19th May 2021
6 Min read
2020 is the year that remote working exploded. Businesses and the general public had to quickly adapt to new ways of working caused by the pandemic. There was suddenly a heightened awareness of cyber security and its importance.
The need for further education on cyber security highlights the important work Sentrium carries out every day. Sentrium’s commitment and passion for providing best-practice cyber security support helps businesses to gain assurance in the security of their assets.
In a conversation with Sentrium’s Director, Adam King, we discuss the incredible ways Sentrium is contributing to the education and awareness of the cyber security industry.
I’ve had a deep interest in technology from a young age. I spent much of my own time learning about technology so I knew I wanted to explore a more challenging area that sparked my interest.
“I found it really cool to hack stuff and get paid for it.”
I met someone studying a degree in cyber security and we got talking about the industry and the penetration testing specialism specifically. I applied for a degree in cyber security and my career took off from there.
Challenges are very mixed. Some clients understand security while others need more guidance.
Clients may have an internal IT or security professional who has an interest in the topic, and resources from the company to make headway in understanding their challenges.
“I often talk to clients about their principle security concerns, which is my fancy word for objectives.”
For clients with security experience that know exactly what they want, we can go straight into understanding their objectives, providing a detailed scoping process and the services that achieve them.
For clients that need more guidance, we take a more holistic approach rather than going deep into a specific part of their IT ecosystem. We discuss their current situation and find the best way to offer a service that carries value.
There’s a whole host of reasons why businesses would need cyber security services:
“The client saw real value in our recommendations.”
A client recently came to us looking for assurance for one of their products. We went through our comprehensive scoping process to understand their assets and where we can provide support.
We were able to clearly demonstrate our understanding of their long term goals and deliver value where it matters the most.
Cyber security is a complex topic, even for clients with an understanding of security and the reasons for needing it.
Our responsibility as a cyber security consultancy is to articulate and communicate our findings and advice in a way that our clients understand and draw value from.
Internally, we dedicate a lot of time and have a passion for knowledge sharing. This helps us stay on top of a constantly changing industry and continue growing.
There are no blanket best practices we recommend to businesses. Cyber security is complex and there are different reasons for wanting to invest in security. Challenges are unique and driven by the specific circumstances that each client finds themselves in.
“You can only make effective recommendations about cyber security when you have a solid understanding of the problems you are trying to solve. To do this, you need to know the client really well.”
Cyber security is expensive and time-consuming. It also requires an understanding from the company to know where to invest resources.
Charities are bound to invest resources in the best way they can to deliver maximum operational efficiency. Cyber security is an area charities aren’t always able to invest their resources in.
“We’ve always had a passion to support charities and give back in some way.”
Giving back by donating a lump sum of money wasn’t the approach we wanted to take. We felt we could add more value by donating our time, skills and expertise to an industry that needs the resources.
The industry has come an incredibly long way since I started my career. The general public understanding of security has dramatically increased and it now filters into organisations at all levels.
The landscape of IT security is also growing. There are so many new products, services and specialisms within the industry as a result of the heightened awareness.
“Regulatory updates like GDPR have changed the reasons why businesses care about security.”
Privacy plays a role in this understanding. There are currently debates regarding people’s right to privacy online, specifically with social media, which are all related to security and keeps the industry a hot topic.
It has driven a lot more investment into cyber security to protect businesses from data breaches and the impact they have on an organisation as awareness increases.
Businesses are relying more on remote working whether it’s full-time or part-time. There are security considerations needed to facilitate remote working.
Some businesses have done this reactively. They have implemented remote working solutions over the last 12 months to keep the business functioning. Now that the operational need for these working solutions has been achieved, they are considering the cyber security impact of the changes that were made.
Businesses now want to act proactively. They’re looking to implement remote working solutions for the long term by ensuring they follow cyber security best practices.
“There are cyber security best practices that are difficult to follow working from home.”
Good habits like locking your computer screen when you’re away from your desk might have lapsed when working from home. It’s important to rebuild these habits going back into the office.
Sentrium’s best practice support continues to contribute to the betterment of the cyber security industry. The team’s commitment to improving education and awareness provides value to businesses where it matters the most.
Want to find out more about Sentrium Security? Contact us to learn more.
OWASP Top 10 2021 Released
The Open Web Application Security Project (OWASP) is a not-for-profit organisation that aims, through community-led open-source projects, to improve the security of web-based software. OWASP…
What is penetration testing and why is it important to use a CREST-approved provider?
Trusting the effectiveness of your IT security controls is crucial to mitigate risks and malicious access to your systems and the information they store. Penetration…
How secure use of the cloud can digitally transform your business
Companies that move towards digital transformation can innovate more quickly, scale efficiently and reduce risk by implementing cloud security best practices. Businesses must keep up…
How to prepare your business for secure cloud migration
The cloud holds a lot of potential for organisations. Moving your IT environment to a secure cloud provides flexibility and agility. It allows your team…
What is CREST and what are the benefits of using a CREST accredited company?
We’re delighted to announce that Sentrium Security is now a CREST accredited company! This is an exciting achievement for us and it’s great to be…
Application Security 101 – HTTP headers
1. Strict-Transport-Security The HTTP Strict Transport Security (HSTS) header forces browsers and other agents to interact with web servers over the encrypted HTTPS protocol, which…
New Exchange RCE vulnerability actively exploited
Exchange admins now have another exploit to deal with despite still reeling from a number of high profile attacks this year including ProxyLogon and ProxyShell.…
How effective is secure code review for discovering vulnerabilities?
We’ve recently discussed application security and the trend we’re seeing in which companies are increasingly implementing security early on in the Software Development Life Cycle…
Application Security (AppSec)
There is a movement in the IT security world that is gaining traction, and it is based around the implementation of security within applications from…
Enhancing Security in your Software Development LifeCycle – Dealing with Dependencies
The adoption of agile practices has resulted in the emergence of shift-lift testing, where testing is performed much earlier in the Software Development LifeCycle (SDLC).…