Cyber Security

How secure is your network? Have you ever had an external vulnerability assessment done on your network?

All organisations face increasing security risks, many with limited resource and experience to protect themselves. Our expert team of engineers can assess your network infrastructure and help you build a robust security environment suited to you. We can help you meet compliance for a wide range of regulatory and security standards.

Cyber Security testing helps organisations identifying what vulnerabilities exist, understand what the impact could be if they were compromised and take steps to protect important assets.

New cyber security threats arise every day and proactive protection is essential to stay ahead of the game. Using industry leading security solutions, combined with the 5 controls of Cyber Essentials you can rest assured you will be more secure. 

Infrastructure Testing

Red Circles penetration testing and cyber security assessment services have been designed to test and uncover even the smallest gaps in your security, so they can be fixed before they can be exploited. Our experienced testers can mimic techniques and processes used by cyber criminals without causing any damage to your systems.

Using vulnerability assessments and audits, we’ll help you develop your defense and reduce your susceptibility to attack.

Security Solutions

With extensive experience in all IT security mechanisms Red Circles can implement a secure infrastructure to try and combat the most common forms of Cyber Crime such as, phishing attacks, malware, ransomware and network attacks.

We can deploy multiple levels of security to mitigate potential attacks. Border security from Cisco, Meraki or Sonicwall, email security & anti-malware from Panda Security, being backed up by products from Datto or StorageCraft.

Cyber Essentials Scheme

Cyber Essentials

An independently verified self-assessment. Organisations assess themselves against five basic security controls and a qualified assessor verifies the information provided.

The five basic controls within Cyber Essentials were chosen because, when properly implemented, they will help to protect against unskilled internet-based attackers using commodity capabilities – which are freely available on the internet. The five controls are:

  • Boundary firewalls and internet gateways
  • Secure configuration
  • Access control
  • Malware protection
  • Patch management

Cyber Essentials PLUS

Cyber Essentials Plus is the next level of certification from IASME.

You will need to complete your Cyber Essentials PLUS audit within 3 months of your last Cyber Essentials basic certification. Alternatively, you can complete the online assessment as part of the Cyber Essentials PLUS certification.


This higher level of assurance involves completing the online assessment followed by a technical audit of the systems that are in-scope for Cyber Essentials. This includes a representative set of user devices, all internet gateways and all servers with services accessible to unauthenticated internet users. Your assessor will test a suitable random sample of these systems.


Cyber Essentials Scheme

IASME Governance

Audited IASME Governance (sometimes known as IASME Gold) is an independent on-site audit of the level of information security provided by your organisation. It offers a similar level of assurance to the internationally recognised ISO 27001 standard but is simpler and often cheaper for small and medium-sized organisation to implement.

The standard includes all of the five Cyber Essentials technical topics and adds additional topics that mostly relate to people and processes, for example:

  • Risk assessment and management
  • Training and managing people
  • Change management
  • Monitoring
  • Backup
  • Incident response and business continuity

By gaining the Audited IASME Governance certificate your organisation is achieving IASME’s highest level of certification and providing assurance to customers and suppliers that your organisation’s security has been audited by a skilled, independent third-party.