What data does the CyberSmart software collect?
The CyberSmart software application has been designed to collect minimal information, specifically relevant to meeting and maintaining security compliance requirements.
Here's a list of the information utilised in addition to the security checks carried out by the CyberSmart application.
Information related to the device:
Information related to the user:
Information related to the network:
Information related to installed software:
Information relevant to diagnostics:
As we expand app functionality we may look at additional data points to support our goal of automating compliance. We have no plans for this to include any personal, sensitive data or information being sent across the network.
What is CyberSmart software
Security software can often be a black box, users know very little about what is going on behind the scenes and this doesn't contribute to the overall education of users on good security practices. We decided to remove the mystery and provide end ...
What devices would I need to install the CyberSmart software on?
CyberSmart software should be installed on any devices that access company or customer data. This may include both personal and professional desktops, laptops, servers, virtual machines, mobile phones and tablets.
How does our Software Report feature work?
A short description on how our Software Report feature works behind the scenes. What is Software Report? Software Report is a feature that works with CyberSmart Active Protect to identify every bit of software and software version on each device. It ...
Why do I need the CyberSmart software?
With a growing culture of remote working, dispersed workforces, and endless professional systems, outstanding cyber hygiene is now critical for the success of small businesses. Unfortunately, certification in this field only guarantees protection at ...
Do I need the CyberSmart software to achieve Cyber Essentials?
CyberSmart software is not a mandatory requirement to achieve Cyber Essentials, however, it provides ongoing monitoring and assurance that your business is working in a safe and secure environment. The Cyber Essentials process is a ‘snapshot’ in ...