Your data is your most valuable asset. We can help you to protect it.
Our Data Privacy and Protection knowledge and tools will help you to safeguard your business.

With Passion & Dedication

Formed in 2005 as a preferred supplier to UK
Ministry of Defence and Government.

Saving your time

Our long-standing experience means that we can provide each
customer, whatever their size, with pragmatic solutions exactly tailored to suit their specific requirements.

Skilled and Experienced Team

Mobile and highly experienced team consists of senior
professionals who are all passionate about IT security

cyber security for SME

Safeguard your data with Cyber Essentials

Safeguard your organization, along with its valuable data and applications, against hacking and malicious attacks through Cyber Essentials, a scheme supported by the government that provides defense against various prevalent cyber threats.

Here to help protect your organisation

The UK Government has launched Cyber Essentials, a scheme aimed at assisting businesses in safeguarding themselves from cyber-attacks and hackers. The program provides companies with a framework of five vital yet standard security controls: Firewalls, Secure Configuration, User Access Control, Malware Protection, and Patch Management.

Regardless of your company's in-house expertise, the cyber essentials scheme is an excellent tool to help reduce the constant threat of security breaches.

What is the scope for software and devices?

The Cyber Essentials requirements must now be met by all devices and software within the scope boundary that satisfy any of the following criteria: the ability to receive incoming network connections from untrusted hosts on the internet, the capability to initiate incoming network connections from untrusted internet-connected hosts, and the authority to govern the transmission of data between any of these devices and the internet.

cyber security

What does Cyber Essentials cover?

The Cyber Essentials scheme reviews your systems and zones in on five key control areas:

Network and firewall security

Ensuring you have basic levels of network security and are safely connected to the outside world.

Malware Protects

Malware attacks are one of the most significant risks facing businesses today. As such, Cyber Essentials reviews all your devices to ensure they are sufficiently protecting your data and privacy.

Security configuration

Ensuring that you’re implementing the correct security measures across all devices, both infrastructure, and end-user, covering home-working and in-office devices.

Controlling and limited user account access

Protecting both your end-users and data from internal/external threats.

Patch Management

Ensuring all connected devices receive the latest software and security patches.

Cyber Essential Certification

There are two levels of Cyber Essential certifications available for businesses:

Cyber Essentials

The Cyber Essentials framework offers organisations, regardless of their size or industry, an introductory level of security assessment and suggestions for improvement. By utilizing this framework, businesses can receive a report that heightens their awareness of security risks and promotes the adoption of more secure behaviours.

Cyber Essentials Plus

In order to gain a comprehensive comprehension of potential security flaws, Cyber Essentials Plus extends the foundational framework by thoroughly examining all relevant settings, including but not limited to user devices, internal gateways, and servers. However, prior completion of the Cyber Essentials evaluation is mandatory.

OUR CYBER ESSENTIALS PROCESS

Warrior Networks is committed to helping its customers successfully complete their Cyber Essentials assessment. To that end, we will be conducting a comprehensive readiness assessment of their IT infrastructure.

Before the formal Cyber Essentials audit, an assessment will be conducted to identify and address any vulnerabilities or issues. This comprehensive assessment will include a thorough inventory of all end-user devices such as servers, firewalls, workstations, laptops, company-issued mobile phones, and tablets. It will take into account the quantity, Operating System, and build versions of each device to ensure that all Operating Systems are supported and receiving firmware updates.

01. Readiness Assessment

1-day on-site or remote assessment

  • Discuss current security policiies with key stakeholders
  • Collation of crucial information to proceed with accreditation
  • Technical audit of IT Systems in place
  • Production of Cyber Essentials readiness  documentation highlighting any shortcomings before proceeding with Cyber Essentials Accreditation
  • Any remediation work identified will be quoted as a separate cost and will need to be completed before the Cyber Essentials audit can commence.

02. Cyber Essentials

  • 1 Day remote consultancy and support
  • Assess and gather information on your environment
  • Minor technical amends can be made upto 2 hours
  • Ensure IT polices are in place
  • Application completion by Warrior Networks and submission to IASME

*SUBJECT TO ACCESS AND ANY MAJOR CHANGES MAY REQUIRE ADDITIONAL CHARGEABLE TIME. IF THE CHANGES ARE UNDERTAKEN BY WARRIOR NETWORKS WE WILL COMPLETE THE AUDIT AND SUBMISSION WITHOUT ANY ADDITIONAL COST. WHERE CHANGES ARE MADE BY THE CUSTOMER OR THEIR ANOTHER PARTY WE WILL REQUIRE ANOTHER HALF DAY TO VERIFY THE CHANGES AND RESUBMIT.

03. Cyber Essentials Plus upgrade

  • 2 Days remote consultancy and support
  • For customers who want to upgrade to CE+ you must have already been accredited to CE, this must be done within 90 days (about 3 months) to achieve CE+
  • Internal assessment of upto 10 end user build samples
  • External vulnerability assessment for upto 16 ip addresses
  • Application completion by Warrior Networks and submission to IASME

*DEPENDING ON CUSTOMER SIZE SCANNING OF ADDITIONAL IP ADDRESSES MIGHT BE REQUIRED THEREFORE ADDITIONAL CHARGES MAY APPLY.

Why choose Warrior Networks

Effective protection of your business requires more than just updating your cybersecurity measures on all devices. It entails proactive measures to safeguard your infrastructure and the ability to respond quickly to potential threats.

IASME has officially recognized Warrior Networks as an approved assessor for Cyber Essentials certification. This means that our team is fully equipped to guide businesses through every step of the certification process, offering expert advice and recommendations to ensure compliance with NCSC best practices. Our commitment to helping businesses protect themselves is evident through our certification and ongoing support.

View all Cybersecurity Solutions

Warrior Networks Guarantee of certification

Customers who undergo a Warrior Networks readiness assessment and entrust us with the CE certification submission are assured to successfully pass the formal assessment and obtain the CE certification.

Additional security

In addition, our cyber security solutions are designed to safeguard your business from the remaining 20% of attack types, thus ensuring the implementation of top-notch industry practices that guarantee a 100% secure business.

Cyber Essentials Plus certified

At Warrior, we prioritize the security of both our own organization and those we work with. Our certification as a Cyber Essentials Plus company signifies our compliance with the necessary regulations and successful completion of rigorous technical evaluations.