forked from sr2/www.sr2.uk
add cyber essentials
This commit is contained in:
parent
856ed374be
commit
6311878da0
8 changed files with 56 additions and 9 deletions
BIN
assets/images/footer/essentials.png
Normal file
BIN
assets/images/footer/essentials.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 137 KiB |
BIN
assets/images/footer/gdpr.png
Normal file
BIN
assets/images/footer/gdpr.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 33 KiB |
|
|
@ -5,7 +5,7 @@ title = "Communication Strategy"
|
||||||
[params]
|
[params]
|
||||||
background = "images/backgrounds/new_tower.jpg"
|
background = "images/backgrounds/new_tower.jpg"
|
||||||
+++
|
+++
|
||||||
# Communication technology for challenging environments.
|
# Secure, robust and resilient technology for civil society.
|
||||||
### Software and systems to ensure your messages get through when they are the most critical.
|
### We build open source systems and processes to support human rights defenders, journalists, community groups and activists.
|
||||||
|
|
||||||
{{< primary-button name="Get in touch" url="/contact" icon="arrow-right" >}}
|
{{< primary-button name="Get in touch" url="/contact" icon="arrow-right" >}}
|
||||||
53
content/posts/2026-cyber-essentials/index.md
Normal file
53
content/posts/2026-cyber-essentials/index.md
Normal file
|
|
@ -0,0 +1,53 @@
|
||||||
|
+++
|
||||||
|
title = 'SR2 Communications Achieves Cyber Essentials Certification'
|
||||||
|
date = 2026-05-03T09:20:00-00:00
|
||||||
|
lastmod = 2026-05-03T09:20:00-00:00
|
||||||
|
draft = false
|
||||||
|
tags = ['security', 'audit']
|
||||||
|
[params]
|
||||||
|
author = 'Iain Learmonth'
|
||||||
|
+++
|
||||||
|
|
||||||
|
We're pleased to announce that SR2 Communications has achieved
|
||||||
|
[Cyber Essentials](https://www.ncsc.gov.uk/cyberessentials/overview) certification, the UK government's baseline
|
||||||
|
standard for cyber security.
|
||||||
|
This milestone represents an important addition to our existing security practices and reinforces our dedication to
|
||||||
|
protecting the organisations we serve.
|
||||||
|
|
||||||
|
<!--more-->
|
||||||
|
|
||||||
|
<figure>
|
||||||
|
<img src="/images/2026/cyber-essentials.png" alt="Certificate of Assurance - SR2 Group Limited, incorporating SR2 Communications Limited and SR2 Professional Services Limited, complies with the requirements of the Cyber Essentials scheme">
|
||||||
|
<figcaption>Our Cyber Essentials Certificate</figcaption>
|
||||||
|
</figure>
|
||||||
|
|
||||||
|
Cyber Essentials is a government-backed certification scheme developed by the National Cyber Security Centre (NCSC).
|
||||||
|
It establishes five core technical controls designed to prevent the most common cyber security threats.
|
||||||
|
According to NCSC, organisations with this certification are protected against approximately 80% of the most common
|
||||||
|
cyber attacks that they have observed.
|
||||||
|
|
||||||
|
We've always had a strong focus on security (it's the S in SR2!) and have always maintained rigorous security practices
|
||||||
|
in our software development and infastructure hosting including external audits of application code and periodic
|
||||||
|
penetration testing of our infrastructure. These practices remain in place and will continue to provide project-specific
|
||||||
|
assurance. However, Cyber Essentials addresses something equally critical: the foundational security of our
|
||||||
|
organisation.
|
||||||
|
|
||||||
|
While code audits and pentests examine specific systems and software, Cyber Essentials evaluates how we operate as an
|
||||||
|
organisation, covering five primary areas:
|
||||||
|
|
||||||
|
* Boundary firewalls and internet gateways
|
||||||
|
* Secure configuration
|
||||||
|
* User access control
|
||||||
|
* Malware protection
|
||||||
|
* Patch management
|
||||||
|
|
||||||
|
This certification ensures that the foundation upon which our technical work rests is equally secure. The organisations
|
||||||
|
we work with include free software projects, charities, non-profits, advocacy groups, and the media.
|
||||||
|
They often handle sensitive data related to vulnerable populations, campaign strategies, and confidential stakeholder
|
||||||
|
information. They need partners they can trust.
|
||||||
|
|
||||||
|
For those partners operating with limited resources, knowing that their technology partners meet recognised security
|
||||||
|
standards removes one more concern from their already demanding work.
|
||||||
|
|
||||||
|
If your organisation is looking for a technology partner that understands your mission and takes security seriously,
|
||||||
|
we'd welcome you to [get in touch](/contact).
|
||||||
|
|
@ -70,6 +70,7 @@ NCAGE: U2G06'''
|
||||||
{text = 'Git', icon = 'git-branch', href = 'https://guardianproject.dev/sr2'},
|
{text = 'Git', icon = 'git-branch', href = 'https://guardianproject.dev/sr2'},
|
||||||
{text = 'Bluesky', icon = 'at-sign', href = 'https://bsky.app/profile/sr2.uk'},
|
{text = 'Bluesky', icon = 'at-sign', href = 'https://bsky.app/profile/sr2.uk'},
|
||||||
{text = 'LinkedIn', icon = 'linkedin', href = 'https://www.linkedin.com/company/sr2uk/'},
|
{text = 'LinkedIn', icon = 'linkedin', href = 'https://www.linkedin.com/company/sr2uk/'},
|
||||||
|
{logo = 'images/footer/essentials.png', href = "/cyber-essentials.pdf"},
|
||||||
]
|
]
|
||||||
|
|
||||||
[params.styles]
|
[params.styles]
|
||||||
|
|
|
||||||
|
|
@ -6,13 +6,6 @@
|
||||||
|
|
||||||
<div class="divider"></div>
|
<div class="divider"></div>
|
||||||
|
|
||||||
{{ $ctx := dict
|
|
||||||
"page" .
|
|
||||||
"title" (T "Our Team")
|
|
||||||
"content" (partial "team.html" .)
|
|
||||||
}}
|
|
||||||
{{ partial "flex-section.html" $ctx }}
|
|
||||||
|
|
||||||
{{ $ctx := dict
|
{{ $ctx := dict
|
||||||
"page" .
|
"page" .
|
||||||
"title" (T "Our Partners")
|
"title" (T "Our Partners")
|
||||||
|
|
|
||||||
BIN
static/cyber-essentials.pdf
Normal file
BIN
static/cyber-essentials.pdf
Normal file
Binary file not shown.
BIN
static/images/2026/cyber-essentials.png
Normal file
BIN
static/images/2026/cyber-essentials.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 528 KiB |
Loading…
Add table
Add a link
Reference in a new issue