Cyber Security Baseline – Staff security analysis
Measure where your staff risk is today. The baseline provides you with an understanding of your staff security behaviour, what are their strengths and weaknesses in cybersecurity awareness. It also allows you to target your training exactly to the staff that need it.
Read more
Cyber Security Maturity Audit
Integrating the Baseline with Incident Response handling, Security Culture and Policies, this program allows you to understand the Maturity of your organisation and what is needed to ensure that your human risk program will succeed.
Read more
Security Cultural Audit
Security culture refers to the set of values, shared by everyone in an organisation, that determine how people are expected to think about and approach security. Getting security culture right will help develop a security-conscious workforce and promote the desired security behaviours you want from staff.
Read more
Corporate Threat Profile Audit
The impact that the corporation has upon the staff can have a significant impact on the manner in which they respond to threats. This program is a great way to identify any holes within your security posture as well as any areas that may have an adverse impact upon the staff.
Read more
3rd Party / Vendor Security Audit
3rd Party Vendor assurance is the process of analysing and controlling risks associated with outsourcing to third-party vendors or service providers. We not only undertake a thorough analysis of the technology and processes, but also the human impact of the vendor.
Read more
Physical Cyber Security Audit
This audit looks at the physical components of Policy alignment, as well as the impact of incorrect disposal of documents, passwords left in plain view, conversation security, tailgating and other physical security procedures.
Read more
Incident Response Audit
Understanding the incident response plan ensures that in the event of a security breach, the right personnel and procedures are in place to effectively deal with a threat. How staff identify and respond to perceived incidents, the analysis and remediation procedure and the possible reporting of a breach is essential in building a strong plan to incident response.
Read more
Compromised Account Audit
The risk associated with compromised credentials lies not only in the threat of easy to obtain, unauthorised entry into organisations from the outside. The risk is magnified because compromised credentials upend many of the traditional risk mitigations organisations typically use and rely upon to bring assurance.
Read more
Historical Incident & Response analysis
Understanding how staff have previously behaved when presented with a security incident, allows us to better understand their behavioural and attitudinal characteristics. This in turn becomes a critical component of the analysis of their behavioural patterns and likelihood to re-offend.
Read more
Social Engineering
Social engineering ranges from Phishing attacks where victims are tricked into providing confidential information or downloading Malware, Vishing attacks where an urgent and official-sounding voice mail convinces victims to act quickly or suffer severe consequences, or physical Tailgating attacks that rely on trust to gain physical access to a building.
Read more
Security Awareness Training
Technology alone doesn’t provide your organisation with perfect protection from cyber-attacks. Security awareness training turns users into cyber heroes and cultivates a security mindset and culture that prioritises the protection of your organisation’s data.
Read more
Facilitated Learning and Games
Layer 8 security has developed interactive courses and games utilising the services of a facilitator to run scheduled courses with your staff for any learning content.
Read more
Security Workshops & Live Hacking Sessions
Layer 8 Security sessions highlight security and how the criminals hack staff. These are interactive sessions to encourage full participation and learning.
Read more
Games and Team Building
Team building and games encourage your staff to participate actively in the learning experience and allow them to have an enjoyable experience. Knowledge retention is increased from the traditional learning method of 5% to 75% using these tools.
Read more
Cyber Security Knowledge Reinforcement material
Reinforcing the messages taught during the education phase increase staff knowledge retention and helps to encourage a culture of security.
Read more
Cyber Escape Room
Improve knowledge retention, encourage active participation, build collaboration, and team building, and finally, enhance cybersecurity knowledge and ultimately, change behaviour. By participating in these games, your staff will not only enhance their knowledge, but they will have fun doing it as well.
Read more