Cyber Security

  • PCs, Laptops and Mobile devices and routers may seem to be working well, but all devices have an End of Service life (EOS). Our Lifecycle check will expose the devices that no longer receive manufacturer updates and may be a security risk to your company. It also helps you plan your IT upgrade budget, ensuring the least secure devices are replaced first in your 3-5 year cycle.

  • Human error is a major contributor to Cyber incidents. Our training will help your staff conform to your security policy and avoid the common mistakes that can be so costly. The training also covers the password management awareness, which is mandatory for Cyber Essentials certification.

  • Policy documentation is an important part of your Cyber security practices. The policy outlines your company's Cyber strategy, the rules under which you operate and the expectations put upon staff, suppliers and contractors. Without a policy, no one knows what to do so it is important that it reflects your business processes. Templates cribbed from the Internet may not address your needs. Your policy must be representative and must be socialised within your organisation. We will check your policy and provide detailed update guidance.

  • Most companies have moved IT processes into cloud resources. Management of these opportunities must be as rigorous as if they were managed in-house. Cyber security, user access controls and authentication processes must be recorded and understood in order to successfully protect your business information assets. We can help you assess your cloud controls to make sure they are effective.

  • A key element of Cyber security is to ensure that IT services and information are only accessible to authorised users. The authentication protocols and access rights are critical to ensuring information is protected. Databoard can review your current authentication services to ensure they are commensurate with the criticality of the services and data they protect.

  • During 2022, Cyber essentials was enhanced significantly. We see many companies fail the new standard 'Evendine' due to a lack of preparation. An analysis of the standard against your operating practices, equipment and software will result in a readiness report exposing remediation requirements prior to application.

  • No one can guarantee that their clients will pass Cyber Essentials as the client must make the application themselves and must attest to its accuracy. Databoard will provide guidance every step of the way and pre-assess the application. We have over 5 years of experience guiding our clients in this way; our assessors are qualified by IASME, the National Cyber Security Centre's partner.

  • Preparing for Cyber Essentials Plus is important as there are time constraints to the auditing process. Our pre-scanning service will greatly reduce the number of issues detected by the Cyber Essentials Plus testing as we use the same scanning technologies.

  • Once your initial pre-assessment scan results are established and remediation exercises are complete, this second scan verifies that the remediation has been successful and will indicate if any issues persist, such as registry entries that have failed to be removed or legacy user roaming profiles harbouring old version applications.

  • No one can guarantee that their clients will pass Cyber Essentials Plus as the client hardware and software is audited on site. Databoard will provide guidance every step of the way and pre-assess the application, which be will tested independently. We have over 5 years of experience guiding our clients in this way; our assessors are qualified by IASME, the National Cyber Security Centre's partner.