Services

Cyber Essentials Residential Tier

What we offer in this service:

1. IDENTITY – Identity breach assessment & protection

At CyberSure we offer ‘Proactive’ and ‘Reactive’ models on our Identity breach assessment and protection service.

Proactive : Our ‘Proactive’ service includes automatic notification when a breach is found and informs the impacted parties so they can take action to stop the bad actors using their credentials. An application is installed on nominated devices where you can monitor the number of assigned identities within the same application. The scanning tool is always scanning the dark web to ensure you are alerted as soon as anything is found. There is a subscription charge for this service and is calculated per user, with each user having the ability to include up to seven identities. This service is slightly more advanced as identities can include more than email ID. We proactively check the dark web for your passport number, driving licence details and many more. 

Reactive : Our ‘Reactive’ service is a one time search through our dark web search engines to check for leaked credentials on the dark web. This is done as a one time exercise and you are notified of anything that may have been impacted in the past but does not actively monitor or alert you.

2. NETWORK – Home LAN security assessment & recommendations

We often forget about the important role our home Wifi routers plays in our security posture within our homes. It is the first and often main firewall between our devices and the internet. We want to ensure it stays front of mind when it comes to cyber security, and we do this by carrying out necessary routine maintenance. At CyberSure we carry out these essential measures to help prevent unnecessary breaches within our home networks.

The key tasks we conduct include;
Additional independent routers can be added at $80 per appliance. Mesh networks (two or more) count as 1 appliance as they are managed by one controller.
OpenDNS Home Setup

3. ENDPOINT - Endpoint Protection

At CyberSure we believe using endpoint protection on home devices is wise for several reasons:

Protection Against Cyber Threats: Endpoint protection solutions safeguard devices such as laptops, desktops, and mobile phones from a variety of cyber threats, including malware, ransomware, and phishing attacks. These threats can compromise personal data and lead to significant financial losses. By deploying endpoint protection, users can prevent, detect, and try to prevent potential infections before they escalate into serious issues.

Enhanced Security for Remote Work: With the rise of working from home, many home devices are vulnerable as they often lack the robust security measures found in corporate environments. Many companies allow users to ‘BYOD’ Bring Your Own Device and this should be a fundamental reason why we need to deploy Endpoint protection to help continuously monitors these devices, ensuring they remain secure even when disconnected from the primary network. This is crucial as cybercriminals frequently target devices that are less protected, making home users particularly susceptible to attacks.

Centralized Management and Visibility: Many endpoint protection solutions offer centralized management capabilities, allowing users to monitor and control security across all devices from a single interface. This not only simplifies the management of security settings but also enhances visibility into potential vulnerabilities, enabling quicker action to potential threats.

Data Loss Prevention: Endpoints often store sensitive information, making them prime targets for data theft. Endpoint protection helps to monitor for malicious activities, such as data exfiltration and ransomware attacks, thereby safeguarding personal and financial information from unauthorized access and loss.

In summary, your CyberSure Community Warden is saying endpoint protection is essential for maintaining the security and integrity of home devices, particularly in an increasingly digital and remote working environment.

4. BACKUP - Setup backups (up to 2 devices per user)

Why Backups are Key to a CyberSure plan for our Home Users

Backups are a critical component of a comprehensive cybersecurity plan for home users for several key reasons:

Data Protection: Backups safeguard your important data like documents, photos, and financial information from being lost or corrupted due to hardware failures, accidental deletion, or cyber attacks like ransomware. Having a backup ensures you can restore your data if the original is compromised.

Malware Recovery: If your device becomes infected with malware, a recent backup allows you to wipe the device clean and restore your data, effectively removing the malware. This gets you back up and running quickly after an attack.

Disaster Recovery: Backups protect against data loss in the event of a disaster like a fire, flood, or theft that physically damages or destroys your devices. An off-site backup, like a cloud storage service, ensures your data is safe even if your home is impacted.

