Skip to content
Skip to footer
Home
About Us
Services
REPAIRS
Computer Repairing Services
Smartphones Repair Services
CYBERSECURITY
Security Awareness Training
Network Security & Cyber Security
Cyber Risk Assessment
REMOTE SUPPORT
Remote Monitoring & Management
Charity & Non-Profit Microsoft Office 365
Total Care BDR – Backup & Disaster Recovery Plan
HouseCall Service
DIGITAL MARKETING
Website Design & Development
Domains
New Domain
Domain Transfer
Web Hosting Services
Web Design Plans
Hosting
Cloud Web Hosting
Digital Marketing Services
Content Writing Service
eCommerce Solution
Portfolio
FAQs
Computer Troubleshooting Knowledge
Computer Knowledge
Microsoft Word Knowledge
Microsoft Excel Knowledge
Shop
Blog
Contact Us
01263 805012
Raise a Ticket
Home
About Us
Services
REPAIRS
Computer Repairing Services
Smartphones Repair Services
CYBERSECURITY
Security Awareness Training
Network Security & Cyber Security
Cyber Risk Assessment
REMOTE SUPPORT
Remote Monitoring & Management
Charity & Non-Profit Microsoft Office 365
Total Care BDR – Backup & Disaster Recovery Plan
HouseCall Service
DIGITAL MARKETING
Website Design & Development
Domains
New Domain
Domain Transfer
Web Hosting Services
Web Design Plans
Hosting
Cloud Web Hosting
Digital Marketing Services
Content Writing Service
eCommerce Solution
Portfolio
FAQs
Computer Troubleshooting Knowledge
Computer Knowledge
Microsoft Word Knowledge
Microsoft Excel Knowledge
Shop
Blog
Contact Us
CLIENT PORTAL
Raise A Ticket
Cornwall
Close
Home
About Us
Services
REPAIRS
Computer Repairing Services
Smartphones Repair Services
CYBERSECURITY
Security Awareness Training
Network Security & Cyber Security
Cyber Risk Assessment
REMOTE SUPPORT
Remote Monitoring & Management
Charity & Non-Profit Microsoft Office 365
Total Care BDR – Backup & Disaster Recovery Plan
HouseCall Service
DIGITAL MARKETING
Website Design & Development
Domains
New Domain
Domain Transfer
Web Hosting Services
Web Design Plans
Hosting
Cloud Web Hosting
Digital Marketing Services
Content Writing Service
eCommerce Solution
Portfolio
FAQs
Computer Troubleshooting Knowledge
Computer Knowledge
Microsoft Word Knowledge
Microsoft Excel Knowledge
Shop
Blog
Contact Us
Cornwall
November 1, 2023
Halloween in St Ives: The Sinister Sail
Cornwall
October 11, 2023
St. Ives Seventies: An Eccentric Coming-of-Age Story
Cornwall
October 9, 2023
The Chronicles of Carbis Bay: A Tale of Mischief, Magic, and Mayhem
Cornwall
October 3, 2023
The Tidal Tales: Riding the Waves of Adolescence in St Ives.
Cornwall
September 28, 2023
Barefoot Journeys: Tracing the Sands of Time in St Ives
Cornwall
September 26, 2023
Lanterns, Lighthouses, and the Lark of Lelant
Posts pagination
Page
1
Page
2
Page
3
>
Get Your Instant Cybersecurity Score!
calculate score
First Name
Text Input
Email
Previous
Next
Email
Employees know how to identify potential phishing scams, harmful attachments and spam.
No
Not Sure
Yes
Passwords
We routinely update passwords to contain complex configurations and have a procedure for securing them.
No
Not Sure
Yes
Shadow IT
Policies are in place to manage employees who use unauthorised file-share programs, personal devices, external hard drives, social media, etc.
No
Not Sure
Yes
Computers
Our computers have been purchased in the last three years and all required system upgrades have been installed in that time.
No
Not Sure
Yes
Software
All software programs have received necessary updates, and antivirus measures are in place.
No
Not Sure
Yes
Compatibility
Any specialised equipment (machine sensors, voice assist, legacy systems, etc.) and software can easily “talk with each other” securely.
No
Not Sure
Yes
Personal Devices
Policies are in place for employees who use personal devices for work to prevent data loss, and those devices have updated security software.
No
Not Sure
Yes
Firewalls
Our network security and firewall systems are regularly updated and monitored to ensure the latest and greatest defences are in place to protect against internet-based cyber threats.
No
Not Sure
Yes
Monitoring
Our systems are monitored 24/7 to ensure critical updates are applied, maintenance is performed, and dedicated IT personnel are addressing emerging threats related to cloud-based security protection.
No
Not Sure
Yes
Printed Documents
We have a policy in place to ensure that confidential printed documents don’t end up in the wrong hands.
No
Not Sure
Yes
Rules-Based Printing
We have PIN-access or swipe-to-print protection measures in place to release print jobs only when an authorised user is present to retrieve printed documents.
No
Not Sure
Yes
Security Settings
ob tracking, hard drive encryption, password protection, remote monitoring, and proper network configurations are in place and are routinely updated.
No
Not Sure
Yes
Cloud Services
We’ve outlined a detailed plan in the event a disruption occurs. The plan includes clearly defined processes, and it identified who will take certain actions.
No
Not Sure
Yes
Business Continuity Plan
We’ve outlined a detailed plan in the event a disruption occurs with clearly defined processes, and identified who will take certain actions.
No
Not Sure
Yes
Testing
Our backup system is regularly tested to ensure operation if called to duty, and we’ve conducted a practice drill.
No
Not Sure
Yes
Previous
CALCULATE MY SCORE
×