GDPR Services/Data Privacy Services
|GDPR Worryless Data Privacy Officer (DPO) as a Service||managed serviceVSC-DPO-S|
|Easy GDPR Readiness Assessment Audit||project serviceVSC-GDPR-A|
|Cyber-Security Audit Bundle||project serviceVSC-RKS-A|
|Cyber-Security Managed Information Protection Service||managed serviceVSC-RKS-S|
|New Integrated Cyber-Physical Security Audit||project serviceVSC-PS-A|
|CyberSecure Construction||project serviceVSC-CSC-A|
|Industry 4.0 Cyber-Security Resilience Audit||project serviceVSC-I4.0-A|
|ResisTest—Cyber-Security Red Team Exercise||project serviceVSC-RT-A|
|Information System Penetration Testing Service||project serviceVSC-PT-A|
|Cyber-Security Incident Handling Service||project serviceVSC-IH-A|
|Digital Forensics Service||project serviceVSC-DF-A|
|VORAS Consulting® Cyber-Security Panic Button||managed serviceVSC-PB-S|
|CyberSecurity Awareness Training and Testing as a Service||managed serviceVSC-SATT-T|
|Advanced Cyber-Security Training for Cyber-Security Expert Practitioners||managed serviceVSC-SSTE-T|
ISO Management System Services
|ISO/IEC20000-1 Requirements-Based Service Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO20K-I|
|ISO9001 Requirements-Based Quality Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO9K-I|
|ISO 22301 Requirements-Based Business Continuity Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO22301-I|
|ISO/IEC27001 Requirements-Based Information Security Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO27K-I|
Tools and Software
|Advanced VORAS Consulting® Governance, Risk and Compliance (GRC) System||managed serviceVSC-eGRC-S|
Industry Specific Services
|CISO as a Service for Financial Institutions||managed serviceVSC-CISO-FIN-S|
|DPO as a Service for Financial Institutions||managed serviceVSC-DPO-FIN-S|
|ISO/IEC27001 for Automotives||project serviceVSC-ISO27K-AUTO-I|
|Ultimate Business Operations and Information Protection System for Aviation||managed serviceVSC-RKS-AVIA-S|
|Integrated ISO/IEC27001 and ISO/IEC20000-1 Management System for Internal IT Departments or IT Service Providers||project serviceVSC-IMS-IT-S|
|Software Security Assurance for IT Software Developers||project serviceVSC-SS-IT-DEV-S|
|Critical Business Operations and Information Protection System for Nuclear Power Facilities||managed serviceVSC-RKS-NUK-S|
|Business Resilience and Information Protection Assurance for Defence and Intelligence Organisations||managed serviceVSC-RKS-DEF-S|
The Stats —
On average, a company is attacked by hackers every 14 seconds. Information is encrypted and made useless unless a ransom is paid so it can be decrypted by special software, provided by the hackers. The affected company cannot use e-mail, loses access to their day plan, production stops, marketing stops and sales operations stop.
Examples of Cyber Security Breaches
|Industry/Company/Location||Values and Damage scale||Period of attack|
|Public-sector organisations /Port of San Diego/US 2018||$30 million Direct costs – plus any ransoms paid|
$8 billion economic impact on the San Diego region
|Airline/Cathay Pacific 2018||Has been hacked and some 9.4 million customers may have had their most personal data stolen||Over 6 months|
|Tesco Bank 2018||£2.5m to reimburse the 20,000|
£16.4 fine for data breach
The Scale of Cyber Breaches
In 2015 alone, cyber-criminals caused more than
£3 Trillion in losses worldwide
– an amount close to the UK’s GDP in 2018. By 2021 it is expected that these losses will reach £6 Trillion – something the UK and Germany mutually predict. (Source: Cybersecurity Ventures Official Annual Cybercrime Report).
Cyber Threat Reality – A Preventative Strategy is the Best Approach
It is no longer a question of whether your business will be attacked or not; it is more a question of how you will respond when it happens, and what can be done to minimise negative outcomes.
Practice shows that preventing cyber-attacks is over 10 times less expensive than dealing with the consequences of an attack. You might recognise that the same approach is true in healthcare or finance too.
Stakeholders Affected by Cyber Risks
- Supply chains
Why Choose a Managed Service?
Managing cyber-security risks can be expensive and often difficult to achieve, due to the skills and resources needed to implement, maintain, and retain control of the IT environments which become cyber-attack targets.
Cyber-security management requires a mature team of specialists familiar with, and staying up to date on, the techniques used to gain access to networks and make ransom attacks.
Our managed service is offered as a standalone, or as the natural next stage following a security and requirements audit.
How our Managed Cyber-Security Service Works
Our managed service is typically deployed over 3 to 6 months (depending on the scale and number of locations). We create a project plan and assign a team. We then complete an audit, which will identify items to be verified on the network (all owned and BYOD equipment are verified separately), and we then install and roll out a monitoring and management framework. Vulnerabilities and issues that are identified from the audit process will be escalated immediately based on the risk levels. Once the Cyber-Security Managed Service is implemented, your organisation is protected with an optimal approach to the risks and effects of cyber-attacks.
We agree reporting, management and escalation levels, and complete monthly status briefings. We are available 24/7, and your organisation is protected by an insured cyber-security service.
The Cyber-Security Guarantee
With our Managed Cyber-Security Service, backed by your choice of insurance levels, you have the ability to turn unknown cyber-security risks and effects into a fixed cost-to-risk management system. This means that, in the event you suffer cyber-security issues, you have a guaranteed, financially backed, technical solution to fight your cause and fund the required costs up to the limits you select, from £250,000 to over £1m.
Additional Benefits of our Managed Cyber-Security Service
- Once we have completed your Cyber-Security Service implementation, you then have the key building blocks to apply for ISO 27001
- We can assist you in your application for ISO certification
- We are also able to extend our service and include IT NOC support, with any break-fix being completed by you locally
What is the Right Approach to Cyber Threats?
- Assume attacks will be made
- Protect against human failings
- React quickly to threat risks
- Complete a thorough security audit and repeat checks
- Build your own security centre of excellence, or better still use a managed cyber-security service
- Seek ISO 27001 as a means of achieved and endorsed data security standard