DEADLINE? WHAT DEADLINE? it’s not about deadlines, GDPR is about continuous compliance
Cyber Essentials l TITAN l ATLAS l Penetration Testing
collect. secure. manage. Despite the UK’s exit from the EU, we will adopt the GDPR on May 25 this year. But that is the start, not the end of the journey; compliance isn’t a standard you achieve, with an icon for your website and letterheads. You must continue to comply with the principles of the GDPR until something better comes along. You will change your approach to how you collect, manage and use personal data, or face the consequences. And there will be consequences if you do not maintain compliance and suffer a data breach. A fine might just be the least of your worries, given the reputational damage your brand will receive.
Think beyond the deadline We do not advocate ignoring the deadline, but a sense of perspective is required. You have to think further and focus not just on achieving compliance, but how you maintain it in the future. You must ensure those within your business who collect and manage personal data understand their obligations under the GDPR. You must take appropriate steps to remind everyone of their responsibilities, with training sessions if that’s what it takes. Regular training for your people will help maintain
awareness of the issue and demonstrate how committed you are to ongoing compliance. Make your training relevant with good examples and simple processes that they will readily understand in the context of your business. Continue to highlight the threat posed by noncompliance and consider adding GDPR compliance to your firm’s risk register. Ensure everyone with data responsibilities signs up with the Information Commissioner’s Office (ICO) to receive email updates with best practice advice.
You are accountable In future you must demonstrate you understand and comply with the concept of accountability, a key principle under the GDPR. This is not just for the benefit of the authorities, you can expect to be required to detail your approach to data security in tenders and contracts. You might need to create more policies and procedures or update your current ones, but it will be essential you maintain a record of all your actions
and reasons particular decisions were reached.
react within the stringent time limits set by the GDPR.
Undertaking data protection impact assessments (DPIA) will demonstrate you understand the need for ongoing compliance. Remember, the ICO requires you to undertake DPIA before you begin any type of processing which might result in a high risk.
Ensure everyone in your organisation who regularly deals with data understands the required timeframes for a response and can complete without delay, including data subjects’ rights to be forgotten, move their data, etc.
To be safe, if you’re processing any form of personal data, undertake the assessments and record your actions and document your decisions – useful evidence if the relevant authorities audit your business. And don’t forget, The ICO requires you to perform DPIA when deploying new technologies.
Prepare templates for all your responses and make them easily accessible by those who need them, to ensure none of your people fires off a quick email that may make matters worse or compromise sensitive data.
Review and renew Review all your internal policies and create new ones if needed, with a documented review process in place to show your ongoing compliance process. Under the GDPR, you must be able to demonstrate you have integrated data protection into your data processing activities. You must collect only the personal data you need for your specific activities and ensure you capture only what is necessary – remember, the less data you hold, the lower the risk of breaching the GDPR. For additional security, consider pseudonymising or encrypting the personal data you hold.
Turn threat into an opportunity You must embrace the principle of ‘privacy by design’, which puts data security and compliance at the heart of your operation, your strategy and the culture within your organisation. Transforming how you collect, manage and protect data, with transparency and integrity as guiding principles, will turn the GDPR into an opportunity to build stronger relationships with your clients, who will also place greater trust in your brand - which will make all the effort worth it. Privacy, security and good data stewardship are important to build client trust.
Be prepared from day one You must be ready to deal with Subject Access Requests (SAR) from data subjects. Written and documented procedures must be in place, so you can
It’s critical everyone in your organisation knows how a personal data breach can happen, what it looks like and the potential impacts - even those who do not normally work with personal data. For added peace of mind, develop and use an internal breach reporting procedure, documenting the detection and investigation process – keep records to show the authorities if the worst happens. You must understand what to do, who you have to notify and importantly, just how long you have to do it, if there is a breach – in the early months after deadline, you can expect examples to be made of non-complying businesses.
