Cyber Summer

Welcome to your Cyber Summer!

Sun, sea and cyber aware!

Win prizes whilst learning how to better protect your business with our Cyber Summer online event.

 

What is Cyber Summer?

Cyber Summer is our inaugural summer online event aimed at having a bit of fun and improving our cybersecurity awareness at the same time.

It’ll run from July to September 2021 and each month there’ll be resources to help you and your business become more cyber aware, and there’ll be prizes to be won as well!

Scroll down the page for more details on what we’ll be doing each month.

How do I join in?

The easiest way to join in is to subscribe to our mailing list to ensure you’re the first to hear when the latest content goes live, and when the next prizes are drawn!

We’ll take you through a “Cyber MOT” to make sure you know exactly where you and your business is cyber-fit, and where it might need a touch of cyber-fettling.

Each month there’ll be a live prize draw and each person drawn out of the hat will win a prize for themselves and for their business.

Sign up for Cyber Summer

Sign up to Marketing Messages to be notified about our Cyber Summer Event & to be entered into our Competition.

By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

Get Started with Cyber Summer

July

Get your #CyberMOT scorecard

Play along using the #CyberMOT scorecard to get a free audit of how Cyber Aware your business is.

Where there are knowledge gaps knowledge there’ll be content and tools available to help you fill in the gaps.

Part 1: Regulation & Reputation

The UK Government, many legal and financial institutions, and an increasing number of large private sector businesses are starting to make a provable level of cyber security a requirement of doing business.

Questions 1, 2 & 3 of your #CyberMOT cover how regulation impacts on cyber security, and how cyber security impacts on reputation.

August

Part 2: Hardware

The days of buying hardware and leaving it to do its thing are long gone. Without the proper attention hardware can quickly become vulnerable to attack. And yet firewalls, switches, laptops and phones are vital for business.

Questions 4-7 of your #CyberMOT look at how to ensure your devices are working for you, not against you.

Part 3: Software

Most businesses rely heavily on software to run their businesses, from those critical financial and productivity systems to the operation systems on which they run.

But when it comes to cyber security, are those programs a help, or a hindrance?

Questions 8-11 of your #CyberMOT look at how to use your software securely, and how to ensure it doesn’t make your business vulnerable to attack.

September

Part 4: Users

People are increasingly at the front line of the war against cyber crime. Humans are fallible, and hackers know it, so they try all the tricks in the trade to tempt us to take the wrong action at the wrong time.

Questions 12-16 of your #CyberMOT cover the role that you and your colleagues play in keeping your business safe from cyber attack.

Congratulations!

Your #CyberMOT is complete!

Once you’ve completed your #CyberMOT you’ll have a list of areas where you “still need to learn more” or “need a solution for this”.

Send us your completed #CyberMOT and one of our Consultants will contact you to discuss how to tune your #CyberMOT into an action plan for your business. 

FREE Security Tools

Complete the form below for your FREE Dark Web Security Scan and get a FREE Email Security Scan.

By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

Prizes to be Won Each Month thoughout Cyber Summer!

£50 Voucher for yourself.

1: A £50 voucher for yourself.

Each month throughout our Cyber Summer event we will be giving away a £50 to someone subscribed to our mailing list. You will be able to select from a wide range of different locations you could choose from. You don’t even have to be one of our customers to take part! Just subscribe below to our mailing list.

    Secondary Detection Method

    2: A Free Security Consultation for your Business

    As well as a £50 voucher for yourself you could also win a FREE Comprehensive Security Consultation for your business worth more than £400. One of our consultants will meet with you to discuss discuss your current security measures and advise you on the best ways to improve your business security measures.

    How to Enter

    All you have to do to be in with a chance of winning is be a member of our mailing list.

    Every member on our Mailing List will qualify to Win a Voucher for themselves from a variety of different places.

    The more people in your company on our Mailing List, the higher chance you have of winning our Free Security Consultation.

    Subscribe to our Mailing List

    Cyber Security tools for your business.

    We already offer many tools to help your business with it’s Cyber Security, find out more below.

    Cyber Essentials

    Cyber Essentials

    Cyber Essentials is an important standard for any modern business to achieve. It shows customers and suppliers alike that you take cyber security seriously and it is fast becoming a basic requirement for Government contracts, grant funding, financial services and more. But getting your Cyber Essentails cetification can be a daunting prospect. 

    Email Security

    Email Security

    The average cost of a ransomware attack is over £200,000. Fines for loss of personal data can be severe. And what price the cost of spreading an infection to your most valued customers? Pick and choose to plug gaps in your existing provision, or adopt as a bundle for a cost-effective powerful end-to-end email security solution.

    Endpoint Protection

    Endpoint Protection

    Endpoint protection uses a multi-layered approach to secure your devices against malicious activity. This in turn prevents infection spreading through your network. Endpoint protection is your first line of defence against viruses, malware, ransomware and online fraud.

    Ransomware Protection

    Ransomware Protection

    Ransomware is the cybersecurity threat that all businesses dread. Once deployed ransomware can silently spread to infect all your devices. Once the criminals decide to strike, your whole business can be locked down until you pay the ransom. 

    Cyber Summer Part 1: Reputation & Regulation

    How can you get your business Cyber Essentials Certified?

    1. How to get your business Cyber Essentials certified.

    What is Cyber Essentials?

    Why is it increasingly important for all businesses?

