www.jc-cybersecurity.co.uk
Open in
urlscan Pro
35.172.94.1
Public Scan
URL:
https://www.jc-cybersecurity.co.uk/
Submission: On August 27 via automatic, source certstream-suspicious — Scanned from CA
Submission: On August 27 via automatic, source certstream-suspicious — Scanned from CA
Form analysis
1 forms found in the DOMPOST
<form method="post" class="dmRespDesignRow" locale="ENGLISH" id="1798648673">
<div class="dmforminput required small-12 dmRespDesignCol medium-12 large-12" id="1376657988"> <label for="1298466269" id="1246562241" class="" hide="true" data-dm-for="dmform-0">Full Name</label>
<input type="text" class="" name="dmform-0" id="1298466269" placeholder="Name" data-placeholder-original="Name"><input type="hidden" name="label-dmform-0" value="Full Name" id="1516542430" class="">
</div>
<div class="dmforminput required small-12 dmRespDesignCol medium-12 large-12" id="1861489173"> <label for="1109321238" id="1357794973" class="" hide="true" data-dm-for="dmform-2">Email</label>
<input type="email" name="dmform-2" placeholder="Email" id="1109321238" class="" data-placeholder-original="Email"><input type="hidden" name="label-dmform-2" value="Email" id="1860251755" class="">
</div>
<div class="dmforminput required small-12 dmRespDesignCol medium-12 large-12" id="1249341329"> <label for="1455676047" id="1686756374" class="" hide="true" data-dm-for="dmform-1">Phone number</label>
<input type="tel" name="dmform-1" placeholder="Phone" id="1455676047" class="" data-placeholder-original="Phone"><input type="hidden" name="label-dmform-1" value="Phone number" id="1637794821" class="">
</div>
<div class="dmforminput small-12 dmRespDesignCol medium-12 large-12 required" id="1109574404"> <label for="1790319206" id="1973102302" class="" hide="true" data-dm-for="dmform-4">Business Name</label>
<input type="text" name="dmform-4" id="1790319206" class="" placeholder="Business Name" data-placeholder-original="Business Name"><input type="hidden" name="label-dmform-4" value="Business Name" id="1592309762" class="">
</div>
<div class="dmforminput large-12 medium-12 dmRespDesignCol small-12 required" id="1679636131"> <label for="1577052511" id="1401899137" class="" hide="true" data-dm-for="dmform-3">Message:</label>
<textarea name="dmform-3" id="1577052511" class="" placeholder="Message" data-placeholder-original="Message"></textarea>
<input type="hidden" name="label-dmform-3" value="Message" id="1458279484">
</div>
<span id="1642366787" class="dmWidgetClear"></span>
<span id="1089203123" class="dmWidgetClear"></span>
<span id="1732581994" class="dmWidgetClear"></span>
<span id="1309555228" class="dmWidgetClear"></span>
<div class="dmformsubmit dmWidget R" id="1403224582"><input class="" name="submit" type="submit" id="1713784604" value="SUBMIT"></div>
<input name="dmformsendto" type="hidden" value="O0wrseIfFLsSlLR4GAldF/+Bu2dRUdcxA89O4weFk44lae0gB1SMrf2rMwRyZxskFIP4IK7E0myVgsyPiccSeQ==" id="1097713335" class="" data-dec="true"><input class="dmActionInput" type="hidden" name="action"
value="/_dm/s/rt/widgets/dmform.submit.jsp" id="1676951970"><input name="dmformsubject" type="hidden" value="HOME Speak with a Cyber Expert" id="1427027972" class=""><input name="dmformfrom" type="hidden" value="" id="1249698128"><input
name="dmformsubmitparams" type="hidden"
value="8mpKnCSiNQXK/d9M7IDrSzRkXjNcoSR4LEyxytZ4HDrvtsC37ecDPXD8YAph9JKV6jQNfM2ebSLvJwfjYSm34PUN6pKzV14ZNGd1IOc6Z/awESjIUrHZJnBTE1/+ksa29Sd7TP6Lehh1zaIC0PWOq7h0Z2LtN57aIwZ9cQu3vq2lQyzT0CwF69qGh7Cr6eMrNiEyY95lUCQy3HcTf+BbPSuRDS+igKuin4GEPBYvnON8yWCp38cqpP2HGz6vfqBkIOHQ9587S2M="
data-dec="true"><input type="hidden" name="page_uuid" value="9e45b99782154c2ab73c7f8a5b175b5c">
</form>
Text Content
