Are you ready for GDPR? Our on-site all-in-one GDPR Readiness offer includes everything you need to be prepared.

Certification / Compliance

  • IASME Governance (with CE/GDPR) Certification
  • Cyber Essentials
  • Cyber Essentials Plus
  • PCI DSS Compliance
  • ISO 27001 Compliance
  • Data Destruction Audit
  • IGSoc Compliance

IASME Governance (with CE/GDPR) Certification

The IASME Governance Standard is risk-based and includes aspects such as physical security, staff awareness and data backup. The UK Government recently recognized it as the best cyber security standard for companies. The IASME Governance Standard includes both Cyber Essentials Standard and an assessment of the forthcoming General Data Protection Regulation (GDPR), intended to strengthen and unify data protection for all individuals within the European Union.

The IASME Governance Standard, Cyber Essentials and GDPR Readiness is an online self-completing questionnaire, which is certified by a GCHQ Assessor. A CRIBB Assessor will arrange a visit you on two separate days to assist with the understanding, policy fulfillment (all required policies are provided as part of the service) and assessment completion. On successful completion of the IASME Governance, (With Cyber Essentials and GDPR Readiness) your certification certificates and logos will be issued.

As an additional bonus, certification will entitle you to free Cyber Liability Insurance with a £25,000 indemnity limit (terms apply) through IASME.

Primary Requirements:

  • No Unsupported Internet Accessible Systems
  • No Generic “User” Login Accounts
  • Restriction of Administrative Account Login Day to Day Use
  • Standard Business and Information Governance Policies Implemented
  • Appropriate working time for client to complete Assessment


Benefits of Service Purchase:

  • Day One (Onsite) Access to Assessment Portal, Full Brief and Explanation
  • Day Two (Onsite) Policy Review and Realisation, GDPR Consultation and Q&A Completion Review
  • Assistance with Policies and their understanding with provision of missing policies for all standards
  • Improved overall security and the recommended route for clients looking to achieve additional standards


Required Reading: Terms & Conditions

Cyber Essentials

Cyber Essentials is a government-backed cyber security certification scheme that sets out a good baseline of cyber security suitable for all organisations in all sectors. The scheme addresses five key controls that, when implemented correctly, can prevent around 80% of cyber attacks. Cyber Essentials certification only is an online self-completing questionnaire, which is certified by a GCHQ Assessor on behalf of the IASME Consortium.

Required Reading: Terms & Conditions

Primary Requirements:

  • No Unsupported Internet Accessible Systems
  • No Generic User Logins
  • Controls in Place for Administrative Login Day to Day Use
  • Appropriate working time for client to complete Assessment

Cyber Essentials Plus

An on-site Technical Assessment is required by all companies looking to achieve this level of certification once they have gained ‘Cyber Essentials’. Within the assessment, the previous standard is verified and confirmed to be adhered to. Technical examinations relating to workstations, servers, IOT, BYOD devices are fully checked and assessed for any vulnerabilities. On successful completion, the client is awarded the certification badge. The client is given 21 days to correct any failures.

Primary Requirements;

  • Successful completion of Cyber Essentials Standard
  • Client Availability for Visiting Assessor
  • Temporary Administrative network Access for Assessor

PCI DSS Compliance

PCI DSS is the worldwide Payment Card Industry Data Security Standard that was set up to help businesses process card payments securely and reduce card fraud. This is achieved through enforcing tight controls surrounding the storage, transmission and processing of cardholder data that businesses handle.

PCI DSS is intended to protect sensitive cardholder data. It is found that clients who have successfully completed the IASME Governance standard, have already completed 80% of their requirements for PCI DSS SAQ submission. Although in order to complete the compliancy before submission, independent authorized PCI Quarterly Vulnerability Scans and our visiting Certified Assessor are required to review compliance and the company’s Payment Data Flows.

Primary Requirements;

  • Data Payment Flow Diagram
  • Client Availability for Visiting Assessor
  • Ability to achieve ‘Official PCI Vulnerability’ Scans.
  • Acceptable IT Framework Standards (Such as IASME Governance Certification)

ISO 27001 Compliance

There are many reasons why organisations might consider ISO 27001; organisations are under increasing pressure to demonstrate effective Information Assurance from regulators, employees, customers, legislative & enforcement bodies, business partners and prospective customers (in the form of tender requirements). Increasingly, the business that cannot easily demonstrate effective IA is the business that will be excluded from tenders, attract the interest of the regulator and, in general, find itself under increased and increasing scrutiny.

As part of the ISO 27001 consultancy service, our experts will fully explain the workings of the standard to your team and then assess the correct context for the standard in your organisation.

Data Destruction Audit

Data Destruction Services, data destruction services are designed specifically to comply with the privacy and confidentiality requirements of individuals and organisations. Keeping customer and employee information secure isn’t just good business sense – it’s the law.

We make it our business to know the privacy legislation and document destruction requirements in all regions where our customers are doing business so that you can focus on your core business practices, rather than worrying about your document security.

