GDPR services / Data Privacy services
|GDPR Worryless Data Privacy Officer (DPO) as a Service||managed serviceVSC-DPO-S|
|Easy GDPR Readiness Assessment Audit||project serviceVSC-GDPR-A|
Cyber Security services
|Cyber Security Audit Bundle||project serviceVSC-RKS-A|
|Cyber Security Managed Information Protection Service||managed serviceVSC-RKS-S|
|New Integrated Cyber-Physical Security audit||project serviceVSC-PS-A|
|CyberSecure Construction||project serviceVSC-CSC-A|
|Industry 4.0 Cyber Security Resilience Audit||project serviceVSC-I4.0-A|
|ResisTest – Cyber Security Red Team Exercise||project serviceVSC-RT-A|
|Information System Penetration Testing service||project serviceVSC-PT-A|
|Cyber Security Incident Handling Service||project serviceVSC-IH-A|
|Digital Forensics service||project serviceVSC-DF-A|
|VORAS Consulting® Cyber Security Panic Button||managed serviceVSC-PB-S|
|CyberSecurity Awareness trainings and testing as a Service||managed serviceVSC-SATT-T|
|Advanced Cyber Security Trainings for Cyber Security Expert Practitioners||managed serviceVSC-SSTE-T|
ISO Management System Services
|ISO/IEC20000-1 Requirements Based Service Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO20K-I|
|ISO9001 Requirements Based Quality Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO9K-I|
|ISO 22301 Requirements Based Business Continuity Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO22301-I|
|ISO/IEC27001 Requirements Based Information Security Management System Guaranteed Certification Readiness Service||project serviceVSC-ISO27K-I|
Tools and software
|Advanced VORAS Consulting® Governance, Risk and Compliance (GRC) System||managed serviceVSC-eGRC-S|
Industry specific services
|CISO as a Service for Financial Institutions||managed serviceVSC-CISO-FIN-S|
|DPO as a Service for Financial Institutions||managed serviceVSC-DPO-FIN-S|
|ISO/IEC27001 for Automotives||project serviceVSC-ISO27K-AUTO-I|
|Ultimate Business Operations and Information Protection System for Aviation||managed serviceVSC-RKS-AVIA-S|
|Integrated ISO/IEC27001 and ISO/IEC20000-1 management system for internal IT departments or IT service providers||project serviceVSC-IMS-IT-S|
|Software Security Assurance for IT Software Developers||project serviceVSC-SS-IT-DEV-S|
|Critical Business Operations and Information Protection System for Nuclear Power Facilities||managed serviceVSC-RKS-NUK-S|
|Business Resilience and Information Protection Assurance for Defence and Intelligence organizations||managed serviceVSC-RKS-DEF-S|
The Stats – Cyber Security Breaches
On average, every 14 seconds a company is being attacked by hackers. Information is encrypted and made useless unless decrypted by special software provided by hackers after the ransom is paid. One cannot use e-mail, do not know what to do next as day plan is encrypted as well, production stops, marketing stops and sales operations stop.
Examples of Cyber Security Breaches
|Industry / Company/ Location||Values and Damage scale||Period of attack|
|Public-sector organizations /Port of San Diego/ US 2018||$30 million Direct costs – plus any Ransoms paid|
$8 billion economic impact on the San Diego region
|Airline /Cathay Pacific 2018||Has been hacked and some 9.4 million customers may have had their most personal data stolen||Over 6 months|
|Tesco Bank 2018||£2.5m to reimburse the 20,000|
£16.4 fine for data breach
|Unknown / not disclosed|
The Scale of Cyber Breaches
Only in 2015 cyber-criminals caused more than
£3 Trillion in losses worldwide
– something close to the UK’s GDP in 2018. By 2021 it is expected that those losses will reach £6 Trillion – something UK and Germany mutually produce (source: Cybersecurity Ventures Official Annual Cybercrime Report).
Cyber Threat Reality – A Preventative strategy is the best approach
It is no longer a question whether your business will be attacked or not; it is more a question of what you will do and how then and what can be done to minimize negative outcomes.
Practice shows that preventing cyber-attacks is more than 10 times less expensive than dealing with the consequences of an attack. You might recognize that the same approach in health care or finances is true too.
Stakeholders affected by Cyber Risks
- Supply chains
Why Choosing a Managed Service?
Managing Cyber security risks can be expensive and often difficult to achieve due to the skills and resources needed to implement and maintain and retain control of the IT environments which become Cyber-attack targets.
Cyber security management requires a mature team of specialists familiar with and maintaining knowledge in the techniques used to gain access to networks and Ransom attacks.
Our managed service is offered standalone or as the natural next stage following security and requirements audit.
How our Managed Cyber Security Service Works?
Our managed service is typically deployed over 3 to 6 months (depending on the scale and number of locations). We create a project plan and assign the team. We complete an audit which will identify items to be verified (all owned and BYOD equipment are verified separately) on the network, and we then install and roll out on monitoring and management framework. Vulnerabilities and issues identified from the audit process will be escalated immediately based on the risk levels. Once the Cyber Security managed service is implemented, your organization is protected with an optimal approach to the risks and affects from Cyber-attacks.
We agree reporting, management and escalations’ levels and complete monthly status briefings. We are available 24/7, and your organization is protected by an insurance backed Cyber Security service.
The Cyber Security Guarantee
With our Managed Cyber Security service backed by your choice of insurance levels, you have the ability to turn unknown Cyber Security risks and effects into a fixed cost to risk management. This means that in the event you suffer Cyber Security issues, you have a guaranteed, financially back, technical solution to fight your cause and fund the cost required up to the limits you select from £250,000 to £1m or higher as required.
Additional Benefits of our Managed Cyber Security Service
- Once we have completed your Cyber Security service implementation, you then have the key building blocks to apply for ISO 27001
- We can assist you in your application for ISO certification
- We are also able to extend our service and include IT NOC support with any break-fix being completed by you locally
What is the Right Approach to Cyber Threats
- Assume attacks will be made
- Protect against human failings
- React quickly to threat risks
- Complete a thorough security audit and repeat checks
- Build your own security center of excellence or better still use a managed cyber security service
- Seek ISO 27001 as a means of achieved and endorsed data security standard