N C X G r o u p

Loading

Companies are at risk now more than ever before.
Doing nothing is no longer an option.

Over the past few years, there has been a significant increase in cybercrime targeting non-enterprise companies. Two factors contribute to this rising epidemic. First is the rise of cryptocurrencies, which has enabled anyone in the world to receive a sum of money without being identified or held accountable (e.g., ransomware). Second, there is the increased focus on security by the enterprise sector, which means that targeting a large number of small to mid-market businesses has become far more effective than attacks aimed at high-security large companies.

60% go out of business

60% of small businesses who experience a breach go out of business within 6 months.

90% due to human error

Over 90% of breaches are the result of human error. All it takes is one person clicking one wrong link.

Target small to mid-market

These are often the easiest targets. Almost half of all recorded cyber attacks are targeted against SMEs.

Step One: Assess your cyber security maturity level.

Complete the cyber maturity assessment to visualize your risk and
benchmark against similar businesses.

Step Two: Implement our cyber security kickstarter toolkit.

Please see a list below of the categories covered in our security framework. Each category contains professionally prepared, ready to use policy templates, actionable checklists, and vetted vendors.

Cyber Security Overview

Covering cyber security basics and base policy documents every business should have.

Information Security

Action steps to define what information is important and how that information should be handled.

Authentication Security

Steps to review and implement strong/robust authentication security for all systems and staff.

Network and WiFi Security

Actions to ensure that your networks are configured and maintained with cyber security considerations.

Email Security

Actions to ensure the company's email security is robust and defends you from the most common threats.

Software Security

Actions to ensure that software and operating systems are configured and maintained to ensure security.

Internet Security

Secure your web browsers, and implement controls to ensure safe internet usage by all staff.

Website Security

Actions to ensure the security and availability of your website environment.

Device Security

Actions to ensure that your company's devices are safe both in and out of the office.

Anti-Virus Protection

Actions to review and implement best practice endpoint protection and management.

Removable Media

Ensure that all staff have an understanding of the risks of removable media and safe behavior.

Regulatory Requirements

Actions to ensure you operate within applicable local and international privacy/security regulations.

Remote Working

Actions to ensure staff are aware of safe behavior and systems are set up correctly for remote connection.

Disaster Recovery

Actions to test and implement a robust and reliable disaster recovery system.

Incident Response

Process to ensure, that should an incident occur, you have a clear course of action to follow.

Security Awareness

Actions to address your human cyber risk and foster a cyber aware culture.

Operational Security

Actions to ensure that your operational team has resources and procedures to be cyber safe.

Policy Library

Actions to ensure you have clear, meaningful policies to address and reduce your cyber risk.

Step Three: Distribute security awareness posters.

Keep cyber security front of mind with engaging awareness posters around the office.
Get access to a collection of print-ready high definition posters.

Cyber security should be easy and accessible to everyone!

We are offering this comprehensive package of tools as we are passionate about helping all businesses lift their cyber posture!

Cyber Maturity Assessment

Answer our cyber maturity assessment and get a clear understanding of your cyber maturity level!

Cyber Security Policy Documents

Forget spending thousands on legal fees. Use our kickstarter toolkit wth ready to edit policy templates and operational checklists.

Awareness Posters

Change internal culture and keep cyber security front of mind with our awareness posters

Monthly Cyber Newsletter

Stay up to date with the latest cyber security threats and news with our monthly newsletter delivered directly to your inbox.

Cyber Risk Dashboard

Monitor your progress and identify areas of risk on our cyber risk dashboard. Export your risk profile directly from our reporting suite for management and board reporting.

Phishing / Training

We offer premium services for phishing simulations and online awareness training. Speak to our team once you are ready to get started.