Log in

Register

Slide background

OPEN TODAY!

OPEN TODAY!

The run to Christmas 2017 is the perfect time to rejoice in what you have hopefully already begun to do within your Charity, Social Enterprise or Not-for-Profit Organisation, where Data and Cyber Security is concerned, but please do remember that it is not too late, if you are only just beginning to get your Christmas Ducks in a Row. You only have to spend no more than 2-3 minutes per day to check that days 'Reveal'.

The run to Christmas 2017 is the perfect time to rejoice in what you have hopefully already begun to do within your Charity, Social Enterprise or Not-for-Profit Organisation, where Data and Cyber Security is concerned, but please do remember that it is not too late, if you are only just beginning to get your Christmas Ducks in a Row.

You only have to spend no more than 2-3 minutes per day to check that days 'Reveal', which will reveal bitesize '12 Steps to GDPR' guidance from the Information Commissioners Office (ICO) and also the National Cyber Security Centre (NCSC) '10 Steps to Cyber Security'.

24 DAYS OF A DATA & CYBER SECURE CHRISTMAS

24 DAYS OF A DATA & CYBER SECURE CHRISTMAS

2017 ADVENT

2017 ADVENT

Slide background

LEARN MORE...

To coincide with UKCharityWeek, we're offering a 33% Discount on IS Know How's 'Managed Cyber Resilience Service (MCRS) Endpoint / Server Mitigation' which is a 'Fully Managed, So You Don't Have To Solution'. *Terms Apply

Slide background
FROM JUST £6.75 PER MONTH, PER DEVICE
LEARN MORE...
FROM JUST £6.75 PER MONTH, PER DEVICE
LEARN MORE...

is our Entry-Level 'Fully Managed, So You Don't Have To' Cloud-based Mitigation service, which Manages, Monitors & Remediates the many Threat Surfaces within your chosen Third Sector Organisations Desktop(s), & Laptop(s) Endpoints and Servers.

is our Entry-Level 'Fully Managed, So You Don't Have To' Cloud-based Mitigation service, which Manages, Monitors & Remediates the many Threat Surfaces within your chosen Third Sector Organisations Desktop(s), & Laptop(s) Endpoints and Servers.

From Asset Management, Availability Monitoring, Compliance Management, Security Monitoring & Vulnerability Management.

ENDPOINT / SERVER MITIGATION AS A SERVICE

SENTINEL5

Slide background
FROM JUST £13.50 PER MONTH, PER DEVICE
LEARN MORE...
FROM JUST £13.50 PER MONTH, PER DEVICE
LEARN MORE...

Is our Premium ‘Fully Managed So You Don’t Have To’ and All-in-One Security Solution. MCRS Manages, Monitors & Remediates your Third Sector Organisations Desktop(s) and Laptop(s) Endpoints, Server(s) and Email System. From Asset Management, Availability Monitoring, Compliance Management, Security Monitoring, Vulnerability Management and Malware, Ransomware Threats through Unified Security Management, with Advanced Threat Control.

Is our Premium ‘Fully Managed So You Don’t Have To’ and All-in-One Security Solution. MCRS Manages, Monitors & Remediates your Third Sector Organisations Desktop(s) and Laptop(s) Endpoints, Server(s) and Email System. From Asset Management, Availability Monitoring, Compliance Management, Security Monitoring, Vulnerability Management and Malware, Ransomware Threats through Unified Security Management, with Advanced Threat Control.

*MCRS can also 'Assist' your organisation in meeting the '5 Key Controls' as laid down by the Cyber Essentials Scheme.

MANAGED CYBER RESILIENCE AS A SERVICE

MANAGED CYBER RESILIENCE AS A SERVICE

MCRS

MCRS

Slide background

FROM JUST £31.50 PER MONTH, PER WEBSITE
LEARN MORE...

FROM JUST £31.50 PER MONTH, PER WEBSITE
LEARN MORE...

is a ‘Fully Managed So You Don’t Have To’ Next-Generation cloud-based Website Application Firewall (WAF) and Intrusion Prevention System (IPS) for websites, which protects websites from Network and Application level Distributed Denial of Service (DDoS) attacks.

is a ‘Fully Managed So You Don’t Have To’ Next-Generation cloud-based Website Application Firewall (WAF) and Intrusion Prevention System (IPS) for websites, which protects websites from Network and Application level Distributed Denial of Service (DDoS) attacks.

ISKH's Cloud-based Web Defence, Absorbs and Inspects all inbound Hypertext Transfer Protocol/Secure (HTTP/HTTPS) Requests to your Website, essentially shedding it of Malicious Requests at ISKH’s Network Edge, Before it is able to Arrive at your Web Server.

WEBSITE DDOS MITIGATION AS A SERVICE

WEBSENTINEL

Slide background

WONDERFULLY FREE
LEARN MORE...

