Cyber Services

An affordable low touch solution


Repeated cyber breaches into organisations demonstrate the need for a relook at how data is managed, and cybersecurity improved. Cyber threats continue to grow at an alarming rate and represent one of the most serious operational and financial risks facing business (Williams, Manheke 2010). The national and economic security of all nations depends on the reliable functioning of critical infrastructure in the face of such threats. Beyond critical infrastructure, the economic vitality of countries and organisations depends on the sustainable operation of organisations of all types, particularly business (Day, 2000). From the research, there are four main areas that need to be addressed to build a strong cyber defence for the organisation. They include Assessment, Endpoint protection, Education and Insurance.
Every14

seconds there is a hack

25575

records in average data breach

92

percent of malware is from Emails

100000

dollars SME's lost by ransomware


CyberProtect 360: Simple to implement


CyberProtect 360: Multi-layered cyber defence


Cyber Audit

You cannot defend against vulnerabilities you don't know about

Through a holistic cyber audit, an organisation can confidentially determine where improvements are required to strengthen cyber defenses. The audit platform includes recommendations, implementation and compliance management, steps to follow and templates, example policies and procedures to support a poorly resourced sector.

Elements of DP360 include
  • Identify your vulnerabilities.
  • Address and manage exposures.
  • Historical records.
  • Reporting.
  • Third party exposure.
  • Comprehensive recommendations.
  • Insurance requirements.
  • Compliance management.
  • Human weaknesses.
Read more

Endpoint Protection

The most vulnerable component needs layered protection

CyberProtect 360 Endpoint Protection offers a solution that includes endpoint systems protection, incident response and basic monitoring in a single cohesive security package. The solution to provide endpoint (PCs, Laptops etc.) protection includes at a minimum; .

  • Real-time malware protection.
  • Vulnerability scanning.
  • Web security.
  • Exploit prevention.
  • Protection from Zero day threats.
  • Monitoring & reporting.
  • Layered proactive defence.
Read more

Cyber Education

Failing to educate staff cyber threats will leave SMEs vulnerable.

Failing to educate staff on hacking and cyber threats will leave SMEs vulnerable to simple and mostly avoidable threats. It follows that over a third of cyber claims in 2016 may have been avoided if cyber education and training was put in place for staff. CyberProtect 360 has an education platform that delivers training in 10-15-minute bite-sized modules, these modules raise the level of cyber awareness of staff and support the development of another layer of cyber defence.

  • Reducing human error.
  • Legal responsibilities.
  • Empowering staff.
  • Legal responsibilities.
  • Phishing Simulations.
  • Dark Web breach exposure.
  • Personal responsibility for data protection.
  • Read more

Cyber and Data insurance

There is no 100% defence against cyber-attack

It is clear there is no 100% defence against cyber-attack. As part of a holistic business cyber mitigation strategy, a bespoke cyber insurance policy will help to offset the high costs of providing incident response services and associated costs relating to a cyber breach event.

  • Incident reponse.
  • Legal and regulatory support.
  • Sophisticated and affordable protection.
  • Crisis management.
  • Read more

Domain & Email Protection

Partnering with Trusted Sender – Domain and Email protection & monitoring.

Trusted Sender Network is a subscription software service for the management of email and domain security. The software is based on but not limited to the algorithm that provides the free Trusted Sender Score service.

  • Secure domains.
  • Cloud based protection.
  • Email authentication.
  • Reputation management.
  • Spam reduction.
  • Protection against spoofing.
  • Read more

Here are a few questions worth knowing about

1Why do I need cybersecurity?
The increased reliance on information based systems and infrastructure make society and economies more vulnerable to cyber attacks. Who cares? How does that impact my business? Both the volume and sophistication of rapidly evolving cyber threats pose enormous risk to all business, from the smallest business run from home to the largest enterprise spread around the globe. Most businesses, including yours, is not prepared for a cyber attack and the impact it will have. Building a pro-active, pre-breach cyber defense is mandatory, if you you want to stay in business post breach.
2I have anti-virus software, isn't that enough?
Traditional anti-virus software misses around 40% of malware attacks that are caught by next gen malware platforms using behaviour based approaches. It only takes one malware attack to succeed to put you in a whole world of pain.
3How at risk is my business from a cyber attack?
Here is some sobering statistics:

  • Almost 50 percent of small businesses have experienced a cyber attack
  • More than 70 percent of attacks target small businesses
  • As much as 60 percent of hacked small and medium-sized businesses go out of business after six months

At some point you will be attacked, simple. Defending against that attack is imperative, responding to the attack is critical. That response will either minimise and contain the impact or exponentially increase it.
4Full cybersecurty is too expensive, how can I afford it?
It will surprise you how affordable a holistic cybersecurity program is. CIS have developed a strong layered cyber defense program that includes insurance. Talk to us to find out more.
5I don't have the skills or resources to do proper cybersecurity, where does that leave me?
You don't want a company that comes in, installs some software and disappears. A company claiming to specialise in one field without offering additional products or support services can't provide the protection you need.
6I'm only a small business, what does a hacker want from me?
Cyberattacks put your money, data and IT equipment at risk. If a hacker gains access to your network, they could do a lot of damage with what they find, such as:

  1. Access to client lists
  2. Customer credit card information
  3. Your company's banking details
  4. Your pricing structure
  5. Product designs
  6. Staff and client personal information
  7. Expansion plans
  8. Manufacturing processes

These attacks don't just put your company at risk, either. Hackers may use their access to your network as a stepping stone into the networks of other companies whose supply chains you're part of.
7What are the real impacts of an attack?
A cyberattack can drastically impact your business. In fact, 60% of small businesses that fall victim to an attack shut down within six months after the breach. While that may be the most devastating result of the attack, there are other consequences that your business could experience, including the following:

  • Financial losses from theft of banking information
  • Financial losses from disruption of business
  • High costs to rid your network of threats
  • Damage to your reputation after telling customers their information was compromised
8So what can I do?
That's where CIS can really help you. The key cyber areas that need addressing are:

  • Perform a risk assessment
  • Educate your people with cyber awareness
  • Protect your endpoints and data
  • Get cyber insurance that is affordable and works for you