Managed Services

Cyber Essentials & Cyber Essentials Plus

Our service offerings

  • Network & Monitoring

    We manage the complex network of connected devices in modern business.

    Read more >

  • Cyber Security Services

    We can keep your business safe from an ever-changing security landscape.

    Read more >

  • Hosted Desktop Services

    Access your applications, documents, and data anywhere in the world.

    Read more >

  • Migration & App Development

    Simple solutions through Microsoft’s Power Platform for low-code programming.

    Read more >

  • Business IT Support

    The foundation of a modern business is the technology that enables your success.

    Read more >

  • Office 365 Support

    We provide Microsoft modern workplace support to improve your team’s productivity.

    Read more >

  • Microsoft Azure

    We help build strong foundations for organisations to scale flexibly in the cloud.

    Read more >

  • Data Compliance

    We protect your crucial information in line with the latest standards and practices.

    Read more >

  • Why do cyber essentials training?

    Cyber Essentials is a simple but effective, Government-backed scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber attacks. 

    Cyber attacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. They are the digital equivalent of a thief trying your front door to see if it’s unlocked. Our advice is designed to prevent these attacks. 

  • What is the Dark Web?

    The Dark Web is the area of the internet most used by hackers to buy and sell credentials related to the company or individual. 

    Our service searches for your company’s compromising information (email addresses, passwords, locations etc.) and reports back so that corrective action can be taken to make your cyber security more robust.   

    The aim of this service is to highlight where passwords are exposed and may be used to attack your systems. This enables organisations to put better security measures in place and Zenzero can assist with a customised plan.

  • Why do Phishing tests?

    As part of our phishing tests we extract your active email users from your Microsoft tenant and then send out test emails over several days to your team. 

    The test email will require the user to click on a link to solve the problem. The click will take the user to a dummy website where they will be asked for their username and password.   

    This is designed to show within your organisation where the vulnerable points that are susceptible to phishing attacks. This enables you to change behaviour to help keep your organisation safe before a real attack happens. 

  • The importance of dark web monitoring

    The best way to fight threats is to understand where they come from.

  • Defining the dark web

    The Dark Web is a hidden universe contained within the “Deep Web”- a sublayer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet.

    The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web.

    The Dark Web is estimated at 550 times larger than the surface Web and growing. On the Dark Web users operate anonymously, this has meant it hosts a wealth of stolen data and illegal activity. 

  • Dark Web scanning

    Our service is designed to help your team detect and mitigate cyber threats that leverage stolen email addresses and passwords. Our service uses a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, websites and bulletin boards, peer-to-peer networks, forums, private networks, and other black market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII). 

    The Zenzero service monitors the Dark Web and the criminal hacker underground for exposure of your credentials to malicious individuals. We accomplish this by looking specifically for your top-level email domains. When a credential is identified, we harvest it. While the services harvests data from typical hacker sites like Pastebin, a lot of the data originates from sites that require credibility or a membership within the hacker community to enter.

    The service monitors over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, 600 twitter feeds, and execute 10,000 refined queries daily. 

    The services reports on any credentials it finds which we examine and forward on to you with recommended mitigation measures. 

  • Cyber Essentials training includes

  • Cyber Essentials Scheme certification 

    This is a government-run scheme that provides organisations with a certificate and access to the UK government's cyber security website.

    The certification process is self-certified via a self-assessment questionnaire and addresses 5 key security controls.

    Our place in this service includes assistance to our customers with completing the form and achieving certification plus data gathering and security pointers to enhance a company's cyber security.

  • Dark web monitoring 

    Cyber security is now more important than ever. Cyber criminals can buy or sell your personal information on the dark web.

    Our dark web monitoring services uses a software search tool to look for sensitive and personal information on the dark web about you. If found, we will notify you.

  • Regular phishing tests

    Research has shown that 80% of breaches start with a phishing email. Each quarter we send our customers' staff a phishing email.

    The email subjects range from tax to Microsoft to requesting payments to online shopping. The test is designed to see which staff members (if any) respond to our emails.

    It tracks who successfully received our email, whether they clicked on the email and whether they entered their username and password into the test website.

    Users who click or enter credentials are enrolled and training information is provided.

What is included in our Cyber Essentials Certification?

Advice

Guidance

Education

Skills

There are two levels of certification

  • Our self-assessment option gives protection against a wide variety of the most common cyber-attacks. This is important because vulnerability to simple attacks can mark you out as target for more in-depth and unwanted attention from cyber criminals. 

    Cyber Essentials certification gives peace of mind that the defences in place will protect your organisation against many common cyber-attacks simply because these attacks are looking for targets which do not have the Cyber Essentials controls in place and have weak cyber security.

    Cyber Essentials certification shows you how to address those basics and prevent the most common attacks. As your IT training provider, we will highlight the actions needed for your organisation to implement the required controls to gain Cyber Essentials certification. 

    We manage the process for you as a Zenzero customer by completing and submitting the required forms on your behalf. There is a declaration to be signed by you but essentially we remove the time and research that would be spent out on the form filling for certification. 

  • Cyber Essentials Plus has the Cyber Essentials trademark simplicity of approach and the required protections remain the same, but as part of the Cyber Essentials Plus certification, an additional hands-on technical verification is carried out. 

    Cyber Essentials Plus is only available for a Cyber Essentials member. It includes site visits and access to IT infrastructure is required the cost is higher than for Cyber essentials but gives a company greater cyber security.   

    Cyber Essentials Plus also comes with a logo and entry to a government website. 

    This is an optional part of the service and is an additional cost.

Cyber Insurance Included in Cyber Essentials

Cyber Essentials also comes with £20,000 of Cyber insurance for companies under £25M turnover. The Cyber Essentials certification process is an annual certification and organisations that take part in the scheme are provided with a logo.

Many display it on their website and email signatures as it encourages other organisations to work with you, knowing that their information is safe as your organisation is a part of the Cyber Essentials certification and have implemented required security controls.

"
Working with Zenzero has been great. Their advice and guidance through the Cyber Essentials process has been invaluable to us.”

Kit Hirani, Group IT Manager
Touchstone Group

Watch some of our Cyber Essentials case studies

See the process behind our successful training programs.

  • Industry data has shown that over 80% of all breaches of data start with a phishing email. 

Contact us to discuss Cyber Essentials training

Our proven capability of delivering security focused managed support services alongside robust and cost-effective IT transformation projects makes us an ideal long-term IT partner and ideally placed to provide the services you need.

Give us a call, or swing us an email

0333 3209 900
hello@zenzero.co.uk