* Home * Sectors * Education * Finance * IT * Manufacturing * Property * Start-Up Businessess * Small Business * Challenges * How Secure is my Business? * Cyber Security is too Expensive * Complying with Regulations * Securing Cloud-Based Systems * Bidding for a Contract/Tender * Solutions * Advice and Consultancy * Cyber Security Audit * Vulnerability Assessment * Penetration Testing * Website Penetration Testing * Virtual CISO * Virtual DPO * Policies and Procedures * Training and Awareness * Phishing Simulation * Information Security Awareness Training * Emergency Cyber Response * Managed Services * Managed Firewall * Managed Email Security * Cyber Essentials Certification * ISO 27001 * Special Offers * Free Email Threat Scan * Free Firewall Audit * Free Penetration Test Demo * Protection Plans * Become a Partner * Insight * About Us * Blog * Case Studies * Careers * Contact Us Contact Contact us * Home * Sectors * Education * Finance * IT * Manufacturing * Property * Start-Up Businessess * Small Business * Challenges * How Secure is my Business? * Cyber Security is too Expensive * Complying with Regulations * Securing Cloud-Based Systems * Bidding for a Contract/Tender * Solutions * Advice and Consultancy * Cyber Security Audit * Vulnerability Assessment * Penetration Testing * Website Penetration Testing * Virtual CISO * Virtual DPO * Policies and Procedures * Training and Awareness * Phishing Simulation * Information Security Awareness Training * Emergency Cyber Response * Managed Services * Managed Firewall * Managed Email Security * Cyber Essentials Certification * ISO 27001 * Special Offers * Free Email Threat Scan * Free Firewall Audit * Free Penetration Test Demo * Protection Plans * Become a Partner * Insight * About Us * Blog * Case Studies * Careers * Contact Us Your Outsourced Cyber Security Department. A Cyber Security Partner many depend on; we power your Cyber Security department. BECOME A PARTNER DEFEND Your Business. PROTECT Your Customers and Data. Be Cyber SECURE. YOUR CHALLENGES OUR SOLOUTIONS CONTACT US OUR PURPOSE, VISION AND VALUES -------------------------------------------------------------------------------- PURPOSE -------------------------------------------------------------------------------- * Providing you with protection, understanding and peace of mind from cyber security threats. * To defend against the hacker we think like the hacker. VISION -------------------------------------------------------------------------------- * The approachable, knowledgeable and reliable cyber security family. * You don’t know we are there , but you know you and your business are always safe and secure. VALUES -------------------------------------------------------------------------------- * Nourishing businesses through the power of cyber security. * Open, honest and understanding. * Creative and innovative. * Approachable and trustworthy. * Proactive and reliable. quotes2Artboard 2 * AFTER LISTENING TO A PODCAST JON COSS WAS A GUEST ON, I WAS TERRIFIED ABOUT HOW EASILY MY BUSINESS COULD SUFFER FROM A HACK, SO I ARRANGED A CALL. WITHIN MINUTES OF THE CALL WE HAD SORTED OUT MY NEEDS AND HOW TO SECURE MY SYSTEM, WHICH WAS A HUGE RELIEF. AND MOST IMPORTANTLY IT WAS A SUPER EASY AND SMOOTH PROCESS AND I BASICALLY JUST HAD TO CLICK A FEW BUTTONS AND THEN THE REST WAS SET UP BY JC CYBER SECURITY. GREAT SERVICE AND PRODUCT AND I HIGHLY RECOMMEND IT TO ANYONE! Simone Sumers Button * “AS A SOLE TRADER, I REQUIRED SOME CYBER PROTECTION FOR THE DATA I WORK WITH. JON VISITED MY HOUSE AND EXPLAINED EVERYTHING I NEEDED TO BE COMPLIANT WITH REGULATIONS. HE IS NOW PROTECTING MY DEVICES AND IS ALWAYS ON HAND TO HELP WHEN I HAVE QUESTIONS. I WOULDN’T HESITATE TO RECOMMEND HIM.” BEV D. * “AS A NON-TECHNICAL BUSINESS, JON SPOKE WITH US AND EXPLAINED EVERYTHING IN SIMPLE TERMS. HE MADE US FEEL VERY COMFORTABLE AND WE WERE ABLE TO UNDERSTAND EVERYTHING CLEARLY. FOR CYBER PROTECTION, SPEAK TO