Staying cyber secure is ongoing. We recommend you keep up to date about risks and managing your business’s security with the help of your preferred IT provider. Access to the portal, policies and resources is provided on a 12 month subscription.
No, ordering your initial subscription is the only commitment required.
You pay when ordering your subscription, and then the assessment can be booked.
Cyber crime is constantly evolving and we will show you where the threats exist in your business. However, like a warrant of fitness on your car, it’s not a guarantee that you won’t fall victim to an attack of some kind, but it will better prepare you to avoid them.
If you need to re-arrange the visit, just contact us either via the email you received about the appointment or using our contact details below.
You and your preferred IT provider will be sent a copy of the assessment results. Any changes recommended from the assessment can be carried out by your preferred IT provider or anyone else you like. If you don’t have a trusted IT provider, we can recommend one for you.
As part of your subscription, you’ll be provided with best practice policies for managing your cyber security this includes new staff, departing staff, changing your IT equipment.
DEP enabled devices have a different enrolment workflow as the profile is automatically installed on the mobile phone upon initial setup. A user account requires to complete the enrolment and the apps will automatically downloaded to the device after assigning the user account.
– In the Watchlist Dashboard > Select “DEP Phones requiring profile”.
– In the DEP phones requiring profile details view select a device > Under the Actions Drop down > Select Assign User.
– In the Device Assignment Page > type the email address of the user that will use this device.
– Result: A user will be assigned to the device. Confirm this by accessing the DEP enrolled devices dashboard list.
Note: the username and email are no longer blank.