*Reassuringly dull cyber security e: info@normcyber.comt: +44 (0) 203 855 6215

How to manage cyber risk effectively – a guide for midmarket companies


The Forgotten Middle

Cyber threats are just as real a threat to midsize organisations as they are to large multinationals.

Cyber criminals, hacktivists and nation state actors know that the digital assets and systems of midsize companies are just as lucrative as those of their larger counterparts.

That’s why we’ve created a guide specifically for small and midsize organisations to help them assess, manage and mitigate their exposure to cyber risk.

Take a look at our useful guide detailing the five steps to effective cyber risk management and the most common threats including:

  • Zero day attacks
  • Ransomware
  • Supply chain attacks
  • Phishing
  • Cloud security attacks

Discover the five steps to effective cyber risk management:

  1. Know your cyber risk baseline
  2. Practice basic hygiene and maintenance
  3. Implement user awareness and training
  4. Invest selectively in advanced technologies
  5. Develop your incident response plan

Download the full eBook to learn how to implement each step in detail as well as how they mitigate the cyber threats that your organisation may face – download here.

Appointing NormCyber as our virtual DPO has given Ferrero the best of both worlds – access to data protection experts who understand what we stand for as a business, without the hefty overheads usually associated with appointing an in-house DPO.

Harpreet Thandi
Regional Counsel, UK & Ireland, Ferrero

We were looking for a virtual DPO service that offered all of the benefits of a fully qualified data protection lawyer, without the overheads of an in-house hire. The DPaaS solution from norm. has been invaluable in helping us to ensure we respect the integrity of our customers’ personal information, while using it to continue to deliver differentiated products and services which support our growing customer base.

Mike Whitfield, Compliance Manager

CSaaS allows me to step away from multi-vendor management as the Security Operations Centre coordinates all of the technology for me.

David Vincent, CTO

We were in the market for an independent Data Protection Officer service that was well versed with both UK and EU regulators. We’re thrilled to have acquired this service knowing that an expert is available 24/7.

Suzanne McCabe, Head of Project Management
James Hambro & Partners

Norm’s penetration testing layer, along with the suite of CSaaS modules has enabled MA to exceed all its audit requirements for its major clients.

Rob Elisha, ICT and CRM Manager
Montreal Associates

The speed of your Data Protection Officer’s response was very impressive – it was far quicker than I would have expected even from an in-house DPO

Will Blake, Director of Technology and Analytics
CRU Group