Consulting Services

Security focused

We follow the principle of the Cyber Essentials scheme (UK Government initiative). A cyber security standard, which organisations can be assessed and certified against. It identifies the security controls that an organisation must have in place within their IT systems in order to have confidence that they are addressing cyber security effectively and mitigating the risk from Internet-based threats.

During any consultancy project as part of our commitment to best practice we review the following five essential mitigation strategies.

▪ Boundary Firewalls and Internet Gateways
▪ Secure Configuration
▪ Access Control
▪ Malware Protection
▪ Patch Management

It provides organisations with clear guidance on implementation as well as offering independent advice on overall security principles.

Whilst providing a basic but essential level of protection, the Cyber Essentials scheme enables organisations that believe they are practicing robust cyber security to benefit by making this a unique selling point thereby enabling business to demonstrate to their customers that their data is adequately protected and that they take cyber security seriously.

Protect your business from cyber threats

One in four businesses reported a cyber breach or attack in the past 12 months.

Cyber criminals are after your money, your data and your intellectual property. If you haven’t taken steps to protect yourself, take action now. It’s easy to get good, basic protection in place with Cyber Essentials.

Assess how cyber secure your business is by using our quick self-assessment questionnaire.

Cyber attacks cost organisations like yours thousands of pounds and cause lengthy periods of disruption. Do you have a plan for what you would do if your customer database was stolen, your website was forced offline, or you couldn’t access your email or business-critical data?

Cyber criminals don’t just attack banks and large companies - they target any organisation which isn’t properly protected, even small businesses - like yours.

The majority of cyber attacks exploit basic weaknesses in your IT systems and software. Cyber Essentials shows you how to address those basics and prevent the most common attacks. The scheme is designed by Government to make it easy for you to protect yourself.

Why should I get Cyber Essentials

Cyber Essentials helps prevent the vast majority of cyber attacks. Even a simple virus or piece of malware could result in loss of company and client data, disrupt your cashflow and take up staff time. An attack could also put off your customers, stop you trading and damage your hard-earned reputation. It could also be reported in the local media. Loss of data could breach the Data Protection Act and lead to fines or prosecution.

Protect your organisation against common cyber threats
Show your customers you take this issue seriously
Enable you to bid for Government contracts.
Since October 2014 Cyber Essentials has been mandatory for suppliers of Government contracts which involve handling personal information and providing some ICT products and services. Holding a Cyber Essentials badge enables you to bid for these contracts.

DLP Consultation

Data Loss Prevention - (DLP)

Many DLP implementations are solely technology focused, resulting in incomplete, inefficient, and costly implementations.

The key to a successful DLP Program is buy in from the business - after all, DLP is a business tool not just a security technology.

We can help bridge the gap between business and IT so that a clear understanding of requirements and expectations from both business and IT is understood and agreed - on the onset.
Our DLP consultants support customers in developing the framework for the integration of DLP technology within an organisation’s processes and people.

We recommend every engagement includes a dedicated Project Manager.

We can help with strategic planning and deployment of large scale implementations, upgrade, and customisation services.
We help bridge the gap between successful technical implementations and end-to-end business process integration.

SIEM Consultation

Security Incident & Event Management (or Security Information & Event Management)

Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organisation’s information technology (IT) security. The acronym is pronounced "sim" with a silent e.

The underlying principle of a SIEM system is that relevant data about an enterprise’s security is produced in multiple locations and being able to look at all the data from a single point of view makes it easier to spot trends and see patterns that are out of the ordinary.

SIEM combines SIM (security information management) and SEM (security event management) functions into one security management system.

A SEM system centralises the storage and interpretation of logs and allows near real-time analysis which enables security personnel to take defensive actions more quickly. A SIM system collects data into a central repository for trend analysis and provides automated reporting for compliance and centralised reporting. By bringing these two functions together, SIEM systems provide quicker identification, analysis and recovery of security events. They also allow compliance managers to confirm they are fulfilling an organisation's legal compliance requirements.

Sounds straight forward. The real challenge however is buy in from each silo'd department within the enterprise. From Firewall / IDS/IPS admins, network engineers, Wintel / Linux admins, AD admins, Application owners and a host of other endpoints. Once you've got the buy in, you now have to work with each team to configure their devices to talk to your SIEM agents/collectors and ultimately retained within the SIEM Database....

Then its the, 'what do you want stage'. We have all this data - what do you want to do need to with it ? Compliance, SOC use, security, audit, vulnerability management.

A SIEM deployment is never a quick project and it isn't a short one. Clearly identifying whats to be collected and for what purpose is essential. Scoping out what will the end result be is the only way a SIEM project will be successful.

When you hear of project scope creep - SIEM projects are notorious for just that !

Copyright© 2016 Secure Comms. All rights reserved. Secure Comms, the Secure Comms Logo and Secure Comms Services that are referred to or displayed in this site are trademarks of Secure Comms Partnership. All product information is subject to change without notice. VAT Registered in England and Wales No. 156070816