We do all the work with you until you are ready to be assessed by an independent third party
It takes just three to five months for a small business to implement all security controls suggested by a Cyber Essentials audit.
The time between starting and finishing your cyber essentials audit is usually just three to five business days.
You will get your audit results in the form of a report and an Information Security Program Plan one week after finishing the audit.
The full scope of all Cyber Essential requirements, but we at Kloudwerk go the extra mile with you.
During the audit, you can and should ask us questions about each question that we ask you.
We turn the Cyber Essentials audit into a consulting session.
Auditing your technical stack is just as important as assessing your processes and procedures.
The actual processes happening in the company, not the ones you have on paper!
In the end, hackers take advantage of weaknesses in what people do and how they do it. Hackers don’t care if you are certified or not.
Sometimes we discover a customer’s environment has been breached in the past.
This is evident in traces left in the form of attack leftovers such as hidden administrative accounts or traces of attack tools.
Use this opportunity to check your environment for previous breaches.
During the assessment, take the opportunity to ask questions and get them answered by our security experts.
Every point mentioned in the “what is included” above can become a discussion topic and we will tell you all we know about potential defense strategies.
Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.
This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner
The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.
You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.
After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.