Book a demo form

Book a demo

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Book a demo

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request SmartCheck for Ransomware Demo

SmartCheck for Ransomware Demo

SmartCheck Demo LP

SmartCheck Demo LP 2

MITRE ATT@CK Webinar - Jun 2022

you must read and acknowledge our privacy policy

July 2022 Landing Page (Brochure Download)

  • This field is for validation purposes and should be left unchanged.

July 2022 Landing Page (Director)

  • This field is for validation purposes and should be left unchanged.

Insurance - 25 Minute Q&A

  • This field is for validation purposes and should be left unchanged.

Insurance - Checklist Download

  • This field is for validation purposes and should be left unchanged.

12 Safeguards aligned with UK NCSC & US NIST guidance

For Prevention, Containment and Recovery


No single cyber security control can protect against every situation. The concept of defence-in-depth anticipates multiple independent security controls operating in concert to protect you across the attack sequence. Ransomware readiness or resistance is best achieved when the effectiveness of these security controls is maintained across each of the prevention, containment and recovery phases.

Accurate, reliable and quick measurement to maintain the effectiveness of the 12 Safeguards ensures the risk of a successful ransomware attack is kept to a minimum. Beyond your annual audit, SmartCheck for Ransomware can be used on-demand to quickly provide comprehensive ransomware readiness reports as and when required.


  • Prevention
  • Containment
  • Recovery

Application control

Only approved software should run on a computer system.  This safeguard supports securing your systems by limiting what can run on devices across your organisation.

Patch Applications

Applications must be regularly patched or updated to prevent intruders exploiting known vulnerabilities. This safeguard supports the identification of vulnerabilities and the application of relevant patches in a timely manner.

Configure Microsoft Office Macros

Macro and document settings need correct configuration. This safeguard checks macros and settings to protect against malicious code.

User Application Hardening

Effective security policies limit user access to active content and web code. This safeguard supports the implementation of application and browser controls.

Staff awareness

Building an ongoing understanding by staff about cyber security threats, and mitigation strategies that minimise cyber-attacks, is vital.  This safeguard is a checkpoint for ongoing staff awareness.


Appropriately configured and regularly updated, perimeters/firewalls can limit access to, and use of, certain computer systems.  This safeguard defends your network against unauthorised traffic.

Patch Operating System

Fully patched operating systems are vital across every endpoint.  This safeguard reduces the likelihood of malware or ransomware spreading across the network.

Restrict admin privileges

Best-practice limits admin privileges, by allowing only those staff needing system access to do so, for specified purposes. This safeguard limits the number of users who can make significant changes to your systems.

Multi-factor authentication

Requires multiple independent credentials to verify a user before they gain system access.  This safeguard supports the management of user access (including remote users) to high sensitivity accounts and systems.

Endpoint Protection

Anti-virus software is a vital part of any cyber security strategy.  This safeguard supports the coverage of anti-virus software across every device within your organisation.

Regular backups

Securing data and system backups off-site, and testing recovery processes is crucial. This safeguard ensures important data, systems information and configurations are backed up and retained in a secure manner.

Incident response

Validating that incident management plans exist and are tested.  This safeguard supports planning for a worst-case scenario and the use of your incident management playbook.

Want to see SmartCheck for Ransomware in action?