Date of Certification: 20th March 2018
Certificate Number: IASME-A-05499
activereach has successfully certified against the UK Government’s Cyber Essentials scheme. Working with accreditation body IASME to achieve Cyber Essentials, the certification confirms activereach’s commitment to cyber security best practice and secures its position as a leading supplier of security solutions to the UK marketplace.
Developed by the UK Government as part of a broader initiative to raise cyber security awareness and protection in businesses of all sizes, Cyber Essentials provides a set of criteria against which organisations can measure the effectiveness of their cyber security systems. Achieving the certification demonstrates to customers that a business has taken basic and essential cyber security precautions.
Since 1 October 2014, Cyber Essentials became a minimum requirement for bidding for some government contracts that entail the handling of sensitive and personal data (https://www.gov.uk/government/publications/procurement-policy-note-0914-cyber-essentials-scheme-certification)
The IASME Consortium is one of the four Cyber Essentials accreditation bodies appointed by the UK Government. activereach has performed a self-assessment against the five most important security controls and the information we provided has been verified by Baigent’s, one of the IASME certification bodies.
For further information please see www.cyberstreetwise.com\cyberessentials
Membership Number: 1049728
activereach is a member of the Thames Valley Chamber of Commerce Group (Essential Membership)
activereach is a Core Member of the UK Cyber Security Forum.
Core Members are sole traders and SMEs (250 staff or less) actively working in cyber security. Members have capabilities in:
As a new network manager to Fred Perry, I asked activereach to assist in our firewall migration work. They did a fantastic job of taking a previously outsourced service with no documentation and significantly improving security, working diligently and late into the evenings. At all times they kept me in the loop so that I could manage the system afterwards.
Source: 2018 Data Breach Investigations Report 11th edition
Solution: We know what forms most malware will take. Do you really need to accept these types of files? What about fileless malware?