Change your thinking The GDPR is designed to change the way you think about privacy and data security. Ongoing compliance must become second-nature, or your business could pay a high price; literally. We provide a range of services to toughen up your IT system and infrastructure security to lessen the risk of a data breach. From a probing GDPR gap analysis, to proactively phishing your people to ensure they remain aware of the risks of a cyber-attack and attempting to hack your network to test its ability to resist criminals. Help with achieving the Cyber-Essentials Plus standard and a range of technical solutions backed by a Security Operations Centre (SOC) running 24/7/365 if necessary, are all available with a single call to 0333 222 4334. And remember, if security threats worry you more than GDPR compliance, which they should, please get in touch today; peace of mind is at hand.
appraisal of your records management. There will also be practical measures to help with your direct marketing questions.
There may be a deadline, but the chance of any officials checking your compliance on or after the date is unlikely. Not impossible, but unlikely. However, if your business suffers a cyber-crime attack after that date and it is found you were not compliant, despite all the publicity, you could face a big fine and the potential to be made an example of. To encourage the others, as it were. You will undoubtedly be doing something towards compliance, but how close are you? Who is going to signoff that you are now fully compliant? As long as you are doing something, you are mitigating risk and protecting your business and its reputation. With our help you can understand quickly and simply, just how close you are to compliance, or how much further you have to go.
Answer and be assessed Our simple to use portal features sixty probing questions, in logical sections, designed to interrogate you, your business and your approach to compliance with GDPR. You will be assessed on data protection and information security compliance. Your approach to data sharing and subject access requests will be assessed, along with an
The answers you provide will be reviewed by a UK-based data protection solicitor, experienced in every aspect of the new GDPR regulations. You will receive a detailed report that highlights critical issues (Red), urgent issues (Amber) and areas you can worry less about (Green). If you are worried you may not yet be fully compliant, our simple assessment process considers what aspects of GDPR will have the greatest impact on your business and help identify your immediate priorities. If you are satisfied you are already compliant or well on the way, it might just be worth a quick check to ensure all your boxes are ticked and you can prove you have taken the necessary actions. What have you got to lose, except perhaps a big fine or your reputation! Easy to use online portal with probing questions Data Protection and Information Security assessment Records management appraisal Review by UK-based data protection solicitor RAG status report detailing required actions
Excellence through experience
GDPR COMPLIANT? BE PREPARED FOR THE 25TH MAY 2018
YES
MAY B E NO
FIND OUT FOR JUST
£399
*
Answer 60 probing questions to create a gap analysis report showing how close to compliance you are. And what steps you need to take.
POWERED BY
• Simple to use online portal • 60 data protection questions • Tailored gap analysis report • Reviewed by UK Data Protection lawyers
THINK MARBLE
THINK CYBER SECURITY * Price Excludes VAT
0333 222 4334
www.quiss.co.uk
PHISHING O
Gand improve your security We work hard to maintain the integrity and security of the networks, systems and infrastructure we manage for our clients, but our efforts can all be undone by one careless click by one of your employees. You and almost all of your employees will be aware that phishing attacks use fraudulent emails to encourage the recipient to do something they shouldn’t; click through, submit personal details, reset their password, pay a different account, the list goes on. The problem is that despite all the publicity, you are likely to have someone who still does not understand the very real and imminent threat posed by those funny emails with the poor grammar and laughable requests. It only takes one. One inattentive individual, not switched-on to the imminent threat of a cyber-attack can undo all the hard work and allow the criminals in to wreak havoc. Or steal data. Or money.
from different contacts, all designed to elicit the wrong response. The campaign will typically take four to six weeks, starting at a time agreed with you in advance. All the users on the list you supply will be targeted and begin receiving creative emails that imitate the real thing. Their responses will be tracked and recorded.
91%
Regular reports will keep you informed and identify those individuals that need to be reminded about the dangers of phishing and the harm the wrong response can cause.
OF SUCCESSFUL DATA BREACHES STARTED WITH A PHISHING ATTACK
Test before criminals do The answer is to ethically phish your employees. Warning them that this is happening to protect the business will encourage good behaviour amongst your people and find vulnerabilities before cyber-criminals do. And you can plug the gaps.
It’s not to catch people out, it’s to educate everyone that security is a collective responsibility, with training offered to those who need more help. Our experienced training team can tailor sessions for your people and your business to ensure complacency doesn’t slip back in.
