shutterstock_1897880629

SecuraPro™ Essential

Just looking for core protection? We’ve got it covered. The SecuraProᵀᴹ Essential solution will more than adequately meet the needs of small business owners with the critical levels of control that your business requires as an absolute minimum to prevent cyber security attacks.

Find out why we're trusted

The SecuraProtm Essential package lays out the ground rules that your people need to adhere to and can be used as a best practices package to security for your business.

SecuraProtm Essential would suit micro-SMEs with 10 to 15 employees.

Key Features

  • Invaluable staff training on cyber security – in 2019 90% of UK cyber security breaches were caused by human error
  • Access to exceptional knowledge and experience with a Cyber Security Consultant from Octree
  • Essential cyber security policies and procedures made readily available to everyone, easily understood, and universally agreed upon to reduce the insider risk
  • A secure email gateway and data backups to reduce, and protect against the effects of, phishing and malware attacks
  • Backup and retention of all Office 365 and G Suite data
  • Use of web filtering tools to block inappropriate and malicious content
  • Endpoint protection to reduce risks of malware and ransomware attacks, phishing and other cyber attacks on desktops, laptops and mobile devices

Elements

Element

Essential

Assured

Resilient

ONGOING GUIDANCE & SUPPORT FROM OCTREE

Access to a Cyber Security Consultant

FOUNDATIONAL ELEMENTS (POLICIES & PROCEDURES)

Asset Discovery and documentation

Cyber security policy

Data Protection Policy (Privacy Statement)

Acceptable Use Policy

Vulnerability assessment and management

Alerting and reporting

BC/DR Plans (Business Continuity & Disaster Recovery)

System hardening with baseline policies

SHIFTING CULTURE THROUGH TRAINING

Cybsafe security awareness training

Oninbox messaging awareness training

Threat knowledge journal

Technology (Infrastructure)

Password management

Auditing Discovery

MDR/SIEM

Technology (Messaging)

Secure email gateway

Email impersonation Defence (SPF/DKIM/DMARC)

Email encryption

Technology (BC/DR)

Backup - data

Backup – virtual machines (VMs)

Backup - endpoints

Backup - cloud / SaaS (Office365, Google Cloud)

Technology (Web)

Web domain name system (DNS) filtering

Web content filtering

Dark web monitoring

Cloud monitoring

Cloud Access Security Broker (CASB)

Technology (Devices)

Endpoint protection (EDR/XDR)

Mobile endpoint protection

Mobile device management

Technology (Data)

Data encryption

Essential
Assured
Resilient