top of page
Green filtered picture of the inside of St Albans church

What We Do: Our Services

Services

Cyber Security & Resilience Services 

Our integrated range of cyber security services are designed to help businesses assess, build and manage online networks. They also assist businesses and their staff to have the right strategies to respond to incidents efficiently and so migrate any potential damage a cyber-attack may create.

 

Through Cyber PATH, local university students are trained and mentored by senior ethical hackers, to deliver all our services and to work with staff to build their cyber awareness, understand the latest cyber threats and secure the business's online environment. 

​

You can find further details about Cyber Path through the National Cyber Resilience Centre Group.

CyberPath_Main_HighRes_edited.png
Training - Eastern Cyber Resilience Cent
Security Awareness Training

The training is focused on those with little or no cyber security or technical knowledge and is delivered in small, succinct modules using real world examples.

Training is developed to what you need and can be in person or virtually.

​

​

Cyber Security Services - Eastern Cyber Resilience Centre .png
Corporate Internet Investigation

A comprehensive review of publicly available information about your business using internet search and social media tools. It is primarily focused on identifying any information that could be used by cyber criminals to craft an attack.

security.png
Security Policy Review 

A Security Policy Review offers a review of your current security policy, how it is written and how it is implemented.

​

​

Cyber Security Services - Eastern Cyber Resilience Centre .png
First Step Web Assessment

The First Step Web Assessment (FSWA) is a service to assess your website. FSWA is considered an initial light touch assessment of the website compared to the complete Web App Vulnerability Assessment service offered, offered at a fixed price.

​

​

Cyber Security Services - Eastern Cyber Resilience Centre
Remote Vulnerability Assessment

Remote vulnerability assessments are focussed on identifying weaknesses in the way your organisation connects to the internet. Service reporting will provide a plain language interpretation of the results and how any vulnerabilities might be used by an attacker, as well as simple instructions on how any vulnerabilities might be fixed.

Cyber Security Services - Eastern Cyber Resilience Centre .png
Cyber Business Continuity Review 

A Cyber Business Continuity Review offers a review of your business continuity planning and the resilience of your organisation to cyber-attacks such as ransomware or when attackers take control of your core systems.

​

​

​

Cyber Security Services - Eastern Cyber Resilience Centre .png
Web App Vulnerability Assessment

This service assesses your website and web services for weaknesses. The service reporting will describe in plain language, what each weakness means to your business and the risks associated with each. Service reporting will include plans and guidance on how to fix those weaknesses.

​

Cyber Security Services - Eastern Cyber Resilience Centre .png
Internal Vulnerability Assessment

The service will scan and review your internal networks and systems looking for weaknesses such as poorly maintained or designed systems, insecure Wi-Fi networks, insecure access controls, or opportunities to access and steal sensitive data.

​

​

Cyber Security Services - Eastern Cyber Resilience Centre .png
Individual Internet Investigation

The information gathered in this type of investigation might be used to support pre-employment checks, to manage potential threats to a Director of an organisation or their families, or to understand more about a specific person of interest.

Police CyberAlarm

Police CyberAlarm (PCA) is a free tool to help your business understand and monitor malicious cyber activity.

 

PCA acts like a like a CCTV Camera, monitoring the traffic seen by a member's connection to the internet. It will detect and provide regular reports of suspected malicious activity, enabling organisations to minimise their vulnerabilities. The system is designed to protect personal data, trade secrets and intellectual property.

​

PCA is a monitoring system, and does not interfere with normal network operations. To register as a member of Police CyberAlarm, you will require the following:

​

  • A standalone firewall

  • An Information Commissioner's Office (ICO) Number

  • Be responsible for the data which you are sharing

  • Have a virtual or physical machine with 2GB RAM 2CPU Cores and 25GB HDD

​

Police Cyber Alarm-Master Logo_edited.pn
bottom of page