Skip to main content

Introducing the Conosco Security Division

One thing you’ll notice is that I quite like to blog about what I’m up to at Conosco. As the CEO for a private company, this may be somewhat unusual, and it would certainly make other company Boards nervous. 

Thankfully not ours. 

We believe that being ‘open’ betters the understanding among our staff, future employees, clients and prospects of what Conosco does, how we do it, and what we strive for. It also follows an ethos that I believe has helped mature the Information Security community – sharing knowledge that adds insight and value to its members. This approach has allowed the Information Security community to build strong bonds,  improve its members’ collective defences and lower the barrier to knowledge proliferation as a result.

Conosco has a new and niche security offering for the SME market that has benefitted from such open thought, opinion sharing and an honest approach to solving our clients’ genuine security needs. The new Conosco Security Division provides our clients with a single point of ISO27001:2013-accredited contact through which to manage multiple and differing security services requirements, from consultant-led engagements to technical solutions procurement, testing, remediation, audits and more.

We remove the complexity of having to source, negotiate and engage with multiple security vendors, and ensure that our clients achieve the strongest possible ROI from each one. We deliver bespoke security strategies and full-scope roadmaps so that our clients can build resilient businesses. As a result, the Conosco Security Division positions us perfectly as today’s most well-rounded MSP in the marketplace.

Launching the Conosco Security Division has enabled us to add further value to our award-winning managed computing and project capabilities through the merging of our in-house InfoSec skillset – which provides the Division with secure foundations – with a number of diverse security industry leaders including Darktrace, Webroot and SureCloud.

With this approach, I believe we will continue to see Conosco setting the tone for the MSP market and contributing to the technology community as a whole.

It is my passion (indeed, job) to ensure Conosco continues to set the best example of what ‘beyond IT’  looks like through our excellent service delivery and offering. This drive is not only to pursue commercial success, but to provide those working within, and with Conosco with the best possible experience and levels of satisfaction. Perhaps this is why we’ve just won ‘Best place to work in Security’ at the Computing Excellence Awards 2017?

Conosco has been supporting its clients for more than 15 years. We continue – every day – to invest a significant effort and energy at our UK and South African bases ensuring that we always provide our clients with the most appropriate, secure solutions, at the right price point, for their very different needs. 

Get in touch if you’d like to be part of the Conosco Security Division’s growth story…


Popular posts from this blog

The 'Big Five' behaviours - Building and maintaining a values-led business culture

Business culture is a topic that I frequently see popping up on my LinkedIn feed, and something I'm deeply passionate about.

Many of us have read the famous Netflix slide deck that describes their own business culture, and even last night whilst digesting the day's technology news I read an analysis of Bezos' meeting culture in a digital broadsheet.

For my business - Conosco - the culture I joined and the culture I knew that I would be proud to lead and be associated with, have maintained a high position in my everyday thoughts whether on my morning drive to work, walking through the streets of London at lunchtime or sitting with my young children as they fall asleep at night after their bedtime story.

Having just spent a week with our teams based in South Africa, it's become ever more apparent to me that a relatively small number of leadership values and habits can help to drive what I feel are the most valuable team member behaviours to support our business culture.

Designing a GDPR-compliant consent workflow for eCommerce

It's been quite a journey for me, to date, as I find my way along the twisty path that is understanding GDPR.

Through attempting to better understand what 'compliance' for the Photobox Group looks like, and in a renewed attempt to better understand its likely impact upon us, something I've found hard to find are good examples of 'GDPR compliant' user interfaces for eCommerce around the provision of user consent.

Ultimately we need to ensure that for each and every GDPR-relevant interaction our brands have with our customer's data, we have their appropriate consent.

The question is, how granular the explicit Opt-In requirements need to be?

The ICO does a good job of publishing high-level 'consent guidelines' as below:
Explicit consent requires a very clear and specific statement of consent. Keep your consent requests separate from other terms and conditions.Be specific and granular. Vague or blanket consent is not enough.Name any third parties who wi…

Preparing staff messaging around WannaCrypt/WCry

In the spirit of my ongoing InfoSec openness, here's the messaging I've prepared around our Group's education and call to action around WannaCrypt:
Many of you will have read about last week’s Global cyber attack that caused a number of organisations to be seriously impacted including the National Health Service in the UK and Telefonica in Spain. Over 70 countries were affected in total.
The attack took the form of ‘ransomware’ that caused computer-held files to be made unreadable (encrypted) unless a payment was made to the attackers via the 'Bitcoin' online currency.
Currently we have no reports of any impact to Group services or systems from this attack.
The attack relied upon a combination of malicious software being run, poor IT configuration practices, and the exploit of older, unpatched/out-of-support systems such as Windows XP and 2003.
The Group have a large and complex IT infrastructure that is continually being improved, strengthened and made more …