Cyber & Data Protection Made Easy

Helping emerging businesses and supply chain vendors meet the modern requirements of Cyber Security and Data Protection.

Take a Free Data Risk Assessment

hero logo

Client Expectations Are Evolving

Automate your response to Cyber, Data and Compliance risks to stand out from the crowd. Demonstrate your awareness of and commitment to best practice standards.

A RegTech Software as a Service for SMEs

Providing an automated framework and an intuitive library of tools and resources to mitigate risk and power growth.

hero logo hero logo
Icon small computer

Cyber

readiness program

Icon small computer

Data

readiness program

Icon small computer

Compliance

readiness program

Education

Self-assessment

Tools & Resources

Certification

SMALL BUSINESS
resilience...

Icon small computer

Only 14%
of small businesses rate their ability to mitigate cyber risks, vulnerabilities and attacks as highly effective.

Icon big computer

Cyber Security

According to security company Symantec, … cyber attacks increased from about 6,000 in 2016 to more than 50,000 in 2017, translating to a 600% rise in just one year.

Given the frequency, magnitude and cost of cyber security incidents, it has never been more important for businesses of all sizes to take control of their most important [digital] assets.

Learn how Certified By’s Cyber Readiness Program can help.

Learn more
Icon small computer

Web Applications

Ensure robust development and testing in line with best practices

Icon small computer

Secure Configurations

Ensure computers and network devices are properly configured

Icon small computer

Malware Protection

Restrict execution of known malware and untrusted software

Icon small computer

Cloud

Maintain visibility and compliance controls over cloud assets

Icon small computer

Firewalls

Ensure safe and necessary network access from the Internet

Icon small computer

User Access Controls

Authorise approved access to apps, computers and networks

Icon small computer

Patch Management

Ensure devices and software are not vulnerable to known security issues

Icon small computer

Mobile

Map and mitigate risk exposure through mobile devices

SMALL BUSINESS
risks...

Icon small computer

58%
malware attack victims are categorized as small businesses.

Icon small computer

60%
small companies go out of business within six months of a cyber attack.

Icon small computer

60%
small businesses say attacks are becoming more severe and more sophisticated.

Icon big data protection

Data Protection

Data Protection standards are evolving all over the world, highlighted most by the EU’s General Data Protection Regulations (GDPR). Australia’s Privacy Principles, the UK’s Data Protection Principles, and California’s new Consumer Privacy Laws (to name just a few) ensure the global privacy movement spreading quickly.

There has never been a greater need for a global standard for data protection, one that also serves the interests of small and medium size businesses.

Learn how Certified By’s Data Protection Readiness Program can help.

Learn more
Icon small computer

Data Flow Mapping

Map the personal data flows in your organisation.

Icon small computer

Data Use

Define and document how you use personal data.

Icon small computer

Processing Activity

A documentation & overview of procedures by which personal data are processed.

Icon small computer

Consent/Permission

Demonstrate transparency, choice and controls over data permissions.

Icon small computer

Controllers/ Processors

Understand the difference to implement the right controls and agreements.

Icon small computer

Data Subject Right

Be aware of and comply with with the 8 fundamental rights.

REPUTATION
is everything...

53 in 100

consider REPUTATION DAMAGE as the biggest concern in relation to GDPR

8% GDPR preparations were complete.

33% said they had not yet started.

35% said preparations are only in the early stages.

Icon big data protection

Compliance

The regulatory environment has never been more complicated, with cyber security and data protection essential elements in a wider Governance, Risk, Compliance and Quality [GRCQ] management framework.

It’s never been more challenging for small and medium size businesses to compete in this modern global economy, in desperate need for an affordable automated solution to demonstrate awareness of and commitment to best practice standards.

Learn how Certified By’s 8 Stages of GRCQ Certification Program can help.

Learn more
1

Code of Ethics

Knowing the difference between right and wrong can make or break a business.

2

Statutory regulatory

The rules we are governed by form the foundation of good governance.

3

Risk Management

Understanding, mitigating and remediating risk is essential to growth.

4

Credit Management

Cash flow is king, but good credit management powers lasting growth.

5

Cyber Security

Securing your most valuable digital assets have never been more important.

6

Data Protection

Your employees, customers and business secrets are at risk.

7

Quality Management

Businesses that go above and beyond are the ones that succeed the most.

8

Social Responsibility

You get out of this world what you put into it, and that goes for business too.