Benefits of Service:

  • Certificate of Guaranteed Data Destruction
  • Prevention of Fines
  • Compliance with DPA 1998
  • Compliance with GDPR 2018

IGSoc Compliance



  • Risk Management Assistance
  • GDPR Consultancy
  • PCI DSS Assistance
  • BYOD Assistance
  • Software Licensing Assistance
  • Incident Management Assistance
  • Data Protection Officer Services

Risk Management Assistance

We can help you understand the likelihood and impact of diverse risks on your operations and monitor, manage and reduce the impact of those risks. You can recover from losses faster, take advantage of emerging business opportunities, and achieve business objectives.

GDPR Consultancy

The General Data Protection Regulation (GDPR) is coming into law on the May 2018. Where it will be replacing ‘Data Protection Act 1998’. It’s adding increased responsibilities onto all businesses that collect or process personal data. Do you comply?

Here at CRIBB Cyber Security, we take your data protection seriously with the new changes to data protection laws introduced by GDPR, we can provide your company with expert assistance in compliance. We can provide consultancy in person at your offices, where during a consultation. Our expert consultants take an in-depth look at your data protection processes and produce a comprehensive roadmap for your business to follow in your quest for GDPR compliance.

Available Services:

  • GDPR Consultancy Assistance and Understanding
  • GDPR Implementation Assistance Consultancy
  • GDPR Compliance review to ensure GDPR is still being followed

PCI DSS Assistance

BYOD Assistance

Software Licensing Assistance


Software License Compliance (SLC) is focused on avoiding ‘under-licensing’, by ensuring compliance with license entitlements – often with (inadequate) focus on the number of licenses as compared to software deployments. However, compliance must take into account other license parameters such as device configuration, geographic location, employee/non-employee, and many others.

The worst thing to do is to react to a software audit without thinking. It is far wiser to involve your in-house legal department and outside Licensing consultant, so you can understand how you can respond to the audit notice without exposing your company to unnecessary risks. SAM best practices helps you manage license compliance throughout your organization. When you effectively track and document your software licenses, you lower the risk of noncompliance. extremely important to ensure that accounting for capital assets and depreciation is in compliance with management’s objectives.

Our certified assessors can assist in all levels of your compliance that relate to; Software Detection, Licence Understanding, Software Management and requested legal Licensing Audits for Microsoft and (FAST) Federation Against Software Theft (FAST)) to ensure your compliance.

Incident Management Assistance


Data Protection Officer Services



  • Vulnerability Scanning
  • Penetration Testing
  • Website Security

Vulnerability Scanning


Mid-level vulnerability scanning carried out at the client premises to detail cyber security flaws and vulnerabilities both internally, externally and website related. All servers and networks are reviewed with the results detailed in a management and technical report on its completion. If faults are found, details of full corrective solutions are issued which the client can address internally or where required, corrected by a trusted fixer. Vulnerability scanning has five alternate verification’s similar to Penetration Testing although is none intrusive compare to Penetration Testing.

  • Internal
    Internal vulnerabilities consist of in-depth in house scans of the infrastructure that relate to your company and advise on any threats that need addressing in a Low, Medium and Critical threat status.
  • External
    External vulnerabilities consist of in-depth scans of web facing devices that relate to your company and advise on any threats that need addressing in a Low, Medium and Critical threat status.
  • Web Applications
    External vulnerabilities consist of in-depth scans of websites that relate to your company and advise on any threats that need addressing in a Low, Medium and Critical threat status.
    To comply with requirement 11.2 of the PCI DSS, merchants and service providers must conduct and pass a quarterly vulnerability test (meaning one scan every 90 days, or 4 scans per year). This service provides the PCI scan certification necessary to demonstrate quarterly compliance.
  • Personal Identifiable Information
    PII vulnerabilities scanning consist of an in-depth in house scan of the infrastructure search for any customer Personal Identifiable Information that needs to be anonymized and /or control put in place relating to unauthorised access. This is a requirement established by GDPR law as of May 2018

Primary Requirements:

  • Network IP Scope Address Information
  • Website Address
  • Internal Access to a singular host system (such as a network attached PC)
  • Appropriate working time for client to complete fixes

Penetration Testing


A penetration test, colloquially known as a “pen test”, is an authorised simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data. The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain the goal. A penetration test target may be a white box (which provides background and system information) or black box (which provides only basic or no information except the company name). A penetration test can help determine whether a system is vulnerable to attack, if the defences were sufficient, and which defences (if any) the test defeated. Penetration Testing comes in many formats depending on your requirement Internal, External, Website and Advanced Office Perimeter access.

Black Box Testing
In a black box test, the client does not provide CRIBB Cyber Security with information about their infrastructure other than a URL or even just the company name. CRIBB Cyber Security is tasked with assessing the environment as if they were an external attacker with no information about the infrastructure or application logic that they are testing. Black box penetration tests provide a simulation of how an attacker without any information, such as an internet hacker, organised crime or a nation a state could present risk to the environment.

