With cyber crime on the rise, protecting the sensitive data and vulnerable young people in your care has never been more important. However, prioritising cyber security is difficult without adequate resources or expertise.
A successful cyber attack can cause major damage to your organisation. As well as disrupting systems and networks, it can be expensive to fix, compromise safeguarding, seriously damage your reputation and, under the EU GDPR (General Data Protection Regulation), lead to fines. Fortunately, following some simple and low-cost steps can dramatically reduce the risk of attack, and reassure others that you take data protection seriously.
One in five schools and colleges have fallen victim to cyber crime, according to research from specialist insurer Ecclesiastical. Of those that suffered a cyber attack, 71% downloaded malware and 50% experienced phishing attacks.
The Cyber Essentials scheme is changing as of 1 April 2020. Find out what this means for new and existing customers
Find out more about cyber attacks in schools and colleges
The Cyber Essentials scheme has changed
The CREST-accredited Cyber Essentials scheme is now closed to new entrants with effect from 1 April 2020. IT Governance is unable to accept new customers under the replacement scheme until contractual issues have been addressed. As soon as they have, we can process new Cyber Essentials certification applications. Thank you for your patience.
Cyber Essentials and Cyber Essentials Plus
The Cyber Essentials certification process includes a self-assessment questionnaire and an external vulnerability scan that independently verifies your security status. The Cyber Essentials Plus certification process includes an internal vulnerability scan of your network, PCs and mobile devices.
The five Cyber Essentials controls are:
- Secure configuration – are computers and networks secure?
- Firewalls – are these and Internet gateways secure?
- Access controls and administrative privilege management – are user accounts adequately protected and do people have appropriate access levels?
- Patch management – is software on network devices and computers up to date and capable of resisting low-level cyber attacks?
- Malware protection – are computers and networks protected from malware?
Find out more about the Cyber Essentials Scheme
Cyber security training
We offer certified cyber security training for those needing an expert level of understanding. All our courses can be delivered at your organisation, at one of our training venues, live online or via distance learning.
Getting started with your cyber security strategy
Professional certification training
Our professional certification training portfolio includes courses that support entry-level and senior-level cyber security management careers.
Find out more about our full range of certified training courses >>
Staff awareness training
Cyber criminals are using increasingly sophisticated methods to trick people into opening systems to an attack. This is known as social engineering and training is key to protecting your organisation.
Our certified e-learning courses are a quick and easy way to train all staff, wherever they are based, in common cyber threats as well as how to spot phishing emails. We also offer complimentary GDPR e-learning modules.
Find out more about our cyber security e-learning courses >>
Testing the vulnerabilities of your applications and networks
Known as penetration testing, this approach is a controlled form of hacking. Our team of ethical hackers operate on your behalf to identify weaknesses in your systems.
Find out more about penetration testing and our services >>
Start your journey to being cyber secure today
IT Governance has a wealth of experience in the cyber security and risk management field. As part of our work with hundreds of private and public organisations in all industries, we have been carrying out cyber security projects for more than fifteen years. All of our consultants are qualified, experienced practitioners.
Our services can be tailored for organisations of all sizes in any industry and location. Browse our wide range of products below to kick-start your cyber security project.