Peace of Mind: Knowing your data is backed up regularly gives you peace of mind and confidence in your ability to recover from any data loss scenario, whether accidental or malicious. This allows you to focus on enjoying your devices without worrying about potential disasters.

The 3-2-1 backup rule is a best practice for home users:

Regularly testing your backups is also important to ensure they are working properly and you can successfully restore data when needed.

At CyberSure we make backups a core part of your home cybersecurity strategy, you can effectively safeguard your data and minimize the impact of any cyber incident. Backups provide a critical safety net and disaster recovery mechanism for home users.

5. Cyber Awareness Training

CyberSure highly recommends awareness training for our residential tier customers as we now see this service as essential for home users due to the increasing prevalence of cyber threats and the significant risks they pose to personal data and security. As cybercriminals employ sophisticated tactics such as phishing and malware, understanding these threats becomes crucial for individuals to protect themselves and their families.

The training equips users with the knowledge to recognize and avoid malicious activities, thereby reducing the likelihood of falling victim to cyber attacks. For instance, many people are unaware of the common methods used by cybercriminals to steal personal information, which can lead to identity theft and financial loss. By being informed about these tactics, home users can take proactive steps to learn more about the more common techniques used by cybercriminals;

Moreover, with the rise of remote work and increased reliance on digital devices, the risk of cyber threats extends beyond the workplace into personal lives. Cyber awareness training helps users understand the importance of securing their home networks and personal devices, which is vital as many people use these devices for both personal and professional activities.

In summary, cyber awareness training is a critical component for home users to maintain a secure digital environment, protect sensitive information, and mitigate the risks associated with modern cyber threats.

Cyber Essentials – Small Business Tier

What we offer in this service:

1. IDENTITY – Identity breach assessment & protection

At CyberSure we offer ‘Proactive’ and ‘Reactive’ models on our Identity breach assessment and protection service.

Proactive : Our ‘Proactive’ service include automatic notification when a breach is found and informs the impacted parties so they can take action to stop the bad actors using their credentials. An application is installed on nominated devices where you can monitor the number of assigned identities within the same application. The scanning tool is always scanning the dark web to ensure you are alerted as soon as anything is found. There is a subscription charge for this service and is calculated per user, with each user having the ability to include up to seven identities. This service is slightly more advanced as identities can include more than email ID. We proactively check the dark web for your passport number, driving licence details and many more.

Reactive : Our ‘Reactive’ service is a one time search through our dark web search engines to check for leaked credentials on the dark web. This is done as a one time exercise and you are notified of anything that may have been impacted in the past but does not actively monitor or alert you.

2. NETWORK – LAN security assessment & recommendations

At CyberSure we have built a set of assessments for your business to ensure you can stay on top of your perimeter hardware maintenance. Our assessments are recommended to be carried out on a annual basis with the necessary recommendation if we can add value with our prevention efforts.

The key tasks we conduct include;

Switch & router assessment

3. ENDPOINT - Endpoint Protection

At CyberSure we believe Endpoint Protection is Critical for Small Businesses.

Small businesses are increasingly targeted by cybercriminals due to their typically weaker security measures compared to larger enterprises. Endpoint protection is essential for safeguarding devices like laptops, desktops, and servers that connect to the business network and store sensitive data.

Without proper endpoint security, small businesses face significant risks:
Our suggested endpoint protection’s core capabilities include:

More than just Antivirus – Endpoint Detection and Response (EDR) continuously monitors endpoints for suspicious activity and provides detailed visibility into threats, while antivirus often relies on occasional scans

Our service offers advanced incident response tools like network isolation, remote shell access, and sandbox analysis. Antivirus typically only terminates processes and quarantines files

In today’s threat landscape, endpoint protection is not optional for small businesses. By partnering with CyberSure and deploying a modern endpoint security solution, small businesses can cost-effectively shield themselves from the devastating consequences of a successful cyberattack.

