Our mission is that we are here to help healthcare organisations identify, protect, detect and respond to existing and emerging cyber threats using volunteers.
Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber-attacks.
Our primary purpose
Our primary purpose is to facilitate and enable a Volunteer Matchmaking service to give healthcare services access to a pool of cyber security experts (primary focus)
Cyber security experts protect websites and networks from cyber threats such as malware, denial-of-service attacks, hacks and viruses. They provide consulting services, interpret and establish security technologies, and create the information security framework and architecture that protects sensitive data from threats.
Our secondary activities
Our secondary activities also aim to provide additional support in the following areas:
Threat intelligence, also known as cyber threat intelligence (CTI), is organized, analysed and refined information about potential or current attacks that threaten an organization.
Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization.
Business continuity planning
Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.
Incident response planning
Incident response plans usually include instructions on how to respond to potential attack scenarios, including data breaches, denial of service/distributed denial of service attacks, network intrusions, virus, worms or malware outbreaks or insider threats.
Supply chain planning
Supply chain planning is the process of planning a product from raw material to the consumer. It includes supply planning, production planning, demand planning, and sales and operations planning. Supply planning determines how best to fulfil the requirements created from the demand plan.~
Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources). It is not related to open-source software or collective intelligence.
Threat hunting is an early stage component of threat detection that is focused on identifying threats at the earliest possible phase of an attack or compromise. Threat detection as a broader term refers to the full set of processes focused on discovering and identifying threats, whether before, during, or after a compromise has occurred