Jisc Cyber Security Packages 2022
Free Phishing Simulations, User Awareness,
Vulnerability Scans and Classroom Led Training
Understand Your Risk To Phishing Attacks and Unpatched Security Vulnerabilities
Raise Awareness Of The Importance of Cyber Security
PROMOTIONS Valid until 7th December 2022
Continually Reduce Your Risk and Exposure To Common Cyber Threats
Jisc’s Cyber Impact report examines the impact of cyber security incidents and breaches across the sector. It highlights that ransomware has severely impacted institutions over the last couple of years and is often the result of phishing attacks and/or exploited vulnerable unpatched systems.
New low-cost cyber security packages and promotions now available, as part of the Jisc Frameworks, that help assess your security posture by identifying risks associated with phishing attacks and unpatched security vulnerabilities.
Success Stories Across the Sector
We have many HE and FE customers who have used our cyber security services, purchased using the Jisc Frameworks thereby saving time and cost by not having to conduct procurement exercises themselves. Read some of these success stories:
“Educate your users for effective protection against phishing attacks” – Case Study at Guildford College.
“Phishing attacks – How to reduce your exposure” – Case Study at Leeds University.
“How to minimise your cyber attack exposure” – Case Study at Coleg Cambria
“Running simulated phishing attacks as part of a security awareness campaign, is a highly effective way to alert users to the variety of different tactics employed by malicious actors attempting to gain access to your data and/or credentials via phishing”. Jack Field, Cyber Security Team Lead Read more
Cyber Security Service Add-ons
Secure The Data Centre Initiative: Gain an affordable SOC service for 24x7x375 Cyber Threat Protection and Prevention – Read more.
Ransomware Response Security Playbooks: Automation and response packages with investigation and remediation capabilities.
Security Control Validation: Measure how effective your security tools are and if they are actually protecting you.
Network / Cloud Visibility: What apps in use, are they a threat, have you been compromised.
Cloud Audit: Analyse your public cloud infrastructure, looking at posture and workloads.
SaaS Audit: Classify data, sharing/permission visibility, threat detection within the apps.
Penetration Testing: Check your systems for exploitable vulnerabilities and weaknesses.
For any specific requirements, please let us know using the form below.
PROMO 1: Assess & Reduce Risk
Assess your security posture – Identify & validate improvements + staff training
- 2 * Customised Phishing Simulations
- 2 * Risk Prevention Reports
- 2 * External Vulnerability Assessment Scans
Promotion: FREE Services
- 2 * Training Services: Awareness portal, materials, videos, quizzes and report.
- 2* Post Simulation consultation with our experts: Review Report, Findings / Comparisons and Recommendations.
- 2 * External Vulnerability Assessment Scans.
- 1 * Cyber Security 101 Classroom Instructor-led Training (virtual – no attendee limits).
PROMO 2: Continually Assess & Train
PROMO 1 + Continual Phishing Attack Awareness and Protection
- 4 * Customised Phishing Simulations
- 4 * Risk Prevention Reports
- 4 * External Vulnerability Assessment Scans
Promotion: FREE Services
- 4 * Training Services: Awareness portal, materials, videos, quizzes and report.
- 4* Post Simulation consultation with our experts: Review Report, Findings / Comparisons and Recommendations.
- 4 * External Vulnerability Assessment Scans.
- 2 * Cyber Security 101 Classroom Instructor-led Training (virtual – no attendee limits).
Secure The Data Centre Initiative
Gain an affordable SOC service for ‘around the clock’ Cyber Threat Protection and Prevention
Working in partnership with our strategic customers, understanding their challenges and requirements for 24x7x365 cyber threat monitoring, response and protection, we have launched our “Secure The Data” initiative designed for organisations regardless of size. It helps customers implement a quick and affordable SOC service that secures their data centre mission critical systems that can then be expanded based upon their requirements and priorities. Request your SOC cost proposal now!
Threats On The Continual Rise
Cyber criminals are constantly seeking weaknesses across all organisations. The most common cyber threats that our HE and FE sector customers are experiencing are those related to:
- Huge rise in sophisticated phishing attacks compromising users and devices.
- Vulnerable ‘unpatched’ systems still constantly being exploited.
- Cyber security postures being neglected due to other priorities and how we now work.
- The hybrid workforce creating both relaxed awareness and appreciation for cyber security
Working with our customers in helping them address these threats and the challenges, we have launched new cost-effective cyber security packages as part of Jisc’s cyber security frameworks for the education sector, helping them avoid the huge cost of an education sector data breach.
Simple Steps To Protect Your Institution
The packages designed for the education sector, address these key cyber security concerns by identifying:
- The organisations overall risk to phishing attacks due to lack of user awareness: opens, clicks and compromises
- Poorly or misconfigured infrastructures: user devices, email configurations, infrastructure and perimeter security
- Vulnerabilities across infrastructures and servers, and how to fix them.
- User awareness training needs – both short and long term.
We provide a consultative approach, with detailed prevention reports, that help institutions understand what the risks mean to them and how they can minimise their exposure to attacks. Jisc’s 16 Step Guide details the questions you need to ask to assess your cyber security posture – let us help you strengthen it!