4. Email – Secure Email Gateway

Email security is now deemed crucial for small businesses due to the significant risks associated with cyber threats that primarily exploit email as an entry point. Here are key reasons highlighting its importance:

High Target for Cybercriminals: Small businesses are often seen as attractive targets because they typically have fewer resources and weaker security measures than larger corporations. Approximately 43% of cyber attacks target small businesses, making robust email security essential to protect sensitive information from breaches and unauthorized access.

Prevention of Financial Loss: The financial repercussions of a data breach can be devastating for small businesses. Statistics indicate that 60% of small businesses close within six months of suffering a cyber attack. Implementing effective email security measures is a cost-effective strategy compared to the potential losses incurred from a breach .

Protection Against Sophisticated Attacks: Cybercriminals increasingly use advanced tactics such as phishing and business email compromise (BEC) to deceive employees into revealing sensitive information or making unauthorized transactions. With over 90% of cyberattacks starting with a malicious email, strong email security is vital to mitigate these risks .

Reputation Management: For small businesses, maintaining a positive reputation is critical. A security breach can lead to loss of customer trust and negative publicity, which can be particularly damaging for smaller firms that rely on word-of-mouth and customer loyalty .

Compliance and Legal Obligations: Many small businesses are subject to data protection regulations that require safeguarding customer data. Effective email security helps ensure compliance with these regulations, thereby avoiding potential legal penalties and liabilities .

That is why at CyberSure we are prioritizing email security and deem it essential for small businesses to protect their data, finances, and reputation in an increasingly digital and threat-prone landscape.

5. BACKUP - Setup backups

At CyberSure we believe backups are fundamental to small businesses for several critical reasons:

Data Protection: Backups safeguard essential business data against loss due to hardware failures, accidental deletions, or cyberattacks like ransomware. Without backups, recovering lost data can be nearly impossible.

Business Continuity: In the event of a disaster, having reliable backups ensures that operations can resume quickly, minimizing downtime and maintaining customer trust. This continuity is vital for sustaining revenue and reputation.

Cost-Effectiveness: The cost of data recovery after a loss can far exceed the investment in regular backups. By implementing a backup strategy, small businesses can save money in the long run and avoid potential financial setbacks.

Regulatory Compliance: Many industries have legal requirements for data retention and protection. Regular backups help small businesses comply with these regulations, reducing the risk of penalties.

We go by the 3-2-1 backup rule, and stand by this best practice for our business users:

By partnering with us we can deploy backups as a crucial safety net that enables your businesses to protect their data, ensure operational resilience, and maintain compliance, ultimately supporting long-term resilience.

5. Cyber Awareness Training

Cyber awareness training is essential for small businesses to effectively combat the growing threat of cyber attacks. By incorporating services such as regular awareness training and various simulation tests—email phishing, SMShing, vishing, and WhatsApp phishing—businesses can significantly enhance their security posture. Here’s why this training is vital:

Comprehensive Threat Recognition: Regular awareness training educates employees about the latest cyber threats, ensuring they can recognize and respond to potential risks. Simulation tests, including email phishing, SMShing, vishing, and WhatsApp phishing, provide practical, hands-on experience that reinforces learning and helps employees identify real-world threats.

Reduction of Security Incidents: Human error is a leading cause of security breaches. By conducting phishing simulations, small businesses can effectively measure and improve their employees’ ability to spot and avoid malicious attempts. This proactive approach helps reduce the likelihood of successful attacks, protecting sensitive data and minimizing financial losses.

Cultivation of a Security-Conscious Culture: Engaging employees in regular training and simulations fosters a culture of cybersecurity awareness within the organization. When employees understand the importance of cybersecurity and practice identifying threats, they become more vigilant and responsible, contributing to the overall security of the business.

Compliance and Risk Management: Many industries have regulations regarding data protection and cybersecurity. Implementing comprehensive cyber awareness training helps ensure compliance with these regulations while also managing risks associated with data breaches.

In summary, employing cyber awareness training that includes regular sessions and targeted simulations is crucial for small businesses to equip their employees with the knowledge and skills necessary to defend against a wide range of cyber threats, ultimately safeguarding your reputation.