SMEs have until midday on January 5th to apply for Cyber Security Innovation vouchers worth £5,000.
With the cyber security threat set to continue to increase over the course of 2016 all businesses need to take the matter seriously. By applying for the vouchers, an SME can pay for an external expert to assist with their cyber security and help to achieve the Cyber Essentials accreditation.
What is the Cyber Essentials Scheme?
The Cyber Essentials Scheme has been developed and launched by the UK Government in 2014 in order to encourage organisations to adhere to good practice in information security and internet safety. Cyber Essentials is regarded as the base level standard of IT security which small to medium companies should meet. The Cyber Essentials framework has been created by IASMF, BSI, ISF and HMG, under the authorization of GCHQ, the information security arm of GCHQ.
Cyber Essentials is meant to fulfil two key functions:
Your free Global Geopolitical Dashboard
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Weekly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.