Quiss Technology is experienced in creating credible phishing email campaigns, so let us help find those less aware individuals within your business, before the criminals do. Engaging awareness materials and resources to educate
We will discover the awareness within your organisation of phishing as a threat. Once we understand how your people approach security, we will devise an appropriate campaign, based on details of your suppliers, contacts, customers, internal departments etc., just like the bad guys.
Tailored campaigns relevant to your organisation
Our tailored campaign will use authentic looking emails that appear to come from people or organisations your people think they recognise. Our targeted approach will use different emails for different people, appearing to be
Immediate advice offered to respondents
Templates imitate real phishing attacks
Audit trail to help with compliance needs
REDUCING VULNERABILITY WILL CREATE OPPORTUNITY
As a trusted partner, delivering managed IT services for organisations large and small, we understand the need for robust, efficient and above all secure networks and infrastructure. We work hard to ensure vulnerabilities are minimised, but the threat landscape in the digital, always-on world has never changed so quickly and offered so many potential risks. Even the best, most secure, well managed systems can be exposed to risk by misuse or problems
from within; some deliberate, some compromised through negligence or even stupidity. No one would ever claim 100% security from hackers or other criminals; there is always that one-in-a-thousand chance someone can exploit a vulnerability and damage your business. Grand-prix racing drivers wear flame-proof overalls and ÂŁ80M euro-fighters have ejector seats because even the best systems can go wrong, despite the best efforts of the crew and the latest technology.
Protecting personal data depends on good cyber security... all too often, organisations fail at the basics. Christopher Graham Information Commissioner
(Birmingham hallmark picture courtesy of Assay Office Birmingham)
Cyber-attacks are on the increase and becoming more sophisticated. Now it is no longer good enough for businesses to claim they can resist potential cyber threats, they must be able to prove it, particularly if they hope to secure government or public-sector work. Since 2014, Cyber Essentials Plus has been a mandatory requirement when applying for government contracts and it looks as though we are transitioning to a point where businesses must hold a badge to be considered for most public-sector contracts. When making decisions about what suppliers to choose, clients are also adopting stricter vetting procedures and actively seeking evidence that an organisation has robust security standards. Organisations should now be striving to achieve the Cyber Essentials Plus standard. It not only ensures an organisation is properly protected, but it also alleviates any customers’ fears when it comes to the security of their personal information and confidential data.
An essential sign of approval We have partnered with Information Security specialists who are an approved assessor and certification body for Cyber Essentials, which allows us to help you easily achieve the standard required. There are currently two different certifications available to businesses – the standard Cyber Essentials and the Cyber Essentials Plus. Cyber Essentials represents the most basic level of cyber security and requires organisations to complete a questionnaire regarding their current security controls, which we will review for you. Alternatively, we can guide you through the process. This can include a visit to your premises and an external vulnerability assessment which directly tests that individual controls on the internet facing network perimeter have been implemented correctly.
Once Cyber Essentials has been achieved, a certified assessor will perform a detailed on-site technical audit to highlight any problems. Using a range of specialist tools and techniques, the Cyber Essentials Plus assessment directly tests that controls have been implemented correctly and recreates various attack scenarios to determine whether a system can withstand potential threats. Once the tests are completed and any identified issues are rectified, you will be issued with the ‘Plus’ certification. The Cyber Essentials Plus certification requires five technical controls: ●● Boundary firewalls – prevent unauthorised access to or from private networks ●● Secure configuration – ensuring systems are configured securely and tailored to an organisation ●● Access control – only allowing those with authority to have access to systems ●● Malware protection – ensuring the most current virus and malware protection is installed ●● Patch management – ensuring the latest applications are used with patches applied Once an organisation achieves Cyber Essentials Plus, it can use the relevant branding on all its marketing material to demonstrate it values cyber security and actively protects against cyber-attacks.
Ready to go further? Working with our technical consultants we can also help you achieve ISO 27001:2013, the internationally recognised standard for security management systems. If you want to know more and have one of our team talk you through the next steps, call 0333 222 4334 today. Prevents up to 80% of cyber threats Demonstrates the importance you place on security Compulsory for some government and public-sector contracts
MONITORING
current threats
We monitor our clients’ systems and networks for problems, including malware and virus attacks, but we are reliant on the latest threat intelligence; there is always a lag from an attack to a preventative measure working through to managed service providers like us. This is a lag that might be exploited and one that dictates we offer enhanced security and monitoring choices for those businesses more likely to be targeted by criminals. Businesses that handle financial transactions, trade online, store customer payment data or even those with valuable intellectual property, are likely targets given the growth and sophistication of cyber-crime – now more organised crime than teenage hackers proving how clever they are. The decisions you take now to protect your business will never ensure you are 100% safe; that is an unattainable level of security.
