FAQs

We answer some of the most common
questions about cyber security

Cyber Essentials
Can we get Cyber Essentials if we aren’t based in the UK?
Yes due to Cyber Essentials being an internationally recognised standard. We have helped many international organisations achieve Cyber Essentials. In many cases, these businesses wanted to increase credibility within the UK market.
How can I check my Cyber Essentials certificate status?
You can quickly and easily find the information through the Cyber Essentials Certificate Search if you’d like to check a Cyber Essentials or Cyber Essentials Plus certification. This useful tool can be found on the IASME website and can tell you your certification numbers, what’s included in scope and the date of certification as for many businesses they'll have two dates, one for Cyber Essentials and another for Cyber Essentials Plus. Better yet, you can use this tool to check on other organisations you may be working with right now or who you’re thinking about working with in the future, this will allow you to determine if the business has solid technical controls in place.
How long does it take to achieve Cyber Essentials certification?
Time frames vary, but with tools like vSOC CERT, most organisations can achieve certification within a very short time, depending on the scope. The main reason for failing to achieve certification are vulnerabilities and the inability to identify and fix them. CERT has a tool to help with this, and ongoing monitoring ensures you stay compliant year-round.
How often does Cyber Essentials need to be renewed?
Cyber Essentials and Cyber Essentials Plus certifications are valid for 12 months. Reassessment is required annually to maintain compliance. If aiming for Plus, need to get this within 3-months of getting Essentials in case the scope changes.
What are the 5 core technical controls within Cyber Essentials?
The five core controls are: Boundary Firewalls & Internet Gateways | Secure Configurations | Access Controls | Malware Protection | Security Updates However, due to the complexity and ever-evolving nature of the threat landscape, not all of the Cyber Essentials requirements fit neatly into these five controls. The reason for this is the scheme's aim being to keep organisations protected against the most common cyber attacks, which can only be achieved if the NCSC and IASME regularly revise the criteria as a defence against emerging threats.
What does the Cyber Essentials Plus audit look like?
The Cyber Essentials Plus audit is an independent verification of the controls to which you will attest to within the Cyber Essentials questionnaire. The auditor will run tests on a sample set of devices for which your end users should be present and should run the tests under the guidance of the assessor. So long as the questionnaire has been answered correctly, your organisation should be able to pass the Cyber Essentials Plus standard.
What are Cyber Advisors?
A Cyber Advisor is a specialist who offers advice and assistance to organisations aiming for the Cyber Essentials certification. They assist organisations in understanding the certification process, evaluating their existing security protocols, and establishing the required safeguards to fulfil the certification criteria. To become a Cyber Advisor, a person needs to meet a strict criteria themselves and pass tests proving their expertise. Plus, they have to work for a company who is accredited as an Assured Service Provider. Due to the rigorous testing, the advisors have thorough knowledge of cyber security best practices and can customise their advice to address the unique needs and challenges of each organisation. Advisors collaborate closely with organisations to pinpoint vulnerabilities, formulate a plan to achieve the certification and work with you throughout the implementation stage to ensure your business is meeting the Cyber Essentials framework. Data Connect are proud to be an Assured Service Provider and have Cyber Advisors on hand to help organisations with the certification process.
Attack Surface Management - vSOC Recon
Can vSOC Recon help with compliance requirements?
Yes. The vSOC Connect Console provides compliance-focused dashboards and reporting for standards like Cyber Essentials, ISO 27001 and PCI DSS. It also highlights high-risk vulnerabilities that could result in compliance failure, helping you address them before audits or assessments.
Does vSOC Recon cover remote or off-network devices?
Absolutely. Our agent-based technology allows continuous monitoring of devices even when they’re off-network. This is essential for hybrid and remote workforces, ensuring that no device falls outside your security perimeter.
How is vSOC Recon different from other vulnerability scanners?
Many tools just report vulnerabilities based on CVSS scores; vSOC Recon also considers exploitability, asset criticality and business impact to prioritise remediation efforts. vSOC Recon combines real-world threat intelligence, SOC analyst support, and strategic guidance to turn results into meaningful actions.
How often should vulnerability scans be run?
Point-in-time scanning (e.g. monthly or quarterly) can leave you exposed between scans. vSOC Recon delivers real-time scanning and reporting, helping you reduce exposure windows and stay ahead of evolving threats.
Cyber Risk Management - vSOC Assure
What is vSOC Assure and how does it help manage cyber risk?
vSOC Assure is our structured cyber risk management service that helps identify, assess, and reduce your organisation’s risk exposure through strategic planning, expert technical support, and actionable insights via the vSOC Connect Console.
Who is vSOC Assure designed for – IT teams or executive leadership?
Both. vSOC Assure bridges the gap between C-Suite and IT, offering executive-level assurance and operational tools to ensure strategic alignment and measurable risk reduction across the organisation.
What frameworks does vSOC Assure use?
vSOC Assure aligns with globally recognised cyber security frameworks such as the CIS Critical Security Controls, providing a structured guide to ensure the right questions are asked and the right risks are identified. We map these frameworks to real-world actions, helping you understand, prioritise, and address cyber risk in a way that’s standards-based, scalable, and tailored to your industry.
How is risk tracked and visualised in the vSOC Connect Console?
