Home News Services Verify Testimonials About Us Downloads Contact

A Summary of Our Services

The information on this page is supplemented by the following documents:

key WMAS ISAS Services. WMAS ISAS Free Tools.

  • Phishing Real

    Free of Charge to clients of our core service offerings - This is our inhouse developed phishing email campaign and awareness tool. Subscribers to this self-service web based tool can easily launch phishing email campaigns against their staff. The system records and reports upon subsequent activity such as number of users clicking on links within the emails sent to them and attmpted logins to customisable, pre-made template or custom URLs. Subscribers can opt to use pre-made phishing email templates or create their own rich text emails to send to their staff.
  • Application Security Consultancy

    Having an in-house development function can greatly increase the responsiveness and efficiency of your organisation. Our team can assist during the development process to ensure in-house developed systems do not have an adverse impact upon the ongoing Confidentiality, Integrity and Availability of your systems and data.
  • Cloud Consultancy

    As an early adopter of Cloud based technology within the public sector we have a great deal of experience in Cloud Computing. If you need advice regarding the deployment of Cloud services we can assist with independent advice via our specialist team.
  • Compromise Monitoring and Intelligence (Continuous)

    Our in house developed solution can monitor multiple online sources for indications that your organisation has suffered a security breach. The majority of organisations take a significant amount of time to identify they have been breached, let us help reduce that time should the worst happen.
  • Cyber Essentials Consultancy

    As the first Cyber Essentials accredited NHS organisation we can assist you in preparing for Cyber Essentials assessment. Our expert cyber security team know Cyber Essentials inside and out!
  • Cyber Security Consultancy

    Our team have been providing cyber security services to fellow public sector organisations for many years, why not join the list of repeat clients that benefit from our experience, knowledge and insight into public sector cyber security.
  • Data and Device Disposal Verification

    We use world renowned digital forensics tools to routinely test devices that have undergone 'secure disposal' procedures. This enables us to provide clients with an independent assurance that their disposal processes really are secure.
  • Data Encryption Verification

    Utilising world renowned digital forensics tools we are able to ensure that devices and media are fully encrypted and aren't going to leak information.
  • Data Recovery

    We have assisted numerous clients in recovering data from devices when they had believed the data to be lost.
  • Data Security Consultancy

    The ongoing confidentiality of person identifiable data and information systems is a pivotal component of any organisations security posture. Our specialist team has the knowledge and experience to assist your organization in ensuring your person identifiable data remains secure.
  • Device Configuration Assurance

    The configuration of the devices within your organisation is pivotal in ensuring the ongoing Confidentiality, Integrity and Availability of your data and systems. Our expert cyber security and IT assurance staff can asses your devices (firewalls, PCs, laptops, mobile devices etc) against best practice and formal configuration guidance from internationally recognised sources such as CESG and NIST.
  • Digital Forensics

    Our expert forensics staff are able to undertake digital forensics investigations on virtually any digital device or media utilising world renowned digital forensics tools.
  • IT Audit

    From change control procedures and IM&T strategy to highly technical assurance reviews, our team can provide assurances in all IT audit related areas.
  • Legislative Consultancy (e.g. DPA 1998, FOI 2000)

    Our consultants provide fellow NHS organisations with comprehensive advice in relation to legislation they are required to comply with and are sometimes unaware of.
  • Major Event & Incident Simulation

    Our team of specialists can simulate major IT incidents and then report upon the performance of your staff in terms of their initial response, recovery and resumption of normal business operations.
  • Network Posture Monitoring (Continuous)

    Utilising an in-house developed solution we are able to monitor your outward facing (Internet and NHS N3 network) security posture. Recipients of the service receive near real-time alerts in the event that their network security posture changes. Use our service to stay informed about the security of your network and services. A basic offering from this service is free (no charge) for fellow public sector organisations, more advanced paid for subscriptions start from as low as £50 per month. Click here for more information.
  • Penetration Testing - Networks, Systems, Websites and Webapps etc.

    Our expert NHS employed penetration testing team hold numerous leading accreditations including TIGER Scheme Senior Tester which is formally recognised by CESG. With unrivalled experience within the NHS trust our team can safely identify weaknesses in your systems before anyone else does. Our plain english reports include recommendations to address every weakness identified.
  • Project Consultancy & Assurance

    Our Prince2 accredited staff are utilised by clients to fulfill the role of 'Project Assurance' and also provide independent assurance as to the overall management of projects within NHS trusts. Our team benefit from a large amount of public sector experience and IT knowledge.
  • Security & Design Consultancy

    With a wealth of experience within IT audit, technical assurance and cyber security we are in an ideal position to advise in relation to the security of proposed network and systems design.
  • Social Engineering Testing

    Utilising an in-house developed solution we are able to undertake social engineering (physical and logical - e.g. email) to ensure your information, staff and office bases are secure. We have achieved numerous high profile security compromises in this area.
  • Standard Build Testing

    Our expert cyber security and technical IT assurance staff can assess and critique your standard build images before you deploy them to your estate thereby giving you confidence that newly deployed and imaged systems are secure.
  • Supplier & Solution Vetting

    Utilising a new supplier or partner organisation is always a risk. Our team can assist in the vetting and assessment of new providers and potential partner organisations in relation to their IT security processes and IT assurance accreditations.
  • Systems & Network Resilience Consultancy

    With a wealth of experience in both old and new build environments (including PFI projects) we are able to review and critique systems and network designs in relation to resilience and continuity risks. Let us identify any issues before you find out first hand!
  • Training Workshops

    Our team provide training to fellow public sector organisations in all aspects of IT audit and cyber security from entry level user awareness to ethical hacker training.
  • User Awareness

    We frequently find that an organisations weak spot is its staff. Let us raise awareness amongst your staff to ensure they aren't your weakest link.
  • Vulnerability Assessment

    Our vulnerability assessment service can reveal vulnerabilities in your systems, devices and networks without actually attempting to cause a security compromise.

WMAS ISAS provides penetration testing, vulnerability assessment, compromise monitoring, digital forensics and a host of other services.

NHS employees providing accredited Cyber and IT Consultancy services (including accredited penetration testing) to fellow NHS, public and private secor organisations.
NHS
Manufactured by: WMAS ISAS