Cyber Security

Cyber Security Checklist
Keyfort’s service
Steps to protect yourself
Next Generation Anti virus
Keyfort’s VULNERABILITY Scan
Cyber Essentials
Cyber Security Checklist
Keyfort’s service
Steps to protect yourself
Next Generation Anti virus
Keyfort’s VULNERABILITY Scan
Cyber Essentials
Cyber Security Checklist
Keyfort’s service
Steps to protect yourself
Next Generation Anti virus
Keyfort’s VULNERABILITY Scan
Cyber Essentials

Cyber Security is the practice of protecting systems, networks and programs from unauthorised access or malicious attacks. Cyber attacks can cost organisations both time and money and can cause serious damage. 

The benefits of a Cyber Security solution:

  • It can protect your business
  • Protects personal information
  • Allows employees to work safely
  • Inspires confidence in your customers

Checklist to review your cyber security protection

  • Next Generation Antivirus
  • Email Server Certification
  • Email Anti-Spam
  • Email Anti-Phishing
  • Email Antivirus
  • Strong Wi-Fi Encryption
  • Firewall Configuration
  • Accounts Data Backed Up To An Off-Site Location
  • Customer Relationship Management (CRM) Data Backed Up To An Off-Site Location
  • Shared Files Backed Up To An Off-Site Location

Checklist to review your cyber security protection

  • Next Generation Antivirus
  • Email Server Certification
  • Email Anti-Spam
  • Email Anti-Phishing
  • Email Antivirus
  • Strong Wi-Fi Encryption
  • Firewall Configuration
  • Accounts Data Backed Up To An Off-Site Location
  • Customer Relationship Management (CRM) Data Backed Up To An Off-Site Location
  • Shared Files Backed Up To An Off-Site Location
  • Email Anti-Phishing

What does Keyfort’s service include?

 – Initial Assessment: Keyfort performs a vulnerability scan to start with, to access any vulnerabilities or threats in your system.

 – Plan of Action: Once Keyfort has the initial assessment of your system, we can work out the best way to combat these vulnerabilities or threats.

Implementation and Back-Up: Keyfort will then configure an automatic daily off-site backup of your key data so that in an event of an onside corruption, malign or error, we can quickly restore your original data from the secure UK only data centres.

6 Monthly Vulnerability Scan: Under Keyfort’s cyber security plan, we conduct a vulnerability scan of your network every 6 months to verify that the automatic updates and access rights continue to meet the required security standards.



- Pro-Active Engineers Support: Keyfort is dedicated to providing IT Engineering support to clients. Our engineers have a breadth of knowledge, skills and expertise so we are able to deal with a cast range of situations.

- Management Information: Keyfort uses CRM (Customer Relationship Management) system to log, track, notify and address issues. This facilitates the provision of case studies, usage reports and incident logs to meet your organisation’s requirements.

What does Keyfort’s service include?

 – Initial Assessment: Keyfort performs a vulnerability scan to start with, to access any vulnerabilities or threats in your system.

 – Plan of Action: Once Keyfort has the initial assessment of your system, we can work out the best way to combat these vulnerabilities or threats.

Implementation and Back-Up: Keyfort will then configure an automatic daily off-site backup of your key data so that in an event of an onside corruption, malign or error, we can quickly restore your original data from the secure UK only data centres.

6 Monthly Vulnerability Scan: Under Keyfort’s cyber security plan, we conduct a vulnerability scan of your network every 6 months to verify that the automatic updates and access rights continue to meet the required security standards.

Pro-Active Engineers Support: Keyfort is dedicated to providing IT Engineering support to clients. Our engineers have a breadth of knowledge, skills and expertise so we are able to deal with a cast range of situations.

Management Information: Keyfort uses CRM (Customer Relationship Management) system to log, track, notify and address issues. This facilitates the provision of case studies, usage reports and incident logs to meet your organisation’s requirements.

Social Engineering

Make sure that your employees follow these 3 simple rules to increase productivity:

  • Be VIGILANT of tempting offers: if it sounds too good to be true, it most likely is.
  • Do NOT open emails or attachments from suspicious sources: even if it someone you recognise, try checking with that person via another source i.e phone.
  • Do NOT give out sensitive data or information to anyone.

Here are some of the steps you can take to protect yourself:

  • Network Security: Defend the network perimeter, filter out unauthorised access and malicious content. Monitor and test security controls.
  • User Education and Awareness: Ensure staff are well trained and cyber security awareness is maintained.
  • Malware Protection: There are many anti-malware defences to protect your organisation, thus produce policies in order to adhere to them.
  • Removable Media Controls: Produce a policy to control all access to removable media. Limit media types and use. Scan all media for malware before importing onto the corporate system.
  • Secure Configuration: Apply security patches and ensure the secure configuration of all systems is maintained.
  • Managing User Privileges: Limit user privileges and monitor user activity. Control access to activity and audit logs.
  • Incident Management: Test your incident management plans. Provide specialist training. Report criminal incidents to law enforcement.
  • Monitoring: Continuously monitor all systems and networks. Analyse logs for unusual activity that could indicate an attack.
  • Home and Mobile working: Develop a mobile working policy and train staff to adhere to it. Apply the secure baseline and build to all devices.

