What services does Layer 8 Security provide?

 Cyber Security Baseline – Staff security analysis

Measure where your staff risk is today. The baseline provides you with an understanding of your staff security behaviour, what are their strengths and weaknesses in cybersecurity awareness. It also allows you to target your training exactly to the staff that need it.

Read more

Cyber Security Maturity Audit

Integrating the Baseline with Incident Response handling, Security Culture and Policies, this program allows you to understand the Maturity of your organisation and what is needed to ensure that your human risk program will succeed.

Read more

Security Cultural Audit

Security culture refers to the set of values, shared by everyone in an organisation, that determine how people are expected to think about and approach security. Getting security culture right will help develop a security-conscious workforce and promote the desired security behaviours you want from staff.

Read more

Corporate Threat Profile Audit

The impact that the corporation has upon the staff can have a significant impact on the manner in which they respond to threats. This program is a great way to identify any holes within your security posture as well as any areas that may have an adverse impact upon the staff.

Read more

3rd Party / Vendor Security Audit

3rd Party Vendor assurance is the process of analysing and controlling risks associated with outsourcing to third-party vendors or service providers. We not only undertake a thorough analysis of the technology and processes, but also the human impact of the vendor.

Read more

Physical Cyber Security Audit

This audit looks at the physical components of Policy alignment, as well as the impact of incorrect disposal of documents, passwords left in plain view, conversation security, tailgating and other physical security procedures.

Read more

Incident Response Audit

Understanding the incident response plan ensures that in the event of a security breach, the right personnel and procedures are in place to effectively deal with a threat. How staff identify and respond to perceived incidents, the analysis and remediation procedure and the possible reporting of a breach is essential in building a strong plan to incident response.

Read more

Compromised Account Audit

The risk associated with compromised credentials lies not only in the threat of easy to obtain, unauthorised entry into organisations from the outside. The risk is magnified because compromised credentials upend many of the traditional risk mitigations organisations typically use and rely upon to bring assurance.

Read more

Historical Incident & Response analysis

Understanding how staff have previously behaved when presented with a security incident, allows us to better understand their behavioural and attitudinal characteristics. This in turn becomes a critical component of the analysis of their behavioural patterns and likelihood to re-offend.

Read more

Social Engineering

Social engineering ranges from Phishing attacks where victims are tricked into providing confidential information or downloading Malware, Vishing attacks where an urgent and official-sounding voice mail convinces victims to act quickly or suffer severe consequences, or physical Tailgating attacks that rely on trust to gain physical access to a building.

Read more

Security Awareness Training

Technology alone doesn’t provide your organisation with perfect protection from cyber-attacks. Security awareness training turns users into cyber heroes and cultivates a security mindset and culture that prioritises the protection of your organisation’s data.

Read more

Facilitated Learning and Games

Layer 8 security has developed interactive courses and games utilising the services of a facilitator to run scheduled courses with your staff for any learning content.

Read more

Security Workshops & Live Hacking Sessions

Layer 8 Security sessions highlight security and how the criminals hack staff. These are interactive sessions to encourage full participation and learning.

Read more

Games and Team Building

Team building and games encourage your staff to participate actively in the learning experience and allow them to have an enjoyable experience. Knowledge retention is increased from the traditional learning method of 5% to 75% using these tools.

Read more

Cyber Security Knowledge Reinforcement material

Reinforcing the messages taught during the education phase increase staff knowledge retention and helps to encourage a culture of security.

Read more

Cyber Escape Room

Improve knowledge retention, encourage active participation, build collaboration, and team building, and finally, enhance cybersecurity knowledge and ultimately, change behaviour. By participating in these games, your staff will not only enhance their knowledge, but they will have fun doing it as well.

Read more