Celebrating Sentrium’s contribution to cyber security

The importance of cyber security

Mar 19th 2021

2020 is the year that remote working exploded. Businesses and the general public had to quickly adapt to new ways of working caused by the pandemic. There was suddenly a heightened awareness of cyber security and its importance. 

The need for further education on cyber security highlights the important work Sentrium carries out every day. Sentrium’s commitment and passion for providing best-practice cyber security support helps businesses to gain assurance in the security of their assets.

In a conversation with Sentrium’s Director, Adam King, we discuss the incredible ways Sentrium is contributing to the education and awareness of the cyber security industry. 

Background in cyber security

I’ve had a deep interest in technology from a young age. I spent much of my own time learning about technology so I knew I wanted to explore a more challenging area that sparked my interest.

“I found it really cool to hack stuff and get paid for it.”

I met someone studying a degree in cyber security and we got talking about the industry and the penetration testing specialism specifically. I applied for a degree in cyber security and my career took off from there.

Most common cyber security challenges

Challenges are very mixed. Some clients understand security while others need more guidance.

Clients may have an internal IT or security professional who has an interest in cyber security and resources from the company to make headway in understanding their IT security challenges.

“I often talk to clients about their principle security concerns, which is my fancy word for objectives.”

For clients with security experience that know exactly what they want, we can go straight into understanding their objectives, providing a detailed scoping process and the services that achieve them.

For clients that need more guidance, we take a more holistic approach rather than going deep into a specific part of their IT ecosystem. We discuss their current situation and find the best way to offer a service that carries value.

Reasons for needing cyber security services

There’s a whole host of reasons why businesses would need cyber security services:

  1. Genuine interest
    There’s often a genuine interest in IT departments who also have the budget to spend on improving their cyber security, especially where there’s a senior management influence wanting to invest in the area.

  2. Regulatory and compliance
    A lot of the time it’s regulatory and compliance-driven, such as ISO 270001, where there may be a requirement to do an annual testing programme for the business to remain compliant.

  3. Product-focused
    It may be product-focused where companies release new software and need to demonstrate to their customers that the software is secure.

“The client saw real value in our recommendations.”

A client recently came to us looking for assurance for one of their products. We went through our comprehensive scoping process to understand their assets and where we can provide support.

We were able to clearly demonstrate our understanding of their long term goals and deliver value where it matters the most.

Improving education and awareness of cyber security

Cyber security is a complex topic, even for clients with an understanding of security and the reasons for needing it.

Our responsibility as a cyber security consultancy is to articulate and communicate our findings and advice in a way that our clients understand and draw value from.

Internally, we dedicate a lot of time and have a passion for knowledge sharing. This helps us stay on top of a constantly changing industry and continue growing.

There are no blanket best practices we recommend to businesses. Cyber security is complex and there are different reasons for wanting to invest in security. Challenges are unique and driven by the specific circumstances that each client finds themselves in.

“You can only make effective recommendations about cyber security when you have a solid understanding of the problems you are trying to solve. To do this, you need to know the client really well.” 

Supporting charities with cyber security skills

Cyber security is expensive and time-consuming. It also requires an understanding from the company to know where to invest resources.

Charities are bound to invest resources in the best way they can to deliver maximum operational efficiency. Cyber security is an area charities aren’t always able to invest their resources in.

“We’ve always had a passion to support charities and give back in some way.” 

Giving back by donating a lump sum of money wasn’t the approach we wanted to take. We felt we could add more value by donating our time, skills and expertise to an industry that needs the resources. 

Progress in the cyber security industry so far

The cyber security industry has come an incredibly long way since I started my career. The general public understanding of cyber security has dramatically increased and it now filters into organisations at all levels.

The landscape of IT security is also growing. There are so many new products, services and specialisms within cyber security as a result of the heightened awareness.

“Regulatory updates like GDPR have changed the reasons why businesses care about security.” 

Privacy plays a role in this understanding. There are currently debates regarding people’s right to privacy online, specifically with social media, which are all related to cyber security and keeps the industry a hot topic.

It has driven a lot more investment into cyber security to protect businesses from data breaches and the impact they have on an organisation as awareness increases.

Future of the cyber security industry in 2021

Businesses are relying more on remote working whether it’s full-time or part-time. There are cyber security considerations needed to facilitate remote working.

Some businesses have done this reactively. They have implemented remote working solutions over the last 12 months to keep the business functioning. Now that the operational need for these working solutions has been achieved, they are considering the cyber security impact of the changes that were made.

Businesses now want to act proactively. They’re looking to implement remote working solutions for the long term by ensuring they follow cyber security best practices.

“There are cyber security best practices that are difficult to follow working from home.” 

Good habits like locking your computer screen when you’re away from your desk might have lapsed when working from home. It’s important to rebuild these habits going back into the office.

Sentrium’s best practice support continues to contribute to the betterment of the cyber security industry. The team’s commitment to improving education and awareness of cyber security provides value to businesses where it matters the most.

Want to find out more about Sentrium Security? Contact us to learn more.

Dealing with Dependencies

Enhancing Security in your Software Development L...

Exchange Server Emergency Mitigation Service

Exchange Server Emergency Mitigation Service


VMware vCenter Critical RCE Vulnerability


OWASP Top 10 2021 Released

Introduction to Windows 11 (Beta) Security

Introduction to Windows 11 (Beta) Security

HTTP/3 and QUIC: A new era of speed and security

HTTP/3 and QUIC: A new era of speed and security?

Microsoft reports open redirection phishing tactic

Microsoft reports open redirection phishing tactics

Fortinet WAF allows remote code execution

Fortinet WAF allows remote code execution

Microsoft Exchange Bugs

Microsoft Exchange Proxy Vulnerabilities

PetitPotam: Windows AD CS NTLM Relay Attack

PetitPotam: Windows AD CS NTLM Relay Attack

What is penetration testing and why is it important to use a CREST-approved provider?

What is penetration testing and why is it importa...

What to do after your penetration testing report

What should you do after your penetration testin...

How to prepare your business for secure cloud migration

How to prepare your business for secure cloud mig...

How secure use of the cloud can transform your business

How secure use of the cloud can digitally transfo...

What is crest and how does it benefit you?

What is CREST and what are the benefits of using ...

How can the 10 steps to cyber security help to protect your organisation?

How can the 10 steps to cyber security help to pr...

What is OWASP Application Security

What is OWASP application security?

Pentration testing report

What should you do after your penetration testing...

Protect against a phishing attack

How to protect against a phishing attack

Secure data in cloud computing

How to secure data in cloud computing

The Security risks of cloud computing

What are the security risks of cloud computing?

Maintain security when employees work remotely

How to maintain security when employees work remo...

Identify and avoid phishing attacks

How to identify and avoid phishing attacks

Penetration testing

What is penetration testing and why is it important?
  • Left Arrow Icon
  • Right Arrow Icon