DDoS attack emergency?

Certifications & Accreditations

Cyber Essentials Scheme Certification

Cyber Essentials

Date of Certification: 21st March 2019

Certificate Number: IASME-A-010223

activereach has successfully certified against the UK Government’s Cyber Essentials scheme. Working with accreditation body IASME to achieve Cyber Essentials, the certification confirms activereach’s commitment to cyber security best practice and secures its position as a leading supplier of security solutions to the UK marketplace.

Developed by the UK Government as part of a broader initiative to raise cyber security awareness and protection in businesses of all sizes, Cyber Essentials provides a set of criteria against which organisations can measure the effectiveness of their cyber security systems. Achieving the certification demonstrates to customers that a business has taken basic and essential cyber security precautions.

Since 1 October 2014, Cyber Essentials became a minimum requirement for bidding for some government contracts that entail the handling of sensitive and personal data (https://www.gov.uk/government/publications/procurement-policy-note-0914-cyber-essentials-scheme-certification)

The IASME Consortium is one of the four Cyber Essentials accreditation bodies appointed by the UK Government.  activereach has performed a self-assessment against the five most important security controls and the information we provided has been verified by Baigent’s, one of the IASME certification bodies.

For further information please see www.cyberstreetwise.com\cyberessentials

Thames Valley Chamber of Commerce

Membership Number: 1049728

activereach is a member of the Thames Valley Chamber of Commerce Group (Essential Membership)

UK Cyber Security Forum

activereach is a Core Member of the UK Cyber Security Forum.

Core Members are sole traders and SMEs (250 staff or less) actively working in cyber security.  Members have capabilities in:

  • Vulnerability analysis, testing and technical system certification
  • Forensics, data analysis, intelligence and recovery
  • Surveillance and counter surveillance
  • Control Systems, SCADA security
  • Governance, risk management, assurance and certification
  • Managed services (SOC, monitoring, protection, recovery)
  • Cyber security solutions (crypto, software, hardware, middleware)
  • Cyber security and information assurance training and education


What our customers say

Just wanted to express my praise on a great job done with Liverpool. Everything went off with basically no issues which makes the refit so much easier.

Leagues ahead of xxxxxxx!

Dominic Colyer
IT Support Technician, Fred Perry

Did you know?

In 2017, the most likely pattern of data breach observed was an attacker using stolen credentials or exploit to access data through a web application.

Source: 2018 Data Breach Investigations Report 11th edition

Solution: Businesses have web portals everywhere. Who has access to them and how do you secure that access? Talk to us about how network security techniques can be applied to administrate your network and applications.

back to top