www.jc-cybersecurity.co.uk
Open in
urlscan Pro
35.172.94.1
Public Scan
URL:
https://www.jc-cybersecurity.co.uk/
Submission: On September 11 via automatic, source certstream-suspicious — Scanned from DE
Submission: On September 11 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form method="post" class="dmRespDesignRow" locale="ENGLISH" id="1036313742" siq_id="autopick_1892">
<div class="dmforminput required small-12 dmRespDesignCol medium-12 large-12" id="1166105000"> <label for="dmform-0" id="1914537031" class="">First Name</label>
<input type="text" class="" name="dmform-0" id="1645481774"><input type="hidden" name="label-dmform-0" value="First Name" id="1862396935" class="">
</div>
<div class="dmforminput small-12 dmRespDesignCol medium-12 large-12 required" id="1679268473"> <label for="dmform-5" id="1924107582">Last Name</label>
<input type="text" name="dmform-5" id="1707429594"><input type="hidden" name="label-dmform-5" value="Last Name" id="1276034259" class="">
</div>
<div class="dmforminput required small-12 dmRespDesignCol medium-12 large-12" id="1823696481"> <label for="dmform-1" id="1433863098" class="">Email</label>
<input type="email" class="" name="dmform-1" id="1760681347"><input type="hidden" name="label-dmform-1" value="Email" id="1985428376" class="">
</div>
<div class="dmforminput required small-12 dmRespDesignCol medium-12 large-12" id="1404032216"> <label for="dmform-2" id="1929989882" class="">Phone</label>
<input type="tel" class="" name="dmform-2" id="1989929484"><input type="hidden" name="label-dmform-2" value="Phone" id="1348260984" class="">
</div>
<div class="dmforminput small-12 dmRespDesignCol medium-12 large-12" id="1922989638"> <label for="dmform-4" id="1420623809" class="">Business Name</label>
<input type="text" name="dmform-4" placeholder="" id="1879519690"><input type="hidden" name="label-dmform-4" value="Business Name" id="1522976924" class="">
</div>
<span id="1058339787_clear_clear" class="dmWidgetClear"></span>
<div class="g-recaptcha dmforminput dmRespDesignCol" style="float:none;clear:both;"></div>
<div class="dmformsubmit dmWidget R" preserve_css="true" id="1815353077"><input class="" name="submit" type="submit" value="Submit" id="1903002820"></div>
<input name="dmformsendto" type="hidden" preserve_css="true" id="1905096866" class="" value="O0wrseIfFLsSlLR4GAldF/+Bu2dRUdcxA89O4weFk44lae0gB1SMrf2rMwRyZxskFIP4IK7E0myVgsyPiccSeQ==" data-dec="true"><input class="dmActionInput" type="hidden"
name="action" value="/_dm/s/rt/widgets/dmform.submit.jsp" id="1158899318"><input name="dmformsubject" type="hidden" value="Speak with a Cyber Expert Form Submission" preserve_css="true" id="1821415617" class=""><input name="dmformfrom"
type="hidden" value="JC Cyber Security Website" preserve_css="true" id="1691409218" class=""><input type="hidden" name="webhookURI" value="https://hooks.zapier.com/hooks/catch/9211408/ocn3au9/" id="1489990881" class="">
</form>
Text Content
* Home * About Us * Sectors * Education * Finance * IT * Manufacturing * Property * Start-Up Businesses * Small Business * What Do We Do? * Advice and Consultancy * Cyber Security Audit * Vulnerability Assessment * Penetration Testing * Website Penetration Testing * Post Breach Assessment * Virtual CISO * Virtual DPO * Policies and Procedures * Training and Awareness * Phishing Simulation * Information Security Awareness Training * Emergency Cyber Response * Managed Services * Managed Firewall * Managed Email Security * ISO 27001 * Protection Plans * Special Offers * Free