    And how do you go about getting certified?

    All these questions are covered in Module 1.

    How could you get fined for being the victim of Cyber Crime?

    2. How you could be the victim of cyber crime and still get fined.

    In this module, we follow the case of British Airways who were fined £20,000,000 after they themselves were attacked by hackers. Why were they fined when they were victims of the attack? And could that happen to your business too?

    In this module, we find the answers.

    How can poor cyber security lose you customer?

    3. How poor cybersecurity can lose you customers.

    “If we fall victim to hackers we’ll deal with it ourselves. It’s no-one else’s problem”. But what if the hackers hide within your business in order to attack or defraud your customers?

    In this module, we learn how to avoid having to make that call.

    Cyber Summer Part 2: Hardware

    Do you know if your Firewall is Managed Properly?

    4. Do you know if your Firewall is Properly Managed?

    Whilst many people may have heard of a firewall before, do you know what a firewall is? Do you know what it does? Do you know if yours is managed and kept up to date? And do you know the differences between a hardware firewall and a software firewall? We cover all this and more in Module 4.

    Are your devices up-to-date and secure?

    5. Are all of your business devices kept fully up-to-date and secure?

    Your business could not run without its IT infrastructure and devices. But do you know that if they are not kept up to date with the latest updates and security patches, that they could be the first point of failure if your business is targeted by cyber security threats? Find out more in Module 5.

    Is your hardware keeping your data safe and secure?

    6. Is your Hardware keeping your data safe and secure?

    If your laptops is stolen, or an external Hard Drive or USB Drive is misplaced on a train, can you say with 100% certainty that the data contained on them is completely safe and secure? And can’t be access by those who you do not want to have access to this data?

    Do you know which devices can access your network and data?

    7. Do you know which devices have access to your business network and data?

    Do you know which devices have access to your network? Are all of the devices which can access your data secured by the relivant security measures to keep your network secure? Do you know if your employees are beinging in personal devices? And if they do, can you be ceratin that they can not access data that they shouldnt be able to?

    Cyber Summer Part 3: Software

    How can poor cyber security lose you customer?

    8. Are your business emails secure?

    Getting you to click the link that delivers the malware is much easier than hacking past firewalls and antivirus, which is why email-borne cyber-security threats are on the rise.

    In this module we”ll raise your awareness of the most common email attack methods, and how to prevent them.

    How can poor cyber security lose you customer?

    9. Are my online accounts protected, safe and secure?

    The more we rely on online accounts to do business, the more we rely on our passwords, and other businesses’ security standards, to keep our company safe.

    In this module, we’ll look at some of the small changes that can make a big difference to the security of your online accounts.

    How can poor cyber security lose you customer?

    10. Do you have redundancy in place for your business data?

    Our businesses are increasingly reliant upon computer-based programs, documents and databases to run, and we have to be honest with ourselves about what the impact would be if we walked in to work one day and it had all just disappeared.

    In this module we take a look how to build redundancy into our crucial business data.

    How can poor cyber security lose you customer?

    11. Are your apps making your business vulnerable?

    Reports suggest more than 30% of companies have suffered security breaches due to poor app security, with even big name companies like WhatsApp, Facebook and Under Armour being implicated.

    But we need our business apps so we can work!

    Let’s look at some of the solutions available to beef up the app security in your business.

    Cyber Summer Part 4: Users

    Do you know if your Firewall is Managed Properly?

    12. What is a “human firewall” and how does it protect my business?

    No, it’s nothing like a human cannonball. The only thing that’s being fired here is lots of bogus emails at your colleagues, trying to get them to click and unleash harm. And a so-called “human firewall” can help stop it happening.

    Are your devices up-to-date and secure?

    13. How do I spot & stop phishing attacks?

    Phishing is a serious issue with a frivolous name. It’s also the method most likely to be used to hack your business, which is why it’s so important for any business to understand to spot, and stop, phishing attacks.

    Is your hardware keeping your data safe and secure?

    14. What is the Dark Web and how does it threaten my business?

    The Dark Web isn’t just for state-sponsored hackers and global cyber criminal gangs as it is sometimes portrayed in the media.  It’s the place where your business and customer data can end up being traded without you ever knowing. Unless, that is, you have the right solutions in place.

    Do you know if your Firewall is Managed Properly?

    15. What are DMARC & DNS and how can they protect my business?

    The internet has been around for a long time now and is built on some fairly old rules and protocols. However, just because they’re old, doesn’t mean they’re not useful.  Here we’ll learn about some protocols from then can be used to protect your business now.

    Are your devices up-to-date and secure?

    16. How do I browse and work safely?

    All this talk of cyber threats and criminal activity can make it feel like it’s impossible to stay safe. But with the right tools, you can reduce the risk and create an environment where users can go about their daily work with confidence.

    Submit your #CyberMOT

    Once you’ve completed your #CyberMOT you’ll have a list of areas where you “still need to learn more” or “need a solution for this”.

    Submit your completed #CyberMOT here and one of our Consultants will help you turn your #CyberMOT into an improvement plan for your business.

    Click or drag a file to this area to upload.

    Contact Us

    By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

    Testimonials

    Peter, Peak Sensors

    Very competent people completing tasks accurately and quickly.

    Chris, Kelham Hall

    Another 5 star Job from One2Call’s top man.

    Denise Hardman, Ward Power Ltd

    Easy to communicate with . Good response time.