Here at Central, we have over 30 years’ experience within the tech industry. We’re passionate about IT and doing a great job for our customers, and we pride ourselves on being a trusted partner that organisations know they can rely on – no matter the time of day, or level of support required.
Our mission is to put IT at the heart of business – ensuring only the right strategic solutions are implemented. And this is something we achieve by working with our network of best-in-class partners.
That’s why, in our new blog series, we’re shining a spotlight on the innovative companies we work with – exploring what they do, how they work with Central, and their top tips and advice.
First up, it’s Harman Singh, Director from Cyphere.
Tell us a bit about your organisation:
Cyphere are a specialist cyber security services provider based out of Greater Manchester and serving globally. Providing technical security assessments and managed security services, we understand, analyse and help solve customer business problems. Working on ‘both sides of the fence’, our expertise includes both offensive and defensive security.
And if you had to sum up your expertise in three words, what would they be?
Cyber security, laughs, and drinks (sometimes!).
Describe your relationship with Central?
Central are trusted partners of Cyphere, who support us in serving customers across multiple sectors — throughout the UK. Central’s team and Cyphere’s cyber skill set are a great market fit for our customers, something which is evidenced by positive client feedback.
And how long have you worked together?
What is penetration testing and why is it important for organisations?
Penetration testing involves running simulation exercises to perform in-depth checks against the security controls in place within an organisation. This exercise could be targeted at web apps, networks, APIs, mobile apps or devices.
A black box pen test is carried out with zero information from the customer, and therefore replicates more closely the approach that a malicious attacker might take in gaining access to a system.
A white box pen test, on the other hand, is an exercise carried out with prior network and systems information from the customer. While a different approach, this method ensures the specific depth of assessment required and can provide a more targeted method of evaluation through which we can meet a business’s specific objectives.
Put simply, we safely mimic actual hackers in order to show our customers where their information is at risk. These tests are followed by guidance which informs businesses of ways to secure their assets.
Share a top tip on how companies can protect their data from a breach:
Brought together, people, processes, and tech can help improve cyber security maturity in any organisation.
In our view, it is not ok to blame people for clicking links. Instead, encouraging staff to utilise any resources available to them to help bolster knowledge around cybersecurity, while underlining its importance via internal culture and processes, is vital. With these steps in place, using tech to add another layer of defensive controls will help bring everything together. Without using all three in tandem, it’s impossible to thoroughly safeguard an organisation.
Describe what it’s like working with Central in one sentence:
What are the biggest cyber security threats facing businesses over the next 12 months
Ensuring basic hygiene on an ongoing basis, supply chain concerns, and gaps during the transition to cloud — or in the cloud — are the main issues arising from digital transformations happening across the globe.
It's critical that organisations know their ‘unknowns’ early, then analyse and act on them in line with a proactive approach to cyber security. Taking shortcuts in cyber security can prove expensive, or worse still you could find that the damage caused by such a move is already too late to act upon.
What is a common mistake organisations make when it comes to cyber security?
Assuming products are already in place, and that they are adequate, or living under the ‘we’re too small to be attacked’ assumption.
And how has the cyber security landscape evolved over the years?
Cybersecurity has come a long way in the last few years. Earlier in the last decade, ransomware was a relatively unknown concept, and now it is one of the most common types of malware.
Additionally, due to technological advances around mobile, web and cloud, the number of data breaches has increased significantly, as has the cost of such incidences. Cybersecurity experts are constantly working to stay ahead of the latest threats, and businesses are increasingly aware of the importance of protecting their data.
Finally, what are your hopes for the future of the IT sector?
The IT sector has grown exponentially in recent years, and it appears this trend will continue. The sector is expected to benefit from continued growth in the global economy, rising consumer demand, and advances in technology. In addition, the sector is becoming increasingly important in terms of job creation and economic development.
Central Networks are a strategic technology partner. Excellent technology is a given, customer service, trust and long-term relationships are what drive our business. We support CEOs, Heads of IT, IT technicians and transformation directors to ensure technology provides an edge to their organisations.