Our review includes looking at businesses, processes and controls, operations, technology, business strategy, internal communications, risk management, staffing, training, insurance cover and regulatory compliance.

Find out more

We will also provide guidance on proactive steps to be taken to minimise the risk and impact of your business suffering a potential cyber attack, including:

Business Continuity – examining disaster recovery systems, identifying what has been hacked, responses of your suppliers and contractors

Business Critical Contracts – assessing what your key contracts say about data, security measures and cybersecurity and warranties

Your Key Assets – reviewing assets and information critical to your business which if compromised could severely damage your business, such as intellectual property and regulated data

Data Protection and Privacy requirements – obliging suppliers to implement appropriate technological and organisational security measures against unauthorised or unlawful processing of data (such as by hackers)

Incident Response and Recovery Strategy – working with you to formulate a clear process and systems for dealing with cyber and data attacks, ensuring everyone in your team knows their responsibilities and the process to follow if an attack takes place

Liability – anticipating and mitigating liabilities such as data damage or loss, privacy infringements, denial of service and lost income.

Remedies – identifying liquidated damages which could be payable for the duration systems are down

Insurance – advising on appropriate options for insurance cover

Replacement systems – identifying replacement, mirror or alternative platforms so that it can continue to operate should there be a future cyber attack.

Staff training – maintaining crisis plans long after we’ve completed the Audit.

View less

Our review includes looking at businesses, processes and controls, operations, technology, business strategy, internal communications, risk management, staffing, training, insurance cover and regulatory compliance.

Find out more

We will also provide guidance on proactive steps to be taken to minimise the risk and impact of your business suffering a potential cyber attack, including:

Business Continuity – examining disaster recovery systems, identifying what has been hacked, responses of your suppliers and contractors

Business Critical Contracts – assessing what your key contracts say about data, security measures and cybersecurity and warranties

Your Key Assets – reviewing assets and information critical to your business which if compromised could severely damage your business, such as intellectual property and regulated data

Data Protection and Privacy requirements – obliging suppliers to implement appropriate technological and organisational security measures against unauthorised or unlawful processing of data (such as by hackers)

Incident Response and Recovery Strategy – working with you to formulate a clear process and systems for dealing with cyber and data attacks, ensuring everyone in your team knows their responsibilities and the process to follow if an attack takes place

Liability – anticipating and mitigating liabilities such as data damage or loss, privacy infringements, denial of service and lost income.

Remedies – identifying liquidated damages which could be payable for the duration systems are down

Insurance – advising on appropriate options for insurance cover

Replacement systems – identifying replacement, mirror or alternative platforms so that it can continue to operate should there be a future cyber attack.

Staff training – maintaining crisis plans long after we’ve completed the Audit.

View less

Case Study

Private: A property CEO gets back on track after a series of phishing attacks using our Cyber Security Audit

The CEO of a growing property business with a turnover of approximately £15-20m contacted Hamlins’ Cyber Security team as the company had been subjected to a growing number of phishing attacks within a spate of 3 months. It was estimated …

View more

Case Study

Private: A high street retailer get back to business quickly after a cyber attack

The Challenge A national retailer contacted Hamlins following a cyber-attack on the company’s website and internal IT system, reducing its ability to sell products and to maintain relationships with suppliers. The “spear phishing attack” was restricting almost every employee within …

View more

Case Study

Private: An interactive entertainment company stay on top of their game for EU Data Protection Regulations

A leading games and interactive entertainment company needed advice on the use of their data globally. They wanted to be prepared for the new EU Data protection Regulations to ensure that their company was compliant, so approached Hamlins for advice.   What did …

View more

Case Study

Private: A video games company return to ‘business as usual’ after being hacked

A video games company’s IT Systems and customer databases were hacked. They approached us because they needed advice on what steps to take next on how to resolve the situation and how to prevent it happening in future. What did we …

View more

INSIGHTS

Key contacts