The console provides interactive tools such as heatmaps, Gantt charts, maturity matrices, and risk dashboards to help you track and manage your cyber risk. You can allocate tasks, contact support, and see exactly what needs to be done and when. As actions are completed, progress and maturity are reflected visually with a traffic light system while our technical team reviews and adjusts scores to ensure ongoing accuracy and improvement.
What is included in the strategic roadmap provided by vSOC Assure?
Your roadmap includes SMART objectives, prioritised remediation steps, and clearly defined milestones - all mapped to your organisation’s risk profile and reviewed within the vSOC Connect Console.
What kind of support do we get with vSOC Assure?
You gain access to our certified security professionals and subject matter experts, including a dedicated vCISO who acts as a conduit between your board and IT teams - translating technical risks into business language and strategic action. You’ll also receive support from our technical team at Data Connect, who provide clear guidance on when, where, and how to make improvements to your security posture.
How does vSOC Assure compare our risk to industry standards?
We incorporate industry data to show how your cyber maturity stacks up against peers, helping contextualise your risk profile and highlight opportunities for competitive resilience.
Security Awareness Training - vSOC Aware
How is vSOC Aware different from off-the-shelf training platforms?
Unlike generic awareness tools, vSOC Aware is a fully managed service delivered by experienced cyber security professionals. We tailor each programme to your organisation’s risk profile, incorporate real-world simulations, and provide campaign insights that drive measurable behaviour change.
How often should we run security awareness training?
We recommend running training throughout the year, reinforced with regular phishing simulations and updated content. Our team helps you define a sustainable cadence that aligns with your risk profile and organisational culture.
What to expect from basic security training?
A strong security awareness programme needs to address basic security training in the first instance such as password security, GDPR, clean desk policies, oversharing of personal information, information security and computer accessibility.
What types of phishing simulations do you run?
Our simulations reflect real-world attack vectors - including credential harvesting, malicious attachments, QR code scams, and spear phishing. These exercises are designed to mimic modern threats, helping your team identify and report suspicious activity with confidence.
How is training content delivered and kept engaging?
We use a wide range of formats - including videos, quizzes, games, posters, and newsletters - to keep content fresh and accessible. Training is gamified and aligned to current threats to ensure ongoing engagement and long-term knowledge retention.
Can you track who is vulnerable and who needs extra support?
Yes. The vSOC Connect Console provides data on user engagement and performance. You can identify which users are excelling, who needs further training, and where to focus remediation for maximum impact.
What are the outcomes of a cyber attack?
What can happen if your organisation is targeted by a cyber attack? Cyber attacks can result in a wide range of consequences, including: Malware and ransomware infections Data breaches and loss of personal or customer information Supply chain compromises System sabotage or operational disruption Theft of intellectual property or funds Reputational damage and loss of customer trust Training staff to recognise early warning signs helps prevent these outcomes and builds a proactive line of defence.
Penetration Testing
Why choose CREST-accredited penetration testing?
CREST accreditation ensures our testers operate to the highest standards of skill, ethics, and methodology, giving you confidence in the reliability of findings and compliance with audit, regulatory, and supply chain requirements.
How do we maximise the value of a penetration test?
By addressing basic security controls first, you reduce easy wins and allow testers to focus on deeper, more complex vulnerabilities—unlocking the greatest insight and strengthening your overall security posture.
How does penetration testing improve security beyond identifying vulnerabilities?
Our approach goes further than finding flaws. Combined with vSOC Assure, it provides strategic actionable insights, strengthens processes, and guides ongoing improvements across your IT environment.
Can penetration testing cover all areas of our business?
Yes. We assess networks, applications, cloud infrastructure, APIs, physical premises, and staff awareness through red teaming, social engineering, and advanced breach simulations—providing a complete view of your attack surface.
Firewall Management
Can managed firewall services integrate with Managed Detection & Response (MDR)?
Yes. You can optionally add vSOC Alert, our MDR service powered by Google SecOps, directly into your firewall management plan. This delivers deeper threat detection across your network.
How quickly can you respond to a firewall issue or outage?
Our team provides regular monitoring, and average response times for support requests are under 25 minutes via the vSOC Connect Console. We detect problems proactively and respond swiftly to minimise risk and downtime.
What’s the difference between co-managed and fully managed firewall services?
In a co‑managed model, you retain some in-house control over your firewall, while we provide expert oversight, updates, and support. Our team of experts delegates everything; configuration, patching, monitoring, and incident response to our certified team, providing a turnkey solution.
Managed Detection and Response (MDR)
Which log sources, SaaS apps, clouds and security tools do you integrate with out-of-the-box?
600 + connectors covering Google Cloud, AWS, Azure, Microsoft 365, Azure, Okta, CrowdStrike, Palo Alto, Cisco, etc.
Where is your Security Operations Centre (SOC) based?
Our SOC is based in the UK, where it's closest to our customers.
How long does it take to get fully deployed?
Initial setup is quick and Data Connect will help support customers in onboarding log sources, rule tuning typically then takes 2–4 weeks.
How are events collected into the platform?
Typically a physical or virtual forwarder will be deployed onsite to collect and forward logs into SecOps. Cloud-to-cloud API pulls are also widely available for various cloud applications. SecOps provides flexible, secure paths to get every event into the platform without opening inbound firewall ports or deploying heavy agents.
How long are logs and events retained in the platform?
12 months as standard, fully searchable hot storage.
What is a retrohunt?
New rules created in the platform can be run against any data in the platform. This allows for searching for newly identified IOCs across up to 12 months of data.
Need more help?
Talk to an expert