Skip to content

Salus Cyber

Second
line of defence

Cyber Awareness

Enlighten your people

Minimise the risk of human hacking

Attacks that exploit human error, rather than technical hacking, can only be avoided through education.

Threat actors rely on the uninformed, so they can manipulate people into exposing data, sharing malware or unwittingly providing access where it should be restricted - often targeting individuals outside of their work environment.

We work with customers to increase cyber awareness beyond the walls of their information security teams, so that everyone understands the value of their personal data and corporate access.

Cyber Aware

Phishing

65% of threat groups used spear phishing as the primary infection vector (Symantec). At Salus Cyber we have a custom, internally developed phishing management and deployment platform for performing bespoke phishing tests.

Awareness Training

An organisations people are often still the weakest link in the security chain. Through tried and tested approaches, we improve employee awareness to help them identify possible malicious activity and push culture change to make people more security-centric.

Social Engineering

62% of businesses experienced social engineering attacks in 2019 (Cybint Solutions). As part of educating your employees, and helping identify gaps in defences, we target your organisation through common and unique social engineering attacks.

More Second line of defence services

Active Directory & IAM

Learn more

OC, ICS & SCADA

Learn more

Lost/Stolen Devices

Learn more

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.
    Simple.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back