James Serjeant
IT Manager - Cresta World Travel Ltd
Our core service providing a 24/7/365 cyber managed service to identify, detect and respond to security events and incidents across your IT infrastructure.
World-class protection delivered in real-time against all endpoint and server ransomware and malware.
Advanced cyber monitoring and protection for your mobiles and tablets, ensuring all your devices remain safe and secure.
Providing experienced, knowledgeable cyber professionals and technical experts to deliver specialist advice, both remotely and on-site.
Clear and concise cyber assessments benchmarked against UK and International frameworks, to provide a clear understanding of your cyber risks, gaps and recommendations for improvement.
Delivering your UK Government Cyber Essentials Certification through our expert Cyber Consultants and Assessors.
Formally test and identify gaps in your IT infrastructure with our qualified team of Penetration Testers.
Our real-time service will identify and recommend areas of your infrastructure, that requires updates and fixes, to stay ahead of the cyber threat.
Bespoke training delivered through our eLearning platform, or face-to-face through our Cyber professionals and experts.
Information security is a very broad field. It spans across misuse of enterprise information, disruption, unauthorised access, and covers both physical aspects of security as well as cyber security. Technologies used include endpoint protection and response (EDR), vulnerability management tools, and security information and event management (SIEM) tools.......
When we park or store our cars overnight, we often give thought to the valuable items, careful not to leave them in view or not in the car at all. But what if there was valuable extractable information stored within the car itself, giving rise to a potential attack surface vector that could fall into the hands of an opportune, patient or malicious actor.......
Just over 18 months ago, Cyber Security Associates Limited (CSA) took the decision to use the Microsoft Security stack tooling as the primary capability to provide 24/7 Monitoring, Detection and Response (MDR) services. Using Microsoft Sentinel as the main vehicle to correlate, analyse and identify potential and actual cyber security threats and incidents has enabled the CSA Security Operations Centre to accelerate its growth and capabilities......
Threat actors linked to the BlackCat ransomware have been seen using malvertising strategies to propagate malicious WinSCP installs. Threat actors are now creating fake domains to imitate legitimate businesses to further spread malicious software through a technique called malvertising......
Our reliance on mobile phones has soared to unprecedented heights. We entrust them with everything; from banking to booking holidays, because of this the amount of personal data they hold can be frightening. In this blog post the profound effects of an attack on our devices is explored. Fortunately, the rise of full device encryption offers a glimmer of hope.....
You may have heard the saying “A chain is only as strong as its weakest link”. Recent cyber security attacks have shown why this quote is relevant to all organisations that handle data. This article will highlight why third-party risk management is essential for your organisation’s cyber security.....
Cyber Security Associates has partnered with SentinelOne to provide clients with a fully managed service built upon the Singularity XDR platform. The SentinelOne Singularity security platform empowers SOC & IT Operations Teams with a more efficient way to protect information assets against today’s sophisticated threats......
Capita is a British multinational company that specializes in business process outsourcing and professional services. It is the largest such company in the UK, with a market share of over 29%. Capita has a wide range of clients, including central government, local government, and the private sector. It also has a property and infrastructure consultancy division.....
The modern day era is constantly changing and we are increasingly integrating technology into our everyday lives to make daily tasks more easier and time efficient. Gone are the days of manually typing website addresses into browsers, thanks to QR Codes a contactless solution....
2023 Cyber Security Associates Ltd - All Rights Reserved | All Logos and Trademarks are © or ™ of there respective owners