However, balancing the cost of increasing your security against the level of risk you are prepared to accept will give you the best chance of avoiding a catastrophic attack or mitigating its impact. Some of the choices available to you will require you to implement them and others are for providers like Quiss Technology to facilitate, but all will improve your protection. Of course, compliance is also a big feature of data security. Whether it is to satisfy the requirements of the GDPR or the regulatory authorities specific to your industry, we have products and services designed to make your life a little less stressful, which has to be worth a conversation.
PENETRATION TESTING WILL FIND THE HOLES
The security and integrity of the systems, networks and infrastructure we manage 24/7/365 for our clients is critical and we expend huge resources to ensure our clients’ businesses never miss a beat. But our abilities are limited by what we know and what our clients do within their organisations; changes can be made, new hardware can be added, temporary access might be granted, all without our immediate knowledge.
The threat landscape changes regularly and ever more quickly, with determined, organised criminals understanding the low-risk, high reward nature of cybercrime. We work hard to keep you secure, but the criminals only need a new vulnerability and a bit of luck to undo a lot of good work. Like trying your front door after you know you locked it, the best way to test your defences are as robust as they can possibly be, is to test them regularly, using the same methods as the criminals. Let the right ones in In addition to the regular security practices we include in our managed services solution, we also offer penetration testing, or more commonly, ‘ethical hacking’. Our experienced technical engineers will test your systems, networks and web applications to check for vulnerabilities. In a simulated attack, the penetration test will result in technical and management reports highlighting any vulnerabilities, with advice on the necessary remediation steps. Our ethical hackers will test your defences and search for information about your organisation to find access points. They will probe your network with specialist tools not typically available on the open market. Brute force attacks will be tried, along with social engineering approaches, designed to take
control of devices on your network. Once in, your network will be scoured for valuable targets and something important will be copied to demonstrate their successful access. Understanding where the problems lie and prioritising improvements to the way you process and manage important data reduces risk across your organisation. It also helps show your clients and regulatory authorities the importance you place on security. Regular penetration testing in this way, could also help you win work in regulated sectors, with a blow-byblow account of the tests forming a valuable page in your pitch documents and an immediate market differentiator. Penetration testing is the ultimate test of your defences and simulates the real-world hacking that can cause so much damage, especially if you do not know your system has been compromised. We recognise that security is not just a black and white issue, but we offer both ‘black box’ and ‘white box’ testing. Black box requires our hackers to approach your organisation without prior knowledge and no network or system details – the most realistic attack. White box testing uses details of your systems, applications, passwords etc., to allow our hackers to find vulnerabilities in a known configuration.
Ethical hacking tests your security Latest tools and techniques used Detailed steps to improve security Shows how important security is to you Protects your organisation and your reputation
ATLAS We support our clients on a daily basis, solving problems as they arise on their networks, with their systems and within their infrastructure. But the new breed of hacker poses a different threat beyond that encountered by managed IT service providers. These sophisticated hackers are attempting to gain access to organisations like yours, looking to exploit vulnerabilities and steal money, data, assets and ultimately your reputation. Firewalls, correctly configured networks, maintaining current patches, etc., can only protect you so much. Modern computers and networks require regular vulnerability scanning to detect and defend against the evolving threat landscape. We can only do so much in the fight to keep you secure. The most effective solutions require very specialist skills and knowledge of the darkside. Hackers are seeking holes in your system and if
IS A WHOLE NEW WORLD OF SECURITY
you’re lucky you will detect and deny them access. But remember, some of the most effective hackers may never reveal their presence, which should worry you even more. Constant changes to devices, configurations, applications and even new patches can leave you susceptible to an attack, even with the experienced team here at Quiss Technology keeping your security controls up to date.