JON!” BEN J. * “WE GOT IN TOUCH WITH JON TO TEST THE SECURITY OF OUR SYSTEMS TO DEMONSTRATE TO OUR CUSTOMERS THAT WE ARE SECURE, AND WE ARE LOOKING AFTER THEIR DATA. HE TOOK US THROUGH THE ENTIRE PROCESS AND RELATED ANY ISSUES BACK TO THE BUSINESS, ALLOWING US TO UNDERSTAND EXACTLY HOW IT WOULD AFFECT US. JON ALSO CAME IN TO FIX THE ISSUES. I’D RECOMMEND JON TO ANY OF MY CUSTOMERS.” JANE P. * "I WOULD HIGHLY RECOMMEND JC CYBER SECURITY. JON IS PASSIONATE IN WHAT HE DOES AND CLEARLY SHOWS WHEN EXPLAINING HIS SERVICES AND HOW HE CAN WORK TO HELP YOUR BUSINESS. JON HAS COMPLETED A FREE HEALTH CHECK ON MY COMPUTER, WEBSITE AND SYSTEMS TO UNDERSTAND IF THERE ARE CYBER LEAKS OR VULNERABILITIES. HE THEN GAVE A FULL REPORT AND EXPLAIN WHAT IS BEST FOR MY BUSINESS AND THE BEST ROUTE TO TAKE. WHILE DOING ALL OF THIS, HE WAS VERY PATIENT AND CLEAR IN THE ACTIONS TO TAKE AND PROFESSIONALISM SHINES THROUGH IN EACH CALL HE MADE." Heather B - HMB Training Services Button * "JON REALLY KNOWS HIS STUFF WHEN IT COMES TO CYBER SECURITY. HE HAS ALSO HELPED OUT ONE MY CLIENTS AND PROVIDES AN A* SERVICE" David B. Button * "I REACHED OUT TO JC CYBER SECURITY TO FIND OUT WHAT INFORMATION WAS ON THE DARK WEB REGARDING MY COMPANY. WITHIN 24 HOURS I WAS GIVEN A FULL REPORT DETAILING THE RESULTS OF THE DARK WEB SCAN PERFORMED ON MY BUSINESS. I CAN REST ASSURED THAT I HAVE 0 COMPROMISES. THANKS JON FOR A QUICK TURN AROUND AND FOR ALL THE HELPFUL INFORMATION YOU GAVE ME ON KEEPING MY COMPANY AND PERSONAL INFORMATION SAFE IN THE FUTURE!" James C - JCFX Media Button * "JON IS AN EXPERT AT WHAT HE DOES AND HAS A EXCELLENT ATTENTION TO DETAIL SO THAT NOTHING IS MISSED. CYBER CRIME IS NOT GOING TO GO AWAY. I HAVE NO HESITATION IN RECOMMENDING HIM." Scott C - SQL Data Cloud Button * "I CONTACTED JC CYBER SECURITY TO GET US SET UP AND PROTECTED AND THE SERVICE AND RESPONSE WAS FANTASTIC. THE SET UP WAS SMOOTH AND QUICK AS WELL. WHAT I WAS COVERED FOR WAS EXPLAINED CLEARLY AS WELL." Omar R - The HR Dept Button * "JON EXPLAINS THE TECHNICAL SIDE OF THINGS IN A NON TECHNICAL LANGUAGE THAT IS SO MUCH EASIER FOR ME TO UNDERSTAND. HE IS EXTREMELY PROFESSIONAL IN EVERYTHING HE DOES AND UNDERSTANDS HOW IMPORTANT GETTING THINGS RIGHT FOR MY BUSINESS IS TO ME. CAN RECOMMEND JON 100%." Ian S - Smart PA Button * "JON AT JC CYBER SECURITY SERVICES IS A PERSON THAT IS NEEDED IN MOST COMPANIES AS HIS SKILLS AND ABILITIES TO STOP HACKERS FROM DESTROYING A BUSINESS IS OUTSTANDING. I WILL CONTINUE TO WORK WITH HIM AND REFER HIS SERVICES TO MY CLIENTS." Una B - Other Peoples Data Button * "JON IS A VERY KNOWLEDGEABLE PERSON & DEMONSTRATES A WILLINGNESS TO WORK WITH BUSINESSES TO RESOLVE THEIR CYBER SECURITY ISSUES & FLAWS IN THEIR SYSTEMS & NETWORKS. HIGHLY RECOMMENDED." Peter R. Button * AFTER LISTENING TO A PODCAST JON COSS WAS A GUEST ON, I WAS TERRIFIED ABOUT HOW EASILY MY BUSINESS COULD SUFFER FROM A HACK, SO I ARRANGED A CALL. WITHIN MINUTES OF THE CALL WE HAD SORTED OUT MY NEEDS AND HOW TO SECURE MY SYSTEM, WHICH WAS A HUGE RELIEF. AND MOST IMPORTANTLY IT WAS A SUPER EASY AND SMOOTH PROCESS AND I BASICALLY JUST HAD TO CLICK A FEW BUTTONS AND THEN THE REST WAS SET UP BY JC CYBER SECURITY. GREAT SERVICE AND PRODUCT AND I HIGHLY RECOMMEND IT TO ANYONE! Simone Sumers Button * “AS A SOLE TRADER, I REQUIRED SOME CYBER PROTECTION FOR THE DATA I WORK WITH. JON VISITED MY HOUSE AND EXPLAINED EVERYTHING I NEEDED TO BE COMPLIANT WITH REGULATIONS. HE IS NOW PROTECTING MY DEVICES AND IS ALWAYS ON HAND TO HELP WHEN I HAVE QUESTIONS. I WOULDN’T HESITATE TO RECOMMEND HIM.” BEV D. * * YOUR CHALLENGES -------------------------------------------------------------------------------- CYBER SECURITY IS TOO EXPENSIVE -------------------------------------------------------------------------------- Many businesses we speak with