyber Security are guidelines from the Government on the steps businesses should take to protect themselves against cyber threats. Click e...
What is a subject access request?
This request is submitted by a customer or client who wants to see what information your business has about them.  The person is also allowed: ...
What is the Data Protection Act?

The Data Protection Act is legislation outlining how personal information is to be used by organisations. There are 8 data protection principles, which ...

What is online banking?
Online banking is a system which allows payments and bank activities to be performed online, without the need to physically visit a bank....
What is a Social Networking website?
A social networking website is a website which allows users to communicate with peers, and post content such as text, images and videos. ...
What is information access management, and why is it important?
Information access management involves defining who has access to certain information, and who doesn’t. This is often defined by different access levels....
What is remote access?
Cloud computing allows a user to access files and programs using the internet, rather than storing the data on your hard drive (where data is usually store...
What is the Cloud?
Cloud computing allows a user to access files and programs using the internet, rather than storing the data on your hard drive (where data is usually store...
What is Penetration testing?
Penetration testing (also known as a “pentest”) involves simulating an attack on a system to assess its resilience. Pentests are used to find weaknes...
What is a disaster recovery plan?
A disaster recovery plan is a documented set of procedures which outline how to recover the organisation in the event of a disaster. A good disaster recove...

Threat Alerts

CAS
Ministry of Justice faces £180,000 fines from the ICO for lost hard drives #infosec #cybersecurity http://t.co/cHOISl4Oas
CAS
Sony had a turbulent extended weekend when their PS network was hacked. Did this affect your Sunday gaming plans? http://t.co/h8qxLonO7x
CAS
43% of theft/loss occurs in the victim's work area. Make sure your desk is clear before leaving work tonight!
I've suffered a cyber breach! Help!