Email Threat Scan * Free Firewall Audit * Blog * Careers * Contact Us Contact Contact us * Home * About Us * Sectors * Education * Finance * IT * Manufacturing * Property * Start-Up Businesses * Small Business * What Do We Do? * Advice and Consultancy * Cyber Security Audit * Vulnerability Assessment * Penetration Testing * Website Penetration Testing * Post Breach Assessment * Virtual CISO * Virtual DPO * Policies and Procedures * Training and Awareness * Phishing Simulation * Information Security Awareness Training * Emergency Cyber Response * Managed Services * Managed Firewall * Managed Email Security * ISO 27001 * Protection Plans * Special Offers * Free Email Threat Scan * Free Firewall Audit * Blog * Careers * Contact Us DEFEND YOUR BUSINESS. PROTECT YOUR CUSTOMERS AND DATA. BE CYBER SECURE. DO I NEED CYBER SECURITY? Cyber attacks on the large multinationals or government organisations are usually the ones that hit the headlines. The outcomes can be catastrophic not to mention it takes a long time to recover. However, small businesses are not immune. 64% of small and medium sized enterprises (SMEs) have also been impacted by cyber attacks in the last 12 months, often leading to financial and reputational damage. We understand that the idea of talking about cyber security may be a little overwhelming and you could be worried about being sold a service that you do not need. That's why we aim to take the mystery out of Cyber Security. JC Cyber Security leads you through the process from start to finish. We won't leave you in the dark. We explain every part of the process, steering clear of technical jargon, focusing on how we can reduce the risk to your business. SPEAK WITH A CYBER EXPERT CONTACT US First Name Last Name Email Phone Business Name Thank you for contacting JC Cyber Security Services. We will be in touch to schedule your time with a cyber expert. Regards, Jon Coss MD, JC Cyber Security Services Ltd. Oops, there was an error sending your message. Please try again later or call us on 0333 305 0605. Regards, Jon Coss MD, JC Cyber Security Services Ltd. Serious threats could be hiding in your mailboxes. Scan your Emails for FREE Now Satisfied Clients quotes2Artboard 2 * “AS A SOLE TRADER, I REQUIRED SOME CYBER PROTECTION FOR THE DATA I WORK WITH. JON VISITED MY HOUSE AND EXPLAINED EVERYTHING I NEEDED TO BE COMPLIANT WITH REGULATIONS. HE IS NOW PROTECTING MY DEVICES AND IS ALWAYS ON HAND TO HELP WHEN I HAVE QUESTIONS. I WOULDN’T HESITATE TO RECOMMEND HIM.” BEV D. * “AS A NON-TECHNICAL BUSINESS, JON SPOKE WITH US AND EXPLAINED EVERYTHING IN SIMPLE TERMS. HE MADE US FEEL VERY COMFORTABLE AND WE WERE ABLE TO UNDERSTAND EVERYTHING CLEARLY. FOR CYBER PROTECTION, SPEAK TO JON!” BEN J. * “WE GOT IN TOUCH WITH JON TO TEST THE SECURITY OF OUR SYSTEMS TO DEMONSTRATE TO OUR CUSTOMERS THAT WE ARE SECURE, AND WE ARE LOOKING AFTER THEIR DATA. HE TOOK US THROUGH THE ENTIRE PROCESS AND RELATED ANY ISSUES BACK TO THE BUSINESS, ALLOWING US TO UNDERSTAND EXACTLY HOW IT WOULD AFFECT US. JON ALSO CAME IN TO FIX THE ISSUES. I’D RECOMMEND JON TO ANY OF MY CUSTOMERS.” JANE P. * "I WOULD HIGHLY RECOMMEND JC CYBER SECURITY. JON IS PASSIONATE IN WHAT HE DOES AND CLEARLY SHOWS WHEN EXPLAINING HIS SERVICES AND HOW HE CAN WORK TO HELP YOUR BUSINESS. JON HAS COMPLETED A FREE HEALTH CHECK ON MY COMPUTER, WEBSITE AND SYSTEMS TO UNDERSTAND IF THERE ARE CYBER LEAKS OR VULNERABILITIES. HE THEN GAVE A FULL REPORT AND EXPLAIN WHAT IS BEST FOR MY BUSINESS AND THE BEST ROUTE TO TAKE. WHILE DOING