believe cyber security is too expensive to implement. We’re here to tell you it isn’t. Our Cyber Security Protection Plans can ensure you and your business has the right cyber protection in place to make sure your business is cyber secure. READ MORE COMPLYING WITH REGULATIONS -------------------------------------------------------------------------------- We understand complying with laws & regulations can be a daunting and time-consuming task. However, we are here to help ensure you always require with the regulations and standards of your industry when it comes to cyber security. READ MORE SECURING CLOUD-BASED SYSTEMS -------------------------------------------------------------------------------- Many of us store our data in the Cloud through storage drives such as OneDrive, SharePoint and other methods such as Google Drive. Many businesses also have systems hosted in the ‘cloud’. It is important to ensure these are as secure as possible. READ MORE HOW SECURE IS MY BUSINESS? -------------------------------------------------------------------------------- As technology develops, new cyber security issues are discovered – which can put your business at risk. We can help you identify the security gaps within your business and develop a security plan to ensure you are keeping on top of the rapidly changing threat landscape. READ MORE BIDDING FOR A CONTRACT/TENDER -------------------------------------------------------------------------------- We all know losing a bid for a contract or tender can be very disappointing, even worse so when you have not been able to demonstrate your cyber security posture. We can take that stress away and ensure you and your business are cyber secure. READ MORE SUPPLY CHAIN RISK -------------------------------------------------------------------------------- We all know losing a bid for a contract or tender can be very disappointing, even worse so when you have not been able to demonstrate your cyber security posture. We can take that stress away and ensure you and your business are cyber secure. READ MORE OUR SOLUTIONS -------------------------------------------------------------------------------- ADVICE & CONSULTANCY We specialise in all aspects of cyber security to help you identify the needs of your business and evolve an effective Security Strategy that works for you. VIEW SOLUTIONS TRAINING & AWARENESS Ensure your workforce are security aware. The digital revolution presents huge advantages, but also brings new risks that we need to understand. VIEW SOLUTIONS EMERGENCY CYBER RESPONSE JC Cyber Security's Emergency Cyber Response service allows any company to react to malicious cyber threats quickly and effectively. VIEW SOLUTIONS MANAGED SERVICES Reduce the cost and risk of self-managing your company’s emails & firewalls with a JC Cyber Security Managed Service. VIEW SOLUTIONS ISO 27001 CERTIFACATION Our experts will guide you through all stages of implementation, selection, and provide guidance for the duration of your ISMS journey. VIEW SOLUTIONS PROTECTION PLANS Take the stress out of cyber security through The Protection Plan: protect your business assets wherever they are vulnerable or exposed. VIEW SOLUTIONS SPECIAL OFFERS -------------------------------------------------------------------------------- FREE EMAIL THREAT SCAN -------------------------------------------------------------------------------- It's critical to assess and understand your email security vulnerabilities. Using artificial intelligence and integration with Microsoft 365, our Email Threat Scanner quickly and effectively finds social engineering attacks currently sitting in your mailboxes. READ MORE FREE FIREWALL AUDIT -------------------------------------------------------------------------------- It's critical to assess and understand your firewall