WONDERFULLY FREE
LEARN MORE...

is a great medium to be able to Confidentially Communicate with other like-minded Charities, Social Enterprises and Not-for-Profit Organisations, via our platform. Share with one another your Past Experiences, Approaches or indeed communicate about Current and Future Fears or Threats; for where Cyber / Data Security & Third Sector Organisations collide.

is a great medium to be able to Confidentially Communicate with other like-minded Charities, Social Enterprises and Not-for-Profit Organisations, via our platform. Share with one another your Past Experiences, Approaches or indeed communicate about Current and Future Fears or Threats; for where Cyber / Data Security & Third Sector Organisations collide.

JOINT THREAT KNOWLEDGE & INFORMATION SHARING SOCIAL NETWORK

JOINT THREAT KNOWLEDGE & INFORMATION SHARING SOCIAL NETWORK

COMMUNITY SENTINEL

COMMUNITY SENTINEL

Slide background

BEGIN TODAY...

BEGIN TODAY...

in partnership with Bob's Business, an award winning provider of Online Cyber Security Awareness or Phishing Simulation Campaigns, that taught 210,000 end users during 2016 how to Safeguard Data & Protect Business Critical Information. It is a perfect match for expanding Charities, Social Enterprises and Not-for-Profits own Personnel Cyber Security Awareness, in an affordable manner.

in partnership with Bob's Business, an award winning provider of Online Cyber Security Awareness or Phishing Simulation Campaigns, that taught 210,000 end users during 2016 how to Safeguard Data & Protect Business Critical Information. It is a perfect match for expanding Charities, Social Enterprises and Not-for-Profits own Personnel Cyber Security Awareness, in an affordable manner.

JOINT THREAT PERSONNEL AWARENESS TRAINING

JOINT THREAT PERSONNEL AWARENESS TRAINING

E-LEARN SENTINEL

E-LEARN SENTINEL

Slide background

DON'T ACCEPT THE RISK OF BEING STUNG!

3 REASONS TO CHOOSE IS KNOW HOW

Engage & Learn

Super Simple and Straightforward, Third Sector access to relevant Cyber Security information and guidance. 

Engage with IS Know How and Learn Image

There will always be more to learn, we all now have a duty to engage regarding Cyber Security and ISKH will provide you with that opportunity and more.

Subscribe & Mitigate

A Custom-Built Platform specifically for the Third Sector, offering Affordable Recurring Monthly Subscription Plans.

Subscribe to IS Know How Managed Cyber Security Services & Mitigate Your Threats and Risks

We Monitor, Manage, Reduce and Mitigate your Threat & Risk Footprint, allowing you to concentrate on what you do best within our communities up and down the country.

Remain Engaged

Remain Engaged with IS Know How and the Cyber Security subject matter, as the Threats never go on Holiday.

Remain Engaged with IS Know How by Accepting that it

Enjoy the knowledge, that you are now putting the Security of your Organisation and that of your Stakeholders Data First, ultimately maintaining Reputation.

MITIGATING YOUR 'THIRD SECTOR CYBER SECURITY' REPUTATIONAL RISKS!

GDPR IS LOOMING, ARE YOU PREPARED?

It cannot be made any clearer, if your Third Sector organisation is required to be compliant by the deadline of 25th May 2018; then your organisations could face a "Dissuasive" fine of up to €20m or 4% global turnover (whichever is higher) for failing GDPR compliance.

Protect Your Data Image

If you are ready to begin your EU GDPR Compliance process, see 'How we can assist your Charity or Social Enterprise' with your obligations.

CYBER SECURITY FOR CHARITIES STATISTICS

Would Not Know If A Data Breach Occurred Within Their Organisation

Are Aware Of The Gravity & Reputation Damage Risk From Experiencing A Data Breach

Don't Foresee A Risk, As Opposed To Large Businesses They See Suffering Data Breaches

DATA PROTECTION - BACK FROM THE BREACH

You could be forgiven for quite possibly, not being able to think beyond any possible Data Breach that may occur in your Third Sector Organisation and it is also widely accepted now as "If and Not When". So can you learn from previously affected organisation's - ISKH resoundingly believes so, which you can do from the following Information Commissioner's Office (ICO) Video.

"Orbit Social Housing reflects on how a data breach, and subsequent ICO enforcement action, prompted them to improve how they handle and process personal data."

The ISKH Blog

Subscribe to the IS Know How 'NewsWire' Newsletter.

ISKHIcon100x100Instantly begin your Third Sector Data & Cyber Security Mitigation Journey Today!ISKHIcon100x100

We DO NOT Sell your data! Nor will we share your data, unless strictly stipulated via any specific ISKH Service, or that of our Preferred 3rd Party Partners. You can Unsubscribe at anytime. Please select the Region that your Organisation is situated at?

Receive Format?

Third Sector Organisation Personnel?

captcha