Integrated solutions are your best bet!


Repeated cyber breaches highlight the urgent need to enhance data management and cybersecurity. Growing threats pose serious operational and financial risks to businesses. National and economic security rely on robust critical infrastructure. To build strong cyber defences, focus on Assessment, Endpoint protection, Education, and Insurance.
TimeBomb.I15.sm
Every14

seconds there is a hack

USBStick.G12.sm
25575

records in average data breach

MessageAlert.H03.sm
92

percent of malware is from Emails

BriefcaseMoney.H03sm
100000

dollars SME's lost by ransomware


CyberProtect 360: Simple to implement


CyberProtect 360: Multi-layered cyber defence


Cyber Audit

You cannot defend against vulnerabilities you don't know about

Through a holistic cyber audit, an organisation can confidentially determine where improvements are required to strengthen cyber defenses. The audit platform includes recommendations, implementation and compliance management, steps to follow and templates, example policies and procedures to support a poorly resourced sector.

Elements of DP360 include
  • Identify your vulnerabilities.
  • Address and manage exposures with workflow, including task assignment.
  • Historical records.
  • Reporting.
  • Third party exposure.
  • Comprehensive recommendations.
  • Insurance requirements.
  • Compliance management with workflow.
  • Human weaknesses.
Conduct Audit

Endpoint Protection

The most vulnerable component needs layered protection

CyberProtect 360 Endpoint Protection offers a solution that includes endpoint systems protection, incident response and basic monitoring in a single cohesive security package. The solution to provide endpoint (PCs, Laptops etc.) protection includes at a minimum; .

  • Real-time malware protection.
  • Vulnerability scanning.
  • Enhanced EDR solutions.
  • Exploit prevention.
  • Protection from Zero day threats.
  • Monitoring & reporting.
  • Layered proactive defence.
Read more

Cyber Education

Failing to educate staff cyber threats will leave SMEs vulnerable.

Failing to educate staff on hacking and cyber threats will leave SMEs vulnerable to simple and mostly avoidable threats. It follows that over a third of cyber claims in 2016 may have been avoided if cyber education and training was put in place for staff. CyberProtect 360 has an education platform that delivers training in 10-15-minute bite-sized modules, these modules raise the level of cyber awareness of staff and support the development of another layer of cyber defence.

  • Reducing human error.
  • Legal responsibilities.
  • Empowering staff.
  • Phishing Simulations.
  • Dark Web breach exposure.
  • Personal responsibility for data protection.
  • Read more

Cyber and Data insurance

There is no 100% defence against cyber-attack

It is clear there is no 100% defence against cyber-attack. As part of a holistic business cyber mitigation strategy, a bespoke cyber insurance policy will help to offset the high costs of providing incident response services and associated costs relating to a cyber breach event.

  • Incident reponse.
  • Legal and regulatory support.
  • Sophisticated and affordable protection.
  • Crisis management.
  • Read more

Domain & Email Protection

Partnering with Trusted Sender – Domain and Email protection & monitoring.

Trusted Sender Network is a subscription software service for the management of email and domain security. The software is based on but not limited to the algorithm that provides the free Trusted Sender Score service.

  • Secure domains.
  • Cloud based protection.
  • Email authentication.
  • Reputation management.
  • Spam reduction.
  • Protection against spoofing.
  • Read more

Here are a few questions worth knowing about

1Why do I need cybersecurity?
The increased reliance on information based systems and infrastructure make society and economies more vulnerable to cyber attacks. Who cares? How does that impact my business? Both the volume and sophistication of rapidly evolving cyber threats pose enormous risk to all business, from the smallest business run from home to the largest enterprise spread around the globe. Most businesses, including yours, is not prepared for a cyber attack and the impact it will have. Building a pro-active, pre-breach cyber defense is mandatory, if you you want to stay in business post breach.
2I have anti-virus software, isn't that enough?
Traditional anti-virus software misses around 40% of malware attacks that are caught by next gen malware platforms using behaviour based approaches. It only takes one malware attack to succeed to put you in a whole world of pain.
3How at risk is my business from a cyber attack?
Here is some sobering statistics:

  • Almost 50 percent of small businesses have experienced a cyber attack
  • More than 70 percent of attacks target small businesses
  • As much as 60 percent of hacked small and medium-sized businesses go out of business after six months

At some point you will be attacked, simple. Defending against that attack is imperative, responding to the attack is critical. That response will either minimise and contain the impact or exponentially increase it.
4Full cybersecurty is too expensive, how can I afford it?
It will surprise you how affordable a holistic cybersecurity program is. CIS have developed a strong layered cyber defense program that includes insurance. Talk to us to find out more.
5I don't have the skills or resources to do proper cybersecurity, where does that leave me?
You don't want a company that comes in, installs some software and disappears. A company claiming to specialise in one field without offering additional products or support services can't provide the protection you need.
6I'm only a small business, what does a hacker want from me?
Cyberattacks put your money, data and IT equipment at risk. If a hacker gains access to your network, they could do a lot of damage with what they find, such as:

  1. Access to client lists
  2. Customer credit card information
  3. Your company's banking details
  4. Your pricing structure
  5. Product designs
  6. Staff and client personal information
  7. Expansion plans
  8. Manufacturing processes

These attacks don't just put your company at risk, either. Hackers may use their access to your network as a stepping stone into the networks of other companies whose supply chains you're part of.
7What are the real impacts of an attack?
A cyberattack can drastically impact your business. In fact, 60% of small businesses that fall victim to an attack shut down within six months after the breach. While that may be the most devastating result of the attack, there are other consequences that your business could experience, including the following:

  • Financial losses from theft of banking information
  • Financial losses from disruption of business
  • High costs to rid your network of threats
  • Damage to your reputation after telling customers their information was compromised
8So what can I do?
That's where CIS can really help you. The key cyber areas that need addressing are:

  • Perform a risk assessment
  • Educate your people with cyber awareness
  • Protect your endpoints and data
  • Get cyber insurance that is affordable and works for you