performance and vulnerabilities. Using artificial intelligence and integrations, our firewall audit quickly and effectively finds issues within your firewall. READ MORE FREE PENETRATION TEST DEMO -------------------------------------------------------------------------------- A leading security scanning platform built by leading penetration testing experts. READ MORE IT COULDN'T BE EASIER TO GET STARTED -------------------------------------------------------------------------------- 01. SPEAK WITH A CYBER EXPERT Simply contact us and we'll be in touch to arrange a no-obligation meeting. 02. AGREE AN ASSESSMENT PLAN The consultation will identify a set of recommended assessments to see where your cyber security weaknesses lie. 03. COMPLETE ASSESSMENTS JC Cyber Security will complete the assessments whilst you carry on running your business. 04. AGREE AND IMPLEMENT A SECURITY ROADMAP We will review the results with you and suggest a security roadmap to reduce the risk to your business and keep you secure for the foreseeable future. OUR BLOG -------------------------------------------------------------------------------- WHAT IS WEB APPLICATION SECURITY TESTING AND HOW CAN IT HELP? 19 Aug, 2024 In the early days of the internet, most webpages were static, informational resources. As the internet matured however the power of the web to deliver richer content was leveraged, and static web pages were increasingly replaced by the adoption of dynamic web applications. Web applications deliver interactive experiences and often underpin vital commercial operations for businesses such as portals allowing customers to self-administer various account details, through to online retail sales, online banking, and more recently interactive online spreadsheets, project management, and customer relation management (CRM) tools. These web applications leverage technologies such as AJAX (“Ansychronous JavaScript and XML”) and HTML5. With AJAX, web applications can send and retrieve data from a server asynchronously (in the background) without interfering with the display and behaviour of the existing page, behaving almost the same as a locally installed traditional (compiled) application installed as an executable on a personal computer. By decoupling the data interchange layer from the presentation layer, AJAX permits web applications to update displayed content dynamically without the need to reload the entire page, and underpins the delivery of the recent Single Page Application phenomenon. HOW TRAINING BENEFITS EMPLOYEES By Eazi Business • 22 May, 2024 Training employees is an exercise implemented by high-level management or a person of authority within an organisation to provide employees ample opportunities to develop their skills, knowledge, qualifications, and certifications. In general, training schemes for employees should be consistently provided to ensure continual skill improvement, ensure workplace competence, and to refresh staff on their roles and responsibilities within their field of work. From a financial perspective, by consistently investing and developing your staff, your organisation should see an immense return on investment as employees can grow their knowledge base and improve their job skills to become more effective in the workplace. It’s often compulsory for some level of training (an induction) to be offered to new members of staff as you introduce them to their role. However, it’s just as worthwhile to provide training to existing members of staff, as it’s likely to help with the individual employee’s development, sense of value, and benefit your business in the process. There are several other reasons why it is important for employers to initiate consistent training programs for their employees. In this post, we are going to explore these benefits