Here are some of the steps you can take to protect yourself:

  • Network Security: Defend the network perimeter, filter out unauthorised access and malicious content. Monitor and test security controls.
  • User Education and Awareness: Ensure staff are well trained and cyber security awareness is maintained.
  • Malware Protection: There are many anti-malware defences to protect your organisation, thus produce policies in order to adhere to them.
  • Removable Media Controls: Produce a policy to control all access to removable media. Limit media types and use. Scan all media for malware before importing onto the corporate system.
  • Secure Configuration: Apply security patches and ensure the secure configuration of all systems is maintained.
  • Managing User Privileges: Limit user privileges and monitor user activity. Control access to activity and audit logs.
  • Incident Management: Test your incident management plans. Provide specialist training. Report criminal incidents to law enforcement.
  • Monitoring: Continuously monitor all systems and networks. Analyse logs for unusual activity that could indicate an attack.
  • Home and Mobile working: Develop a mobile working policy and train staff to adhere to it. Apply the secure baseline and build to all devices.

Next Generation Anti-Virus?

Next Generation Anti-Virus takes the traditional anti-virus and takes a more proactive and advanced approach to prevent attackers and potential threats. Next Generation also includes optional Patch Management, which is good cyber security practice and is a requirement for cyber essentials.

Patch management means keeping software on computers and network devices up to date and capable of resisting low-level cyber-attacks. Software with known technical vulnerabilities can be exploited by cyber criminals rapidly, and leave your organisation open to an attack.

With Keyfort, it is easy to upgrade from your old antivirus to Next Generation Antivirus, and with promotional pricing* to provide free cover for the remaining period of your old antivirus cover, there is no better time to improve your cyber security!

*Promotional pricing is available to replace old antivirus licenses subject to a minimum 1-year Next Generation PC Antivirus Purchase.

Keyfort’s Vulnerability Scan includes:

  • Keyfort’s cyber security includes remote testing via an internet connection to stimulate the view of your systems through the eyes of a potential attacker.
  • An in-depth assessment allows us to produce a technical overview with a management level summary of the weaknesses within your network. Keyfort’s engineers can then advise the best course of remedial action.
  • Scoping: Identifying the main risks and assessing the appropriate targets for security testing
  • Discovery: Gathering information about a network and its service.
  • Vulnerability Scanning: Testing systems and services for known vulnerabilities (they are assessed, but not exploited so your systems are not compromised)
  • Analysis: The results arising will be considered and assessed.
  • Risk Assessment Report: You will receive an executive summary and recommended corrective actions.

However… Keyfort’s Cyber Security testing does NOT include:

  • Application Tests: these are used to identify/assess potential threats to software applications (including bespoke or propriety software applications).
  • Social Engineering Tests: these rely heavily on human interaction and often involve tricking other people in breaking security procedures.
  • Penetration Test: exploiting internal and external vulnerabilities.

Keyfort’s Vulnerability Scan includes:

  • Keyfort’s cyber security includes remote testing via an internet connection to stimulate the view of your systems through the eyes of a potential attacker.
  • An in-depth assessment allows us to produce a technical overview with a management level summary of the weaknesses within your network. Keyfort’s engineers can then advise the best course of remedial action.
  • Scoping: Identifying the main risks and assessing the appropriate targets for security testing
  • Discovery: Gathering information about a network and its service.
  • Vulnerability Scanning: Testing systems and services for known vulnerabilities (they are assessed, but not exploited so your systems are not compromised)
  • Analysis: The results arising will be considered and assessed.
  • Risk Assessment Report: You will receive an executive summary and recommended corrective actions.

However… Keyfort’s Cyber Security testing does NOT include:

  • Application Tests: these are used to identify/assess potential threats to software applications (including bespoke or propriety software applications).
  • Social Engineering Tests: these rely heavily on human interaction and often involve tricking other people in breaking security procedures.
  • Penetration Test: exploiting internal and external vulnerabilities.

Cyber Essentials

Cyber Essentials accreditation is the UK Government’s Scheme, intended to help all organisations to be safe when operating digitally.

The Cyber Essentials is promoted by the UK Government. It is also back up by industries such as FSB (formally Federation of Small Businesses), the CBI and a number of insurance companies.

The UK Government has required all suppliers bidding for sensitive/personal information handling contracts to be certified against the scheme since October 2014.

For more information, visit the Government Website.