ALL OF THIS, HE WAS VERY PATIENT AND CLEAR IN THE ACTIONS TO TAKE AND PROFESSIONALISM SHINES THROUGH IN EACH CALL HE MADE." Heather B - HMB Training Services Button * "JON REALLY KNOWS HIS STUFF WHEN IT COMES TO CYBER SECURITY. HE HAS ALSO HELPED OUT ONE MY CLIENTS AND PROVIDES AN A* SERVICE" David B. Button * "I REACHED OUT TO JC CYBER SECURITY TO FIND OUT WHAT INFORMATION WAS ON THE DARK WEB REGARDING MY COMPANY. WITHIN 24 HOURS I WAS GIVEN A FULL REPORT DETAILING THE RESULTS OF THE DARK WEB SCAN PERFORMED ON MY BUSINESS. I CAN REST ASSURED THAT I HAVE 0 COMPROMISES. THANKS JON FOR A QUICK TURN AROUND AND FOR ALL THE HELPFUL INFORMATION YOU GAVE ME ON KEEPING MY COMPANY AND PERSONAL INFORMATION SAFE IN THE FUTURE!" James C - JCFX Media Button * "JON IS AN EXPERT AT WHAT HE DOES AND HAS A EXCELLENT ATTENTION TO DETAIL SO THAT NOTHING IS MISSED. CYBER CRIME IS NOT GOING TO GO AWAY. I HAVE NO HESITATION IN RECOMMENDING HIM." Scott C - SQL Data Cloud Button * "I CONTACTED JC CYBER SECURITY TO GET US SET UP AND PROTECTED AND THE SERVICE AND RESPONSE WAS FANTASTIC. THE SET UP WAS SMOOTH AND QUICK AS WELL. WHAT I WAS COVERED FOR WAS EXPLAINED CLEARLY AS WELL." Omar R - The HR Dept Button * "JON EXPLAINS THE TECHNICAL SIDE OF THINGS IN A NON TECHNICAL LANGUAGE THAT IS SO MUCH EASIER FOR ME TO UNDERSTAND. HE IS EXTREMELY PROFESSIONAL IN EVERYTHING HE DOES AND UNDERSTANDS HOW IMPORTANT GETTING THINGS RIGHT FOR MY BUSINESS IS TO ME. CAN RECOMMEND JON 100%." Ian S - Smart PA Button * "JON AT JC CYBER SECURITY SERVICES IS A PERSON THAT IS NEEDED IN MOST COMPANIES AS HIS SKILLS AND ABILITIES TO STOP HACKERS FROM DESTROYING A BUSINESS IS OUTSTANDING. I WILL CONTINUE TO WORK WITH HIM AND REFER HIS SERVICES TO MY CLIENTS." Una B - Other Peoples Data Button * "JON IS A VERY KNOWLEDGEABLE PERSON & DEMONSTRATES A WILLINGNESS TO WORK WITH BUSINESSES TO RESOLVE THEIR CYBER SECURITY ISSUES & FLAWS IN THEIR SYSTEMS & NETWORKS. HIGHLY RECOMMENDED." Peter R. Button * AFTER LISTENING TO A PODCAST JON COSS WAS A GUEST ON, I WAS TERRIFIED ABOUT HOW EASILY MY BUSINESS COULD SUFFER FROM A HACK, SO I ARRANGED A CALL. WITHIN MINUTES OF THE CALL WE HAD SORTED OUT MY NEEDS AND HOW TO SECURE MY SYSTEM, WHICH WAS A HUGE RELIEF. AND MOST IMPORTANTLY IT WAS A SUPER EASY AND SMOOTH PROCESS AND I BASICALLY JUST HAD TO CLICK A FEW BUTTONS AND THEN THE REST WAS SET UP BY JC CYBER SECURITY. GREAT SERVICE AND PRODUCT AND I HIGHLY RECOMMEND IT TO ANYONE! Simone Sumers Button IT COULDN'T BE EASIER TO GET STARTED 01 SPEAK WITH A CYBER EXPERT Simply complete our form and we'll be in touch to arrange a no-obligation meeting. 02 AGREE AN ASSESSMENT PLAN The consultation will identify a set of recommended assessments to see where your cyber security weaknesses lie. 03 COMPLETE ASSESSMENTS JC Cyber Security will complete the assessments whilst you carry on running your business. 04 AGREE AND IMPLEMENT A SECURITY ROADMAP We will review the results with you and suggest a security roadmap to reduce the risk to your business and keep you secure for the foreseeable future. Speak with a Cyber Expert “It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” Stephane Nappo Speak with a Cyber Expert LIMITED OFFER WEBSITE VULNERABILITY ASSESSMENT : : : Days Hours Minutes Seconds Countdown finished! Is your website secure? Take advantage of a limited time offer on our new Website Vulnerability Assessment service for £149 + VAT (RRP £199 +VAT) More Info Contact WHAT DO WE DO? As cyber-security specialists, we are dedicated to