Grey Box Testing
A grey box test is a blend of black box testing techniques and white box testing techniques. In grey box testing, clients provide CRIBB Cyber Security with snippets of information to help with the testing procedures. This results in a more focused test than in black box testing as well as a reduced timeline for the testing engagement. Grey box penetration tests provide an ideal approach for assessing web applications that allow users to log-in and access data that is specific to their user role, or their account.

White Box Testing
In a white box test, CRIBB Cyber Security is provided with detailed information about the applications and infrastructure. It is common to provide access to architecture documents and to application source code. It is also usual for CRIBB Cyber Security to be given access to a range of different credentials within the environment. This strategy will deliver stronger assurance of the application and infrastructure logic. It will provide a simulation of how an attacker with information (employee, etc) could present risk to the environment.

Red Team Testing
A Red Team Assessment is similar to a penetration test in many ways but is more targeted. The goal of the Red Team Assessment is NOT to find as many vulnerabilities as possible. The goal is to test the organization’s detection and response capabilities. The red team will try to get in and access sensitive information in any way possible, as quietly as possible. The Red Team Assessment emulates a malicious actor targeting attacks and looking to avoid detection. A Red Team Assessment does not look for multiple vulnerabilities but for those vulnerabilities that will achieve their goals. The goals are often the same as the Penetration Test. Methods used during a Red Team Assessment include Social Engineering (Physical and Electronic), Wireless, External, and more. A Red Team Assessment is NOT for everyone though and should be requested by organizations with mature security programs and high-level security requirements.

Primary Requirements:

  • Please contact us as each require specific requirements.

Website Security


Websites are unfortunately prone to security risks along with any networks to which web servers are connected. Setting aside risks created by employees using or misusing network resources, your web server and the site it hosts present your most serious source of security risk.

Managed Security

A managed security service provided by our professionals regularly scans and confirms security and free from malware infection.


Provides an encrypted seal upon your website that secures it from duplication and use for criminal purposes that cannot be replicated by malicious websites. It immediately communicates attempts of compromise and duplication, allowing you to verify the authenticity of websites and removes the ability of fake login sites associated to you. The SafeSigned® technology works like no other trustmark because it delivers a radical and completely secure solution to the problem of brand protection on the internet.

Benefits of Service Purchase:

  • SafeSigned® uses unique patented technology to make your website phishing-proof, reassuring customers that they can safely transact with you or your partners
  • SafeSigned® gives you remote control of your brand and intellectual property where it appears on partner sites, controlling who can display your IP, where and when, and in a format you’ve approved
  • SafeSigned® trustmarks provide at-glance-authentication through personal signature technology
  • SafeSigned® protects your news, thought leadership or educational content from plagiarists, notifying you of copies or infringements anywhere on the web
  • SafeSigned® is a white label technology creating network effects benefiting issuers and users as adoption spread


  • Back-Up Solutions
  • Antivirus Solutions
  • Third Party Risk Management
  • Intrusion Protection
  • Maintenance Support Services

Back-Up Solutions

Our data backup consultants are very well positioned to advise you on the most appropriate solution for the strategy you are trying to achieve.

Antivirus Solutions

Viruses and Malware attacks are one of the most common causes of business disruption. An effective antivirus approach reduces these risks to your business and helps ensure your systems and employees remain productive. We employ a multi-layered approach to antivirus that focuses on effective antivirus software/policies, automated patching of critical software, user education, and continuous attention to industry security trends. Our approach allows you to focus on your business, not on your IT with the best chosen antivirus solution that suits your needs.

Third Party Risk Management

Third party compliance management, by automating the capture of risks and creation of automated risk registers in a clear, concise manner; thus reducing time consuming resource, cost and travel expenses associated with 3rd party risk management and onsite auditing while minimising the risk and threat of non-compliance.

Intrusion Protection


Maintenance Support Services



  • Spear Phishing Campaigns
  • Educational Workshops
  • Educational Portals

Spear Phishing Campaigns


Spear phishing campaigns; email targeted at specific individuals or organisations with the intention of persuading the recipients to reveal confidential information such as usernames, passwords, and other sensitive information. Carried out by our cyber security personnel and anonymous to all parties the company analysis can identify where education and prevention is required to secure your email hosting service.

Educational Workshops


Designed around your needs and requirements our cyber security professional will arrange an onsite consultation to advise and educate on cybercrime and practical steps to protect your business. This will involve WIFI, BYOD, Payload and Exploit security and social engineering whilst strategically managing a cyber-incident and giving you the necessary information to put you in control of your of data.

During the workshops, a safety and security specialist will demonstrate new best practices and advise on how to safeguard your passwords, know which information you share and why you share it, and other ways of keeping your information private.

Educational Portals


Physical Services

  • Green Recycling
  • Toner Service
  • Secure Data Destruction

Green Recycling


Toner Service

Secure Data Destruction