Since May 2018, essential services providers have been subject to the Network and Information Systems Regulations 2018, also known as the NIS Regulations. The legislation affects two groups of companies:
• Operators of Essential Services (OES), such as energy, water, healthcare and transport.
• Relevant Digital Service Providers (RDSP), such as online marketplaces, cloud service providers and search engines.
There are 14 key principles for NIS compliance, split across four objectives. Your business must be able to manage security risk, protect against cyberattack, successfully detect cyber security events and minimise the impact of any cyber security incident.
Every UK Operator of Essential Services (OES) or Relevant Digital Service Provider (RDSP) must demonstrate NIS compliance.
To meet legal obligations
Every OES or RDSP must pass a regular NIS audit, overseen by a Competent Authority (CA). If your business experiences a breach as a result of an NIS compliance failure, you may be fined up to £17 million.
To raise security standards
The NIS Regulations provides an opportunity to assess and upgrade your cyber security provisions. By implementing the Indicators of Good Practice (IGPs), your systems will meet industry best practice standards.
To better protect customers
Strengthening defences against breach will prevent sensitive data from being lost or stolen – and key national infrastructure being taken offline. A reliable, secure service is crucial to building a loyal customer base.
To increase business resilience
The NIS Regulations takes a holistic approach to IT security, assessing resilience of service as well as defences against cyberattack. Meeting the NIS objectives will help you build systems capable of delivering services during and after an IT security event.
Audit preparation assessment
With our in-depth knowledge of the NIS Regulations and its requirements, our consultants can conduct a pre-audit assessment. This will help you identify areas that require improvement before an official audit is performed.
We will perform extensive penetration tests to help you understand the effectiveness of current security systems. Using the same tools and techniques as cybercriminals, we can accurately emulate a cyber security event – and your preparedness to deal with it.
Incident response planning
Cyber security events are inevitable for every OES and RDSP – but do you have an NIS-compliant plan for dealing with them? Our consultants will review your incident response plans and identify potential improvements.
More than simply providing a list of required improvements, Fidus consultants are on hand to implement them too. Working alongside your IT security team, we can ensure you have the right measures in place to pass your next NIS Regulations assessment.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
Introduction Quiplash – a game full of wit, banter and borderline acceptable humour… and security consultants on a lunch break. To set the scene, the date was 19th February 2020 and the mood was cheerful in the Fidus office. Lunch had just been delivered and today was the day that Mario Kart was not going […]
The many complexities around remote working have long been used as an excuse for limiting its roll-out. But with recent announcements that everyone should try to self-isolate, businesses are now being forced to change their stance. The good news is that the technical barriers to home working have been steadily lowering. In fact, most of […]