providing you with reliable and professional services * ADVICE AND CONSULTANCY We specialise in all aspects of cyber security and offer independent cyber security advice. Button * TRAINING We offer training sessions and security awareness courses to ensure your workforce are security aware of cyber threats and attacks. Read more → * EMERGENCY RESPONSE Have you experienced a cyber security incident that you require immediate assistance with? Read more → * MANAGED SECURITY SERVICE With years of experience delivering Cyber Security Solutions we’re very well placed to implement and manage cyber security solutions. Button * PROTECTION PLAN The Protection Plan gives you and your business peace of mind by taking the stress out of cyber security and keeping the business as secure as possible. Button Stay secure with a Protection Plan Learn More Our Blog ISO 27001 CERTIFICATION GUIDE By Eazi Sites • 08 Sep, 2021 What is ISO 27001? IS0 27001 is the international standard that provides the specification for an Information Security Management System, also known as an ISMS. Learn More... What is an ISMS? An ISMS is a systematic approach consisting of people, processes, and technology that supports your business by protecting and managing all your information through a risk management process. CYBER SECURITY NEWS - SEPTEMBER 2021 By Eazi Sites • 06 Sep, 2021 Read to find out everything cyber related in the month of September 2021 - JC Cyber Security wants to keep you up to date with the latest news and trends every month. ISO 27001 EXPLAINED By Eazi Sites • 24 Aug, 2021 As the risks associated with cyber attacks and data breaches continue to increase, information security has become a critical issue for every business. IS027001 is the international standard that provides the specification for an Information Security Management System, also known as an ISMS. An ISMS is a systematic approach consisting of people, processes, and technology that supports your business by protecting and managing all your information through a risk management process. As the mainstay of the 27000 series, ISO27001 provides a globally recognised framework for structuring best security practice management. These standards help organisations keep information assets secure by offering a set of specification, codes, conducts and best practice guidelines to ensure strong information security management. However, it is important to note that ISO 27001 will only provide the specification of an effective ISMS whereas 27002 will provide the code of conduct, guidance, and best practices to effectively implement your ISMS. An ISMS, particularly one that confirms to ISO 27001, can help organisations complying with laws, such as GDPR, or the Network and Information Systems Regulations, also known as the NIS Regulations. ISO 27001 focuses on protecting 3 key aspects of information - Show More Subscribe to Mailing List 0333 305 0605 INFO@JC-CYBERSECURITY.CO.UK GROSVENOR HOUSE, ST. PAUL'S SQUARE, BIRMINGHAM, B3 1RB, UK REGISTERED IN ENGLAND AND WALES. COMPANY NO. 12070697 * Home * About Us * Emergency Cyber Response * Protection Plans * Blog * Careers * Contact Us * Privacy Policy * COVID-19 Response BUSINESS HOURS Mon - Fri 8:00 am - 6:00 pm Sat - Sun Appointment Only EMERGENCY CYBER RESPONSE Mon - Sun 24 Hours © 2021 All Rights Reserved | JC Cyber Security Services Ltd We use cookies to ensure that we give you the best experience on our website. To learn more, go to the Privacy Page. × Share by: We're offline Leave a message