
GDPR
What is GDPR and what are its implications?

Cyber Essentials
We provide practical advice and assistance to companies wishing to achieve a Cyber Essentials or Cyber Essentials Plus Certificate., which demonstrates to your clients, suppliers, stakeholders and employees that you take their data protection seriously, that you have recognised the threat and acted dutifully on their behalf.

Firewalls, AntiVirus and Malware Protection Software
We install suitable firewalls and provide the latest business-class antivirus and malware protection to protect every device in your business from infections such as viruses, spyware and malware. To control your risk, we can set the software’s advanced features to change log-ins, use web filtering to restrict websites visited (eg shopping, leisure), restrict use of social media websites and monitor browsing.

Automated off-site online backup
Data can be lost when hardware or systems fail. Our encrypted online backup keeps a daily copy of your data to give you peace of mind and ensure your business is compliant with government mandates. Your data is stored in a highly secure Tier 3+ Surrey datacentre to which we have access 24/7. We can swiftly restore data in the event of your server, pc or laptop failing or being lost or stolen. Data is encrypted with military grade AES-256 encryption.

Patch management
In order to get the best performance from your computer, and most importantly, to stay protected against cyber-attacks and malicious threats, you should not neglect any critical software updates. Using an unpatched/outdated computer is like living in a house with no locks on the doors, inviting unwanted intruders. When you ignore updates on your computer, you leave your computer open to infection. Cybercriminals depend on the apathy of users around software updates to keep their malicious endeavour running.
Patch management involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system. Tasks include maintaining current knowledge of available patches, deciding what patches are appropriate for particular systems, ensuring that patches are installed properly, testing systems after installation, and documenting all associated procedures, such as specific configurations required.