Free Cyber Security Services, Awareness and Classroom led Training Days - Please complete the form and our team will send you a cost proposal. The promotion is based upon a purchase order/invoice before 7th December 2022.
UK: +44(0)345 272 0900
SA: +27 (041) 393 7608
I agree to receive communication on newsletters, promotional content, offers and events. Your information is confidential, KHIPU never sells or shares contact information.
Gerrard Shaw, Network Support Officer
"We decided to work with KHIPU Networks via the Jisc framework, as their simulated phishing and awareness offering was exactly what we needed and within our budget. We strongly recommend FE institutions explore the Jisc framework for this service, as we feel social awareness is vital for the on-going prevention of attacks”
Dave Neild, Cyber Security Architect
University of Leeds
“The strongest and weakest layer of defence against phishing attacks are your users. It’s vital to understand your organisations risk to these cyber-attacks and be able to provide the necessary awareness training and tools to limit your exposure. Using the Jisc framework for simulated phishing and awareness training, provided by KHIPU Networks, we have been able to test our security posture and identify key areas to help protect the University from future attacks.”
Mark Tysom, Cyber Security Product Manager
“We work hard to ensure that our members have access to high quality, cost-effective solution providers. We have worked with KHIPU for some years and this is the second time it has earned our ‘top-ranked supplier’ accolade.”
Mark McKay, Head of ICT
Guildford College Group (Activate Learning)
“Using the simulated phishing services, provided by KHIPU Networks, gave us the ability to be one step ahead of attacks and offer an education on good practices to our users which they can use anywhere in life”
Rob Spalding, Head of Infrastructure
Anglia Ruskin University
“Using Jisc’s vulnerability assessment service enables the University to have a pro-active approach to cyber security. By having an automated solution that not only identifies vulnerabilities before they can be exploited, it reports on which systems will be affected and what actions need to be undertaken to protect them. This automated approach is vital in the defense against cyber-attacks including the recent ransomware which made headline news. The service, provided by KHIPU Networks via the Jisc VAS framework, has been an immediate success for the University, with a quick return on investment.”
Chris Adcock, Chief Finance Officer
Duchy of Lancaster
“KHIPU are competent cyber security trainers, who kept the audience attentive and interested. The content was pitched at a relevant level and had more than enough ‘food for thought’. The feedback that I had from the attendees was very positive and all felt the course worthwhile. As an employer, I also feel that this education will really help reduce the risk of an employee inadvertently compromising our network and they can no longer say that no-one told us. Very highly recommended.”
Lisa Quinn, Training & User Comms Manager
Trinity College Dublin
Trinity College Dublin, like most institutions, regularly experience phishing attacks via email therefore we have to find ways to protect our users and the University from being compromised. KHIPU, as an already trusted supplier, was selected to provide us with phishing awareness campaigns that included simulated phishing and follow up online education for our staff community. So far, we have found this approach has helped us highlight the dangers of Phishing which, in turn, enables us to educate our users and help protect against phishing attacks.”
Boeta Pretorius, Chief Director of IT
“Our organisation like many others, is constantly dealing with cyber threats and attacks. When you have such a large number and diverse range of users, it's likely that an attack such as phishing will be successful, causing major problems such as crippled networks, confidential data leakage and damage to reputation. Whilst you have to invest into the right technologies and solutions to protect against these attacks, it's not always possible due to budget constraints. Even with heavy solution investments, its still the users who are the last point of defence against any attack.”
Proven and Simple to Procure
With over 100 happy customers plus endorsements from Jisc, these services are proven within FE and HE institutions, and are available by procuring through the following Jisc direct award frameworks thereby saving time and cost by not having to conduct procurement exercises themselves:
The packages are purchased directly from KHIPU and we fulfil the procurement via the applicable Jisc Framework category. For further information on the frameworks, please contact the KHIPU team or your Jisc Relationship Manager using the “Find your Relationship Manager” tool.
Join Our 15-min Webinars – All attendees get a FREE vulnerability scan
Please join our 15-minute webinars where we’ll present our cyber security services, promotions and customer success stories. These are hosted every Tuesday at 11:30 and Thursday at 14:30.
Can’t make the date? Not a problem, we will run one specifically for you – just register your details above.
A Network with Zero Vulnerabilities?
The enhanced packages are based upon our zero vulnerability infrastructure offering that help organisations identify their main risks and vulnerabilities to cyber attacks, so that recommendations can be made and implemented. The packages are built upon our very successful cyber security risk assessment services:
USERS Simulated Phishing Campaigns and User Training services
INFRASTRUCTURE Vulnerability Assessments: Internal and External scans
NETWORK TRAFFIC Cloud, Network, User and Application/Threat Visibility Assessments
All findings with best practise recommendations will be presented and discussed in detail with our cyber security experts and you, as part of a strategic alignment with your organisation.
Address The Sectors Top Cyber Threats
Analysing the results from recent education sector customer surveys to understand what the top cyber threats are, we launched a dedicated portal explaining how to solve these with solutions that are available via the Jisc Frameworks. The top concerns include:
- Phishing, Ransomware – Malware
- Shortage of Staff
- Securing Public & Private Clouds
- Government Guideline Compliance
- Remote Working
- Managing Cyber Security including Firewalls and SOC’s
Visit our “Addressing Top Cyber Threat Concerns” Portal to learn more.