Cookie Consent by Free Privacy Policy Generator

CYBER SECURITY SERVICES

TO GOVERNMENT

Delivering NCSC/CPNI specific services to Government Departments, their associated agencies and other public sector bodies.



CYBER SECURITY SERVICES

TO INDUSTRY

We are industry leaders in our respective fields. We hold industry sector cybersecurity and information assurance best practice senior certifications.



Arrow Down











CYBER SECURITY SERVICES TO GOVERNMENT

In addition to Cyber Guarded delivering cybersecurity services to industry, we also deliver NCSC/CPNI specific services to Government Departments, their associated agencies and other public sector bodies.

As a NCSC Certified Company, we provide the following core services to UK Government Departments, their agencies and other public sector bodies to include but not limited to:

  • NCSC CHECK IT Health Checks through
  • NCSC Certified Professional Cyber Services
  • Risk Management Accreditation Document Set (RMADS) Production
  • Critical National Infrastructure (CNI) Security Assessments
  • NHS Cyber Security Testing and Information Assurance Services

AUDIT | DEFEND | COMPLY












CYBER SECURITY SERVICES

TO INDUSTRY

CYBER ESSENTIALS / CYBER ESSENTIALS PLUS

Certification body for Cyber Essentials Plus & IASME
Cyber Essentials is a government backed, industry supported scheme to help organisations of all sizes protect themselves against the most common cyberattacks. The Cyber Essentials scheme focuses on a set of five key security controls which, when implemented correctly, will mitigate against the most common cyber threats, particularly those requiring low levels of attacker skill and which are widely available online.



Cyber Security as a Service / CSaaS Continual Vulnerability Assessments

Carrying out monthly internal, external or cloud vulnerability assessments, effectively placing a seasoned pentester within your organisation month on month. Can be securely deployed using several methodologies to suit each organisation’s requirements.



WEBSITE APPLICATION & MOBILE APPLICATIONSECURITY

We undertake website, web application and web portal security testing to identify security vulnerabilities in web enabled resources and use the test results to provide detailed remediation actions for each discovered vulnerability.

NETWORK AND INFRASTRUCTURE SECURITY

We assess and examine network devices to confirm proper software updating and configuration actions are undertaken, ensuring the network infrastructure is secure, resistant and reliable.

NETWORK PERIMETER VULNERABILITY ASSESSMENT (PENETRATION TEST) - VAPT

Network perimeter security testing is a method of evaluating the security of a computer network by simulating the attacks normally utilised by a malicious attacker.

MOBILE DEVICES SECURITY

Malicious actors are constantly finding new ways to compromise business networks. Evolving methods favoured by adversaries are increasingly attacking improperly secured commonly used mobile devices such as, tablets and smart phones.

CLOUD SECURITY

CyberGuarded Cloud security assessments assist organisations identify cloud security and privacy risks. Our security experts review fourteen critical areas of cloud computing security exposure. We provision our proprietary Security Assessment Scorecard to identify key weaknesses in an organisation’s infrastructure.

CRITICAL NATIONAL INFRASTRUCTURE (CNI) SECURITY ASSESSMENTS

Our SCADA/ICS CSSA–Certified SCADA Security Architect consultants are specialists in Critical National Infrastructure (CNI), Industrial Control Systems (ICS) and SCADA security within the Energy and Utilities sector.

WIRELESS SECURITY

A Cyber Guarded wireless security assessment is a comprehensive review of the client wireless network architecture. During this assessment our security consultants perform a wireless discovery internally and externally to determine the presence of networking devices providing wireless connectivity and review management controls and processes implemented to ensure effective protection and safeguards are in place.

SECURITY CODE REVIEW

In any software development life cycle (SDLC), security code review is paramount. Performing security activities across the development life cycle is proven to be cost-effective when compared to tentative high level design security considerations by developers under pressure to develop functional and user accepted solutions.

MALWARE ANALYSIS AND REVERSE ENGINEERING

We carry out both static and dynamic malware analysis in order to determine the behavior of the malware propagation and payload and to understand any potential impact to a system. We simulate the impact of tampering or triggering such malware in a scenario which best corresponds to the target environment and provide feedback on removal or mitigation techniques.

SOCIAL ENGINEERING (CYBER)

In a social engineering test, we identify an organisation’s user base and, if required, third party suppliers using various methods including the collection of public information freely available from the Internet. Using this publicly available data, we attempt to garner sensitive information about a target within the organisation, including methods such as direct in-person contact, telephone calls and emails, to interact with the organisations user base.

UK GAMBLING COMMISSION IT SECURITY TESTING AND AUDIT SERVICES

For holders of all remote gambling operator licences including specified remote lottery licences, CyberGuarded’s security testing professionals and ISO27001 lead auditors work with organisations to implement, develop and be ‘audit ready’ to meet the UK Gambling Commission’s IT Security Testing & Audit standards and requirements.



CYBER INCIDENT RESPONSE & DIGITAL FORENSICS

Our Incident Response and Digital Forensics services use computer investigation and analysis techniques to determine the methodology of how a security incident, such as computer crime, misuse of IT assets or theft of sensitive data, occurred and to provide any necessary evidence for legal or internal administrative use.



ISO27001 ALIGNMENT, GAP ANALYSIS AND IMPLEMENTATION

Our experienced consultants lead organisations through the initial introductory phases of ISO 27001, including demonstrating the advantages of compliance to business stakeholders as well as IT stakeholders. We assist internal teams in the implementation of the standard.



AUDIT / DEFEND / COMPLY

Recognition for our work
We have worked on an extensive range of cybersecurity projects within both the public and private sectors throughout the UK, Ireland and Europe.

We have long term partnerships with many clients who recognise the need to “Audit, Defend,Comply”.



SURREY
Cyber Guarded
11 Church Road
Great Bookham
Surrey
KT23 3PB

Tel. +44 (0)845 004 6118
Email. info@cyberguarded.com

BELFAST
Cyber Guarded Ltd
Innovation Factory,
Forthriver Business Park,
Belfast.
BT12 7DG

Tel. +44 (0)845 004 6118
Email. info@cyberguarded.com

DUBLIN
Cyber Guarded
6-9 Trinity Street
Dublin 2
County Dublin
Republic of Ireland

Tel. +353 (0)1 617 7847
Email. info@cyberguarded.com