• Skip to primary navigation
  • Skip to main content
  • Skip to footer

+44 (0)207 183 1443

info@outboundsolutions.co.uk

  • E-mail
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube
Outbound

Outbound

Your trusted partner

  • About
  • Core Solutions
    • Advisory Services
  • Key Services
    • Cloud Services
    • Cyber Security
    • IT Consultancy
    • Managed Services
    • Network & Telephony Solutions
    • Office 365 Solutions
    • Tender As-A-Service
    • Technology Supply Chain
    • Website Services
  • Case Studies
  • Partners
  • Contact
Contact Us

Cyber Security

Protecting your business data, identity and reputation from cyber-attacks has never been more important than it is today. 

Our dedicated cyber security and organisation maturity assessments use the experience of more than 20 years in IT security. Packaged and delivered to your executive team for a fully independent review of IT, security, cyber and business processes, it’s the most comprehensive way to assess what you are doing well and where we can help you to add further security and protection.

Free Cyber Security Assessment

Why not take advantage of our free Cyber Security Assessment? This no-obligation assessment is designed to give you an overview of your current cyber security levels, along with expert recommendations and advice to help you take the next steps. This assessment is conducted hassle-free via two online conference calls and a short questionnaire – an ideal way to kick-start your cyber security strategy. Please get in touch with us via our contact form or email sales@outboundsolutions.co.uk to book an assessment.

Organisational Maturity Assessments

As an organisation grows and departments expand, technologies, security, and processes change. It is important to understand how technology is used within the workplace and know if all departments understand their responsibilities. Using this type of assessment it can help identify how each section of the company is aware of cyber security, data security, data classification, data leakage, supplier management, workforce management or training and how this is administered and if there are training gaps within a department. This assessment focuses on 10 core domains under the Cyber Security Capability Maturity Model (C2M2):

  1. Risk management
  2. Asset, change and configuration management
  3. Identity and access management
  4. Threat and vulnerability management
  5. Situational awareness
  6. Information sharing and communication
  7. Event and incident management, continuity of operations
  8. Supply chain and external dependencies management
  9. Workforce management
  10. Cyber security programme management

How it works

We conduct an informal interview-based session looking at policy owners, the people that carry out those policies and the senior management who agree and sign off the policies.  The report follows the C2M2 which is a standard framework and methodology that assesses an organisation’s approach to cyber security. The outputs of the assessment provide a valuable foundation if you are considering adopting one of the many formal information security standards such as ISO 27001 or the NIST Cybersecurity Framework, as the content of C2M2 correlates well with these other standards. 

Free Security Scan

We offer a full public domain scan of your domain, resulting in a free report that gives you a high-level overview of what public information is available both on the internet and dark web including some information on your public websites. This is a light-touch security assessment and is often quite revealing. 

Public discovery testing is performed to collect publicly available personal and/or sensitive data about the company. This information is usually accessible to every internet user. Such information is then tested with the possibility of data theft in mind. Simple and quick, this activity exposes basic security risks that your organisation may be open to.

Get in touch via our contact form or email us on sales@outboundsolutions.co.uk to ask us about our security scans.

Vulnerability and Security Testing

We can also carry out vulnerability and penetration testing including web application testing for all your internal and external infrastructure and applications.  In an ever changing world of security challenges having your solutions tested and assessed on a regular basis is key to maintaining your systems and to protect your business data.

We can offer this as a managed service monthly, quarter or yearly and if required, on a per project basis.  We produce a comprehensive public discovery report (PDR), full assessment report and executive summary to management teams.  These assessments are then listed in order of priority highlighting risks and exposure to evolving threats.

Uncovering vulnerability gaps in security and the need for training is so important.  We can help with ensuring the information produced by these assessments are easy to understand and we can help with executing and planning new solutions.

Vulnerability Testing

Discover, identify, and classify the vulnerabilities and security weaknesses in your organisation’s computer, network, or communications infrastructure. Vulnerability assessment provides an insight into your organisation’s current state of security, and the effectiveness of any countermeasures in place. 

This is a crucial test and is automatically included on all our assessments.

Penetration Testing

This service tests the security controls of your organisation by simulating an attack which a hacker might undertake to exploit the weaknesses in your network and applications. We identify the external and internal vulnerabilities which would give access to the critical assets of the organisation.

In addition, we validate the configurations of your IT assets and produce a list of known vulnerabilities present in the systems and applications and mitigate them before they are exploited by adversaries.

We also simulate a real hacking event to test the strength of existing security defences and countermeasures.

Web Application Testing

Also referred to as web application vulnerability scanning, this is an automatic security program that searches for software vulnerabilities within web applications. The software first crawls and builds a software construct of the entire website. This gives the scanner an insight into the application, which then performs an automatic audit for common security vulnerabilities by launching a series of web attacks. The consultants then manually verify these security vulnerabilities.

  • Identifies security vulnerabilities and issues that exist in customer’s web site using a vulnerability scanner.
  • Issues identified by the vulnerability scanner are manually inspected and reported.
  • External web application scanning is performed remotely against your organisation’s public website(s). Our consultants configure the vulnerability scanner to scan the web application and the identified vulnerabilities are verified manually.

Corporate Risk Management

Risk management is important in any organisation because without it a firm cannot possibly define its objectives for the future.

We understand the goal of risk management is to make sure that the company only takes the risks that will help it achieve its primary objectives while keeping all other risks under control, governed, and documented.

We assist with the design, build, and run a corporate risk management framework, risk registers and risk assessments – we can come in and hit the ground running for your business to maintain moving forward.

Business Continuity

Having a robust and tested business continuity plan is not only good practice; it proves to your customers and suppliers that you are a mature and proactive business.  We can review your plans and procedures, expand them where appropriate and arrange for testing or put a strategy in place to ensure your organisation builds and maintains its continuity plans on an ongoing basis.

Virtual Security Officer

Employing dedicated security teams and security officers is costly. That’s why we support SME and growing businesses with our Virtual Security Officer (or vCSO) service, providing you with a dedicated professional to act as your security team and take care of your IT and data security activities. 

Staff Training

We offer remote and on-site training for your IT teams and business staff. This training is designed specifically for your needs, and cover cyber security topics, industry trends and different attack vectors.  We recommend these are conducted annually to ensure your people are up to date. Training can also be offered as part of your standard induction process.

Recent additions to these courses include topics for distributed work forces, working from home and protecting the corporate assets in this new post-pandemic era.

 

Do you need help? Ready to start your project? Enable your business? Need change?

If you need help, have technology challenges, or need guidance, just get in touch and we’ll be happy to help.

Contact us

Footer

Outbound Solutions & Computing Ltd trading as Outbound

Virtual or Retained IT Services, Technology Consultancy, Architecture and home of "CIO-As-A-Service, "Programme Management", Virtual or Dedicated Services.

+44 (0)207 183 1443

info@outboundsolutions.co.uk

Additional

  • Home
  • FAQs
  • Sitemap
  • Web Hosting System Status

Information

  • Website T&C’s
  • Service Incident Status
  • Service Status
  • Cookie Policy
  • Privacy Policy
  • E-mail
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube

Copyright © 2021 Outbound Solutions & Computing Ltd trading as Outbound™.  Registered in England & Wales No.04886977. Registered Office: Kemp House, 152 – 160 City Road. London. EC1V 2NX. All rights reserved. Return to top