CYBER ESSENTIALS CERTIFICATION
WHAT ARE THE MOST COMMON TYPES OF BREACHES OR ATTACKS?
Threats can come in many different forms and vary in severity. From hackers trying to cause harm to your business by stealing data, phishing scams to unintentional employee error.
83% PHISHING ATTACKS
27% IMPERSONATION SCAMS
9% VIRUSES, SPYWARE, MALWARE INCLUDING RANSOMWARE ATTACKS
STAY AHEAD OF CYBER-ATTACKS WITH OUR ADAPTIVE SECURITY SOLUTIONS
Detect and block phishing attacks.
Secure and compliant audit logs of all IT systems.
Allows us to detect any potential cyber threats from around the world.
DEVICE & USB CONTROL SCANNING
Minimise risks of infections and data loss with automatic scanning.
Secure backup of your Microsoft 365 mailboxes.
ADMIN ROLE TRACKING
A log of employees with admin privelages in your business.
MAIL FORWARDING MONITORING
Monitoring emails sent outwith your business to detect susupicious activity.
SECURITY AWARENESS TRAINING
Using a short gap analysis questionnaire, we will identify each users’ weakest areas of security, gathering results into their unique risk profile.
SECURITY UPDATE MANAGEMENT
Keeping your software and devices up-to-date to resist low-level cyber attacks.
Monthly security scores reports to inform you of the current state of your business’ cyber security.
Enforce multiple ways to verify the identity of a user when trying to access a protected resource.
Secure your business passwords to prevent data breaches, improve employee productivity and meet compliance standards.
OUR CYBER SECURITY PACKAGES
Ensuring that customers are protected and secure is one of the highest priorities for SoConnect. During our IT Risk Management planning we will explore cyber security with you, helping to clarify any potential risks in your IT security. We’re equipped with the latest technology to allow us to monitor your IT systems and hardware security 24/7/365, allowing our team to act fast if an issue is identified.
When it comes to security, we’re serious about keeping you safe.