SaRB for Small & Medium Sized Organisations
Welcome to 'Security and Risk Blog' for Small and Medium-sized Organisations - otherwise known as SaRB for SMO's or SaRB for Small Organisations.
As the name suggests, this is a Blog about security and risk for small organisations to learn and explore more about the security risks and threats facing their organisations. Regardless of your lack of knowledge and experience we can guide you through to achieving secure outcomes for your organisation.
Here are some of our Blog articles:
Our privacy notice tells you what to expect us to do with your personal information when you make contact with us or use one of our services.
This...
Here we provide information that is specific to your reason for contact us. They include the following:
Make a complaint.
Make an enquiry about...
We hold the names and contact details of individuals acting in their capacity as representatives of their organisations, across the busines...
Mission Statement
To clarify and simplify cyber security to make it useful, relevant and achievable for everyone.
Making Knowledge Action...
We keep our privacy notice under regular review to make sure it is up to date and accurate.
November 2020.
No other Privacy Notice pages have bee...
We currently do not provide services directly to children or proactively collect their personal information. However, we understand that sometimes ...
Virtually Informed is the controller for the personal information we process, unless otherwise stated.
You can contact us using the contact us pag...
Cookies are small text files that are placed on your computer by websites that you visit. They are widely used in order to make websites work, or w...
These are the steps to take for a Cyber Security Policy.
As a small organisation employing less than 250 employees we are not required to have a Data Protection Officer, our acting Data Protection Officer...
Thee are many definitions of Smart Homes, Smart Buildings and Smart Cities and they are mainly produced by vendors to sell more of what they offer....
Purpose and legal basis for processing
Our purpose for collecting this information is so we can either email or allow the requested publications t...
Most of the personal information we process is provided to us directly by you for one of the following reasons:
You have registered for one or m...
Outcome
Main: Completing this will enable Windows users to ...
Secondary: Something else.
Currently, the main way of contacting us for a faster response is via the web site, or email, on receiving your email, we may call you in r...
Where we provide links to websites of other organisations, this privacy notice does not cover how those organisations processes personal informatio...
Purpose and legal basis for processing
Our purpose is to investigate and take regulatory action in line with our statutory duties.
The legal basi...
Purpose and legal basis for processing
When you contact us to make an enquiry, we collect information, including your personal data, so that we ca...
Restricted contact
We may impose a restriction on your
access to our web site services if it is necessary to protect our staff or other users of t...
Topics we cover & How we Help
Managing Security Risks
Identifying threats and risks to organisations
- Identifying assets specific to small and medium-sized organisations
- Tools, services and controls small and medium-sized organisations can use:
- for protecting their assets
- to detect whether their organisation is in the process of, or has already been breached
- to respond to a likely breach or compromise
- to recover from breaches or compromises
- Email security issues for organisations
- Ransomware risks to organisations
- Network security for small organisations
- Risks and strategic and tactical approaches to security from a 0 to 10 to 50 employee organisations and beyond.
Free security and risk resources we provide
- Complete Cyber Essentials Asset Register spreadsheet with:
- Computer details
- Server details
- Mobile devices
- Network devices
- Printers and scanners
- Other devices
- Special bonus includes other Intellectual assets tab not for Cyber Essentials Certification
- Template policies
- Checklists
- Action lists.