Skip to main content

SaRB for Small & Medium Sized Organisations

Welcome to 'Security and Risk Blog' for Small and Medium-sized Organisations - otherwise known as SaRB for SMO's or SaRB for Small Organisations.

As the name suggests, this is a Blog about security and risk for small organisations to learn and explore more about the security risks and threats facing their organisations. Regardless of your lack of knowledge and experience we can guide you through to achieving secure outcomes for your organisation. 

Here are some of our Blog articles:

Hot
Our privacy notice tells you what to expect us to do with your personal information when you make contact with us or use one of our services. This...
Hot
Here we provide information that is specific to your reason for contact us. They include the following: Make a complaint. Make an enquiry about...
Hot
  We hold the names and contact details of individuals acting in their capacity as representatives of their organisations, across the busines...
Hot
Mission Statement To clarify and simplify cyber security to make it useful, relevant and achievable for everyone.   Making Knowledge Action...
Hot
We keep our privacy notice under regular review to make sure it is up to date and accurate. November 2020. No other Privacy Notice pages have bee...
Hot
We currently do not provide services directly to children or proactively collect their personal information. However, we understand that sometimes ...
Hot
Contact Us    

Please complete the following details so that we can respond to your query.

Note: anyone promoting their services through this form will be listed in the "not to use suppliers" list for our procurement team.

Please type your full name.

Invalid email address.

Invalid Input

0/100

Invalid Input

Invalid Input

Hot
Virtually Informed is the controller for the personal information we process, unless otherwise stated. You can contact us using the contact us pag...
Hot
Cookies are small text files that are placed on your computer by websites that you visit. They are widely used in order to make websites work, or w...
These are the steps to take for a Cyber Security Policy.
Hot
As a small organisation employing less than 250 employees we are not required to have a Data Protection Officer, our acting Data Protection Officer...
Hot
Thee are many definitions of Smart Homes, Smart Buildings and Smart Cities and they are mainly produced by vendors to sell more of what they offer....
Hot
Purpose and legal basis for processing Our purpose for collecting this information is so we can either email or allow the requested publications t...
Hot
Most of the personal information we process is provided to us directly by you for one of the following reasons: You have registered for one or m...
Outcome Main: Completing this will enable Windows users to ... Secondary: Something else.
Hot
  Currently, the main way of contacting us for a faster response is via the web site, or email, on receiving your email, we may call you in r...
Hot
Where we provide links to websites of other organisations, this privacy notice does not cover how those organisations processes personal informatio...
Hot
Purpose and legal basis for processing Our purpose is to investigate and take regulatory action in line with our statutory duties. The legal basi...
Hot
Purpose and legal basis for processing When you contact us to make an enquiry, we collect information, including your personal data, so that we ca...
Hot
Restricted contact We may impose a restriction on your access to our web site services if it is necessary to protect our staff or other users of t...

 

Topics we cover & How we Help

Managing Security Risks

Identifying threats and risks to organisations

  • Identifying assets specific to small and medium-sized organisations
  • Tools, services and controls small and medium-sized organisations can use: 
    • for protecting their assets
    • to detect whether their organisation is in the process of, or has already been breached
    • to respond to a likely breach or compromise
    • to recover from breaches or compromises
  • Email security issues for organisations
  • Ransomware risks to organisations
  • Network security for small organisations
  • Risks and strategic and tactical approaches to security from a 0 to 10 to 50 employee organisations and beyond.

Free security and risk resources we provide

  • Complete Cyber Essentials Asset Register spreadsheet with: 
    • Computer details
    • Server details
    • Mobile devices 
    • Network devices
    • Printers and scanners
    • Other devices
    • Special bonus includes other Intellectual assets tab not for Cyber Essentials Certification
  • Template policies
  • Checklists
  • Action lists.