Cyber Security Consultancy

We provide businesses cyber security consultancy solutions tailored to suit your needs. To get a quote based on per hour session please use the link below.

Contact Us

Managed Security Services

Next generation managed security services (MSSP) solutions available to scale for any business. Our (FCS-CSM) provides an all in one solution.

Read More

Dedicated Hosting Solutions

Custom Dedicated servers made to your Specifications whether its for your business online presence or to host your custom aplications.

Read More

Frontline Sales Team

For Frontline Cyber Security Ltd custom solutions please contact our sales team for pricing guides using the contact button below.

Contact Us

The 5 important steps to prepare for the new EU GDPR Legislation.

The General Data Protection Regulation (GDPR) takes effect in May 2018 across the European Union. The law governs how to handle the personal data of EU citizens and levies substantial penalties to organizations that fail to comply. It also applies to all companies regardless of where their headquarters are that control and process personally identifiable information about EU citizens. To ensure compliance, organizations must implement the necessary security technology, policies and procedures.

The headline items for organisations that collect or process EU citizen records are:

Below we will go thorough some methods of Social Engineering used in our tests

  • They must notify their supervisory authority of a data breach within 72 hours.
  • The subject will have the right to retract consent, request data erasure or portability.
  • They may face fines of up to 4% of their worldwide turnover, or €20 million for intentional or negligent violations.

Step 1 - Identity:

The first task is to identify whether they are considered a data controller or processor. They must then review the obligations these carry (such as issuing notices and obtaining consent) and regularly review existing and new processes around PII. They can then discover where this data resides –atrest, in-motion and/or in-use – have a record of processing activities and understand how this data is protected.

Step 2 Protect:

Once PII has been identified it must then be protected. Encryption and access control are common control standards, but managing encrypted data across multiple business processes is a hugely difficult task. Data sovereignty and lifecycle are key, alongside data flows to third parties, monitoring for data leakage from negligent or malicious employees and external data theft

Step 3 Detect:

If an organisation suffers data loss then it is vital to detect the breach and identify if PII records were lost or stolen. If so, the business must notify the authorities within 72 hours of the discovery to initiate a full investigation. The investigation will focus on identifying the source and destination of the breach through information from Data Leakage Prevention (DLP) and Data Theft Prevention (DTP) tools. Data forensics will help to pinpoint the stolen data, so the business can issue notice to any affected data subjects.

Step 4 Response:

Incident response is critical to protecting citizen data. In addition to the mandatory data breach notification requirement, organisations must also ensure they have implemented and tested an incident response plan.

Step 5 Recovery:

In the aftermath of a data breach, businesses must ensure they maintain ongoing communication with the relevant authorities. This ensures loss factors are managed and keep affected data subjects regularly informed.

How can Fronltine Cyber Security Ltd Help You, Contact Us Now.



Contact Us

Frontline Cyber Security LTD Helping Keep The Web Safe! Call Us Today 01636 857310