Date of Certification: 21st March 2019
Certificate Number: IASME-A-010223
activereach has successfully certified against the UK Government’s Cyber Essentials scheme. Working with accreditation body IASME to achieve Cyber Essentials, the certification confirms activereach’s commitment to cyber security best practice and secures its position as a leading supplier of security solutions to the UK marketplace.
Developed by the UK Government as part of a broader initiative to raise cyber security awareness and protection in businesses of all sizes, Cyber Essentials provides a set of criteria against which organisations can measure the effectiveness of their cyber security systems. Achieving the certification demonstrates to customers that a business has taken basic and essential cyber security precautions.
Since 1 October 2014, Cyber Essentials became a minimum requirement for bidding for some government contracts that entail the handling of sensitive and personal data (https://www.gov.uk/government/publications/procurement-policy-note-0914-cyber-essentials-scheme-certification)
The IASME Consortium is one of the four Cyber Essentials accreditation bodies appointed by the UK Government. activereach has performed a self-assessment against the five most important security controls and the information we provided has been verified by Baigent’s, one of the IASME certification bodies.
For further information please see www.cyberstreetwise.com\cyberessentials
Membership Number: 1049728
activereach is a member of the Thames Valley Chamber of Commerce Group (Essential Membership)
activereach is a Core Member of the UK Cyber Security Forum.
Core Members are sole traders and SMEs (250 staff or less) actively working in cyber security. Members have capabilities in:
Just wanted to express my praise on a great job done with Liverpool. Everything went off with basically no issues which makes the refit so much easier.
Leagues ahead of xxxxxxx!
In 2017, the most likely pattern of data breach observed was an attacker using stolen credentials or exploit to access data through a web application.
Source: 2018 Data Breach Investigations Report 11th edition
Solution: Businesses have web portals everywhere. Who has access to them and how do you secure that access? Talk to us about how network security techniques can be applied to administrate your network and applications.