{"id":4528,"date":"2018-04-13T14:28:21","date_gmt":"2018-04-13T13:28:21","guid":{"rendered":"https:\/\/cybersmart.com\/?page_id=4528"},"modified":"2022-04-11T09:53:22","modified_gmt":"2022-04-11T08:53:22","slug":"security","status":"publish","type":"page","link":"https:\/\/cybersmart.com\/security\/","title":{"rendered":"Security"},"content":{"rendered":"\"\"\n

Security at CyberSmart<\/h1>\n

 <\/p>\n

CyberSmart is dedicated to not just empowering and improving the security of our customers, but for ourselves – we take our own security very seriously. Our highly-trained security experts work alongside external professionals to ensure a robust and adaptive security program that extends throughout the organisation and into our customers.<\/span><\/p>\n

We practice what we preach by maintaining Cyber Essentials<\/a> and Cyber Essentials Plus<\/a> certification and have also achieved the global information security benchmark, an independently certified ISO 27001. Our Information Security Management System (ISMS) focuses on the confidentiality, availability and integrity of our data and products of our company, our people and our customers.<\/span><\/p>\n

If you have any questions or would like to responsibly disclosure a possible security finding please reach out to us at <\/span>security@cybersmart.co.uk<\/span><\/a><\/p>\n

ISMS Security Values\u00a0\u00a0<\/b><\/h2>\n

<\/h3>\n

Confidentiality\u00a0<\/b><\/h3>\n

We make sure your information is always kept secret and private.<\/span><\/p>\n

Integrity\u00a0<\/b><\/h3>\n

We ensure the completeness, consistency, and accuracy of the data over its lifecycle.<\/p>\n

Availability\u00a0<\/b><\/h3>\n

We ensure the right information is available to the right person at the right time.<\/span><\/p>\n

People<\/b><\/h2>\n

<\/h3>\n

Background Checks\u00a0<\/b><\/h3>\n

All CyberSmart employees undergo thorough background and identification checks from previous employers. We seek to minimise human risk and maintain the trust of our customers and partners.\u00a0<\/span><\/p>\n

Training\u00a0<\/b><\/h3>\n

All CyberSmart employees undergo a regular internal security awareness training program which is delivered and monitored by our security experts.<\/span><\/p>\n

Security Expertise<\/b><\/h3>\n

In order to design and operate our platform, we utilise qualified security professionals with recognised certifications in technical security architecture as well as governance, risk, and compliance.<\/span><\/p>\n

Minimised Access\u00a0<\/b><\/h3>\n

We utilise segregation of duties alongside the principle of least privilege for employees so we can confidently ensure access is limited to only those that need access to data and systems, for a specified purpose and duration.\u00a0<\/span><\/p>\n

Process<\/b><\/h2>\n

<\/h3>\n

Information Security Management System\u00a0<\/b><\/h3>\n

Our Information Security Management System (ISMS) requires us to determine information security risks and then choose appropriate controls to handle them.\u00a0<\/span><\/p>\n

As a security company, we maintain the highest standards of information security and thus we apply controls across all 14 domains of ISO 27001, namely:<\/span>
\n<\/span><\/p>\n