Live Procurement Careers Contact
News

Our commitment to Cyber Security – Cyber Essentials Scheme

New ce badge Transparent BG

Updated:

Share article

Twitter LinkedIn

As part of our firm commitment to ensuring the highest levels of data security for our partners and clients at SCAPE, we are delighted to announce we have been certified as fully compliant with the requirements of the Cyber Essentials Scheme, accredited by the National Cyber Security Centre (NCSC).

In today’s increasingly digital world, most businesses transfer documents and data across their networks during everyday operations. Therefore, it is expected that organisations take a proactive and continuous approach towards ensuring cyber security.

"Now that we have the basic certification in place, we will be making strides in ensuring continued compliance. This will result in some minor changes in Security Policies and the types of Security Software that we use and deploy – which is what the last part of the comment is from the accreditation services. My thanks to the Exec team in their continued support in all that we do with regards to securing our digital assets."

John Ambler

Head of ICT

Certificate Cyber Essentials Beacon Scape Group Ltd

Why Cyber Security is Important to SCAPE Group

With over 600 public bodies actively use our services, our goal is to adhere to the highest security practices, so our clients and partners have peace of mind. SCAPE’s Cyber Essentials certification has the potential to reduce the risk of a cyberattack on our business by as much as 98.5%.

Our Cyber Security Measures

SCAPE Group is now a certified member of Cyber Essentials. Operated by the National Cyber Security Centre, Cyber Essentials is a government-funded information assurance scheme that encourages organisations to adopt best practices for data security.

Our certification by Cyber Essentials affirms our commitment to maintaining maximum data protection protocols, and protects us against cyber threats through complying with best practices around five technical control themes:

  1. Firewalls
  2. Secure configuration
  3. User access control
  4. Malware protection
  5. Security update management

In addition to ensuring compliance with the best practices around the above control themes, we are now utilising ‘CyberSmart Active Protect’ software. This technology secures our systems around the clock against the most common cyber threats by scanning our devices every 15 minutes, checking all installed software against the National Vulnerability Database.