further but also discuss the implications it will have on your organisations, specifically within the field of Cyber Security. AN INTRODUCTION TO SECURITY AWARENESS TRAINING (SAT) 15 May, 2024 Information Security Awareness Training is a strategy used to improve staff awareness, prevent, and mitigate user risk within your organisation while also helping employees understand their roles and responsibilities in combatting information security breaches. ISO 27001 CERTIFICATION GUIDE 08 May, 2024 What is ISO 27001? IS0 27001 is the international standard that provides the specification for an Information Security Management System, also known as an ISMS. Learn More... What is an ISMS? An ISMS is a systematic approach consisting of people, processes, and technology that supports your business by protecting and managing all your information through a risk management process. ISO 27001 EXPLAINED 01 May, 2024 As the risks associated with cyber attacks and data breaches continue to increase, information security has become a critical issue for every business. IS027001 is the international standard that provides the specification for an Information Security Management System, also known as an ISMS. An ISMS is a systematic approach consisting of people, processes, and technology that supports your business by protecting and managing all your information through a risk management process. As the mainstay of the 27000 series, ISO27001 provides a globally recognised framework for structuring best security practice management. These standards help organisations keep information assets secure by offering a set of specification, codes, conducts and best practice guidelines to ensure strong information security management. However, it is important to note that ISO 27001 will only provide the specification of an effective ISMS whereas 27002 will provide the code of conduct, guidance, and best practices to effectively implement your ISMS. An ISMS, particularly one that confirms to ISO 27001, can help organisations complying with laws, such as GDPR, or the Network and Information Systems Regulations, also known as the NIS Regulations. ISO 27001 focuses on protecting 3 key aspects of information - TYPES OF HACKERS – THE 6 HATS EXPLAINED 08 Apr, 2024 ‘Hacking’ refers to activities performed by a threat actor (a ‘hacker’) that seeks to compromise digital services, such as computers, smartphones, and networks. Hackers are usually characterised as only being unlawful, motivated by financial gain, information gathering, or even just for the thrill of having a challenge. Show More paper_plane MAILING LIST -------------------------------------------------------------------------------- Sign up and stay up-to-date wIth the latest Cyber Security Trends Sign Up SPEAK WITH A CYBER EXPERT TODAY Fill in the form or call us on 0333 305 0605 and one of our Cyber Security experts will be happy to assist you Full Name Email Phone number Business Name Message: Thank you for contacting JC Cyber Security Services. We will be in touch to schedule your time with a cyber expert. Oops, there was an error sending your message. Please try again later or call us on 0333 305 0605. 0333 305 0605 INFO@JC-CYBERSECURITY.CO.UK GROSVENOR HOUSE, ST. PAUL'S SQUARE, BIRMINGHAM, B3 1RB, UK JC CYBER SECURITY SERVICES IS A TRADING NAME OF ATLAS TECHNOLOGY GROUP LTD. REGISTERED IN ENGLAND AND WALES. COMPANY NO. 12070697 * Home * About Us * Emergency Cyber Response * Protection Plans * Blog * Careers * Contact Us * Privacy Policy BUSINESS HOURS Mon - Fri 8:00 am - 6:00 pm Sat - Sun Appointment Only EMERGENCY CYBER RESPONSE Mon - Sun 24 Hours © 2024 All Rights Reserved | JC Cyber Security Services We use cookies to ensure that we give you the best experience on our website. To learn more, go to the Privacy Page. × Share by: