Logo

Select below the area you are interested in

NCSC logo for an approved Cyber Essentials Service Provider, Cyber Essentials Cyber advisor logo and IASME Cyber assurance Logo

Why Adapt-IT?

Adapt-IT are cyber Security and digital safeguarding specialists. The Adapt-IT experts have applied security solutions to industry and government systems for over 24 years – starting when Cyber wasn’t even a buzz word and digital safeguarding didn’t really exist. 

Having worked in industry providing security for corporate and government systems we are well placed to advise on appropriately scaled solutions to protect vulnerable people whether as a full IT system for a carehome through to a vulnerable child/adult who needs digital independence in a safe way.

What is Digital Safeguarding and Why is it Important?

 

Digital safeguarding is related to putting in place controls that protect a user or equipment being used against the dangers of the connected world. When using the internet there are many things that need to be considered. From protecting the user against information theft or online exploitation. We all need to protect ourselves against the internet and this becomes even more challenging when dealing with vulnerable people.

Everything we use is connected to a network of some form and this will inevitably lead to the internet. The internet can provide so many benefits to us, but with everything you need to ensure the access is appropriate. When thinking about safeguarding there are three elements we need to consider to protect ourselves or a vulnerable person.

    • Content Risk: Protecting people against information or imagery that could cause harm.
    • Conduct Risk: Protecting people when in a interactive situation digitally. This is also not about protecting the user but also people who may be interacting with the user. This covers areas such as bullying, sexting, harassing, being aggressive or stalking; or promoting harmful behaviour such as self harm, suicide, pro-anorexia, bulimia, illegal drug use or imitating dangerous behaviour. A persons behaviour or conduct can can also make them vulnerable – for example, by oversharing their personal information or by harassing or bullying themselves.
    • Contact Risk: Protecting against being victims of interactive situations. This includes being bullied, harassed or stalked, meeting strangers; threats to privacy, identity and reputation (for example, through embarrassing photos shared without permission, a house location being identified, someone impersonating a user, users sharing information with strangers); and violence, threats and abuse directly aimed at individual users and/or groups of users.
Young girl on her phone wearing a black hoodie

 ‘The User Will Find A Way’

 

The simplest answer is not always the right answer. Blocking everything and locking away all access can have a bigger impact than allowing access such as driving frustration, stress, stopping people getting access to capabilities that could help them maintain independence.

In the cyber industry we use the term defence in depth, where no one approach is used and relied upon and their are multiple layers that protect against the failure of one. 

Digital safeguarding has to be managed in the same way, regardless of if you are a carehome servicing multiple vulnerable adult users or a parent safeguarding your child.

Getting any aspect of the controls wrong, or ignoring the issues and trying to block access completely the user needing the protection will find a way. The internet gives a person all the tools they need to get past most standard parental systems.

How to Protect the User and Equipment.

 

The first thing to do is consider the risk and what you are trying to protect or protect against. Then to consider how you can protect against each risk identified.

  • Accessing information or sites the user should not have access to.
  • Enabling IT access for the rest of the family without providing a route to wider access for the person you are trying to safeguard.
  • Limiting screen time or access to specific applications e.g. only allowing access to specific applications at certain times or for certain periods of time.
  • Enabling the use of IT outside of the home but ensuring security or access levels are maintained and cant be bypassed.
  • Promote digital independence and freedom safely.

In reality this is difficult to do and you will need support. This is where Adapt-IT come in. A Specialist Cyber service that provides advice, guidance and full implementation of digital controls to protect your users, family and employees.

Cyber Security for the Care Industry

A young lad in his motorised chair having fun with a carer in a carehome.

Business Enablement: The Cyber Journey and Cycle

Working in the care sector is tough, but protecting your business and data shouldn’t be. Adapt-IT can support your organisation to put in place the ability to protect your organisation from the main threats to your business. We have a unique view of the care industry and with this experience combined with expert cyber knowledge we can support your IT in helping to ensure precious time is spent on providing your care services.

Cyber Essentials and IASME Governance is not about certification or compliance, It is about business enablement. Allowing your teams to work flexibly and in a secure and resilient way. Cyber Security is seen as a bind or something that must be done that comes at a cost. Of course, a balanced and security in depth approach is going to cost both financially and in your teams time. So, it is important this is done efficiently and in a balanced way. However, if done appropriately this cost can be balanced and business efficiency can be gained.

Maintaining Focus on Care

Better Results

By using specialists to carry out the parts of security you want managed, your business will get better results by being able to focus on your core and critical risks.

Achieve the right balance

Our specialists can help you achieve the right security balance for your business. By balancing cost and risk to meet your compliance and regulatory obligations.

Quicker Deployment

Security specialists can reduce time to implementation and risk of delays and unpredictable outcomes. Our teams can either run, or supplement your team with required skills to deliver security on time.

Responsiveness

Gain the ability to improve your business’ ability to respond to any risks or threats that your business faces quickly and efficiently.  Reducing impact to you and your clients. Adapt-IT can be agile and flexible and support you when you need it most.

Ready to Deliver

The Adapt-IT team will be ready to help you protect your business against the growing and ever changing threat.

Young girl in a motorised chair, there is a lady crouched to her left helping her use assistive technology.

The Cyber Journey and Cycle

Cyber Essentials and IASME Governance is not about certification or compliance, it is about business enablement. Allowing your teams to work flexibly and in a secure and resilient way. Cyber Security is seen as a bind or something that must be done that comes at a cost. Of course, a balanced and security in depth approach is going to cost both financially and in your teams time.  So, it is important this is done efficiently and in a balanced way. However, if done appropriately this cost can be balanced and business efficiency can be gained.

Cyber Essentials Logo

Let Adapt-IT help you secure your systems so you can focus on care.

Adapt-IT can help you protect against 80% of the threats to your service users and your business by focussing on 5 simple areas.

Firewalls and Routers
Firewalls and routers A firewall needs to be at the boundary between your networks/devices and the wider internet. All inbound ports should be closed unless there is documented bsuiness need All controls need to be applied to physical and software firewalls
Access Control By using a standrd user account with least privilege. An admin account should not be used for day to day activities, and limited to those who need it. MFA needs to be setup on all cloud services. updated passwords-based authentication requirements
Secure configuration Remove unrequired software and configure built in services. Remove or disable any unused accounts. Set an access pin or password to unlock devices.
Security Updates Dont let software vulnerabilties be the access point for all criminals. Check that your software is still supported by the vendor. Enable your software to automatically update or apply the patches within 14 days.
Malware Protection Anti-malware software needs to be installed and updated on a daily basis. create a list of approved software that is permitted on your mobile devices.
IASME Cyber Assurance Level 2 Logo

So you have Cyber Essentials and now you are ready for the next step in your Cyber Journey.  So whats next?

Important Prerequisites to Certification

 

Cyber security is a continuous journey of growth and education. IASME Cyber Assurance is not the beginning of that journey, nor is it the end. Before proceeding at this level, you will first need to demonstrate that your organisation has got the basics in place. The prerequisite for IASME Cyber Assurance certification is an up to date Cyber Essentials certification or IASME Cyber Baseline for organisations outside of the UK.

IASME is the next step in the Cyber security journey focussing on policy, processes and overall approach to cyber security. Building on the Cyber essentials certificate it focusses on 13 core areas.

  • Planning and information security
  • Organisation
  • Assets
  • Legal and regulatory landscape
  • Assessing and treating risks
  • Physical and environmental
  • People
  • Policy and realisation
  • Managing access
  • Technical intrusion
  • Backup and restore
  • Secure business operations: Monitoring, review and change management
  • Resilience: Business continuity, incident management and disaster recovery

IASME Cyber assurance Level 1 pricing is dependant on the size of the organisation.

IASME Cyber assurance Level 2 can be quoted by Adapt-IT by request.

IASME Cyber assurance Level 1
IASME level 1 Risk based and includes key aspects of cyber security such as: Incident Response Asset Management People Management Physical controls GDPR compliance The first step along the certification pathway for IASME Cyber Assurance.
IASME Level 2 (Audited) Involves and independant audit of your processes, procedures and controls conducted by an IASME certification Body and assessor. A legitimate alternative to other standards THe next step after completing the IASME Cyber Assurance level 1 certification. This si the highest level of certification for IASME.

Adapt-IT Cyber Security. With You Every Step of The Way

Adapt-IT is always striving to ensure our business is protected through best practice. We can support our clients and their customers, to help them. Protect their systems by implementing best practice and appropriately proportional solutions.

As an IASME Certification Body we can help your business on its journey to better protecting itself and your clients through applying common policies processes and techniques to enable your business to exploit wider digital tooling while maintaining Cyber security.  This can allow better data access and exploitation to support the service users and clients to access better care and independence.

 

We understand the care industry and the challenges of the technology used to support people with disabilities and vulnerabilities.

 

Adapt-IT Provides:

young man with infantile cerebral palsy caused by a complicated birth sitting in a multifunctional wheelchair, using a computer with a wireless headset, reaching out to touch the touch screen.
Woman wearing a mustard top, sat in a manual wheelchair sat in front of a desk with a monitor and laptop, she is wearing headphones.

Better Care Results

By using Adapt-IT specialists to carry out the parts of Security you want managed, your business will get better results by being able to focus on care.

Achieve The Right Balance

Our specialists can help you achieve the right security balance for your business. By balancing cost and risk to meet your compliance and regulatory obligations.

Quicker Access to Benefits 

Security specialists can reduce time to implementation and risk of delays and unpredictable outcomes. Our teams can either run, or supplement your team with required skills to deliver security on time.

vector cartoon image of a bustling carehome common area.

Responsiveness

 

Gain the ability to improve your business’ ability to respond to any risks or threats that your business faces quickly and efficiently.  Reducing impact to you and your clients.  Adapt-IT can be agile and flexible and support you when you need it most

Ready to deliver

 

The Adapt-IT team is ready to help you protect your business against the growing and ever changing threat.