Email Twitter LinkedIn Google Plus Hamburger
Incident Response
Get in touch

Security Testing

Discover security vulnerabilities before attackers do. Understand and prioritise remediation by finding out how your apps, systems and people respond to real world attack scenarios. Wherever your data assets are, they need constant protection from an ever-changing threat landscape.

Discover security vulnerabilities before attackers do. Understand and prioritise remediation by finding out how your apps, systems and people respond to real world attack scenarios. Wherever your data assets are, they need constant protection from an ever-changing threat landscape.

Cyber Essentials

Safeguard your organisation from the most common cyber threats and demonstrate to customers that your commitment to cyber security meets Government backed standards.

Cyber Essentials represents a baseline level of security that all organisation should aim to meet. The scheme distils five essential elements from the National Cybersecurity Centre’s 10 Steps to Cyber Security:

  • Secure configuration
  • Boundary firewalls and Internet gateways
  • Access control and administrative privilege management
  • Patch management
  • Malware protection

Focus on achieving your core business objectives with confidence knowing your organisation is protected from the majority of internet based cyber-attacks with Commissum’s CREST-accredited Cyber Essentials Certification service. It is quick and simple to achieve. Get Certified Now!

Cyber Essentials is designed to fit any organisation, with pragmatism paid to smaller enterprises. There are two tiers in the scheme that represent increasing rigour of assessment and standards of security.

  • Cyber Essentials - Based on an independently checked self-assessment and an external technical Vulnerability Assessment
  • Cyber Essentials Plus - an independently tested and verified external and internal assessment, offering a higher level of assurance

For smaller organisations and those in the third sector, a good starting point is to consult the online guides to establish the basics for yourself. Available documents include:

Find out how we provide our clients with advanced security.

READ OUR CASE STUDIES

In order for this site to work properly, and in order to evaluate and improve the site, we have placed cookies on your computer.

That's fine!