Best we find the vulnerabilities first ATLAS Vulnerability Scanning will help solve the issues presented by the discovery of a new security vulnerability every 90 minutes and an average of 7 vulnerabilities per asset typically identified across an IT environment. The ATLAS deep scanning process, which identifies more than 8000 vulnerabilities each year, is facilitated with a small discreet unit plugged into your network. It helps find the fixes needed to close the door to hackers and keep on closing them each time they try to open a new way in.
Is the threat real? You decide... IT TAKES AN
AVERAGE OF JUST
15 DAYS FOR A NEW
VULNERABILITY TO BE EXPLOITED
IT TAKES AN AVERAGE OF
103
DAYS
UNTIL KNOWN SECURITY
VULNERABILITIES ARE
REMEDIATED
Fully automated scanning process, requires no technical knowledge
Identifies hacker-friendly weaknesses in your network
Simple to understand Vulnerability reports with remedial steps guidance
No capital expenditure and audit trail to help compliance
Informed from continuously updated threat intelligence database
The scan will identify the problems and offer guidance on what steps are needed to fill the holes – actions needed by you and sometimes by us, if we’re managing your systems. ATLAS provides automated reports that constantly identify the threats and detail the remedial actions. Weaknesses in your system are assessed and graded according to their critical status. The easily accessible reports tell you what to do and you can pass the information to us, to further limit your hands-on involvement in the security process. And remember, maintaining anti-virus/malware applications is critical to your total Information Security strategy, many current sophisticated attacks will defeat these applications. Which should worry you just a little more. ATLAS Vulnerability Scanning of your network, systems, infrastructure and all connected devices will offer the best chance of mitigating the almost inevitable attack, when it happens.
THERE ARE AN AVERAGE OF
VULNERABILITIES
PER ASSET ACROSS A TYPICAL IT ENVIRONMENT
A NEW SECURITY
VULNERABILITY
IS IDENTIFIED EVERY
90 MINUTES
8000 NEW VULNERABILITIES ARE IDENTIFIED EACH YEAR, MANY OF THESE ARE CATEGORISED AS CRITICAL
TITAN
delivers enterprise level managed threat solutions To mitigate the potential financial and reputational damage to your organisation from a successful and sustained cyber-attack, early detection of the threat is critical. In addition to all the daily issues your IT team or our helpdesk team have to cope with, like resetting passwords, installing drivers and fixing conflicts, it is too much to expect them to possess the resources or specialist knowledge to proactively identify daily attacks. Implementing a robust and effective cyber security strategy is both time-consuming and expensive. Recruiting and maintaining the qualifications of specialised security personnel and ensuring they have access to the latest technology is expensive. Can you justify the cost? You are reading this because you recognise the threat is real and you understand the implications to your future of a successful attack. Now it’s just about balancing the cost against the risk. If cost was no concern you would have the best team available sat in your office. But it is a consideration. The answer is to buy-in the expertise when you need it. This ensures you do not have to worry about keeping up to date with the threat environment; that’s taken care of by others.
Intuitive security that gets under your skin Even we do not have the need for a permanent, fully resourced, specialised security team. Which is why we have partnered with Information Security specialists to offer you the benefits of TITAN, a
fully-managed cyber security information and event management solution. With TITAN, you receive the benefits of an enterprise grade detection and response service at a fraction of the cost. It combines the very latest intrusion detection technologies and the latest threat intelligence, all supported by a fully-staffed Security Operations Centre (SOC) running 24/7/365. From the day TITAN plugs into your network, it begins to recognise and make sense of how data flows around your organisation. This identification of normal business as usual patterns is key to evaluating the behaviour of your system and the people that use it. All this information and service availability monitoring, gives the Security Operations Centre team a clear indication of what a network anomaly looks like. If TITAN then discovers large amounts of data being moved out-of-hours, to an unidentified destination, it will raise the alarm. TITAN acts as a virtual extension of your technology infrastructure and relieves pressure on your internal IT team. It also reduces the need for you to recruit specialist internal Information Security personnel; you can leave that worry to us and our security partners. TITAN is the all-seeing, all-hearing eye that never sleeps. It’s only purpose is to keep you, your business and its data safe, dealing with threats from without and within.
Includes 24/7/365 Security Operations Centre staffed by security experts Provides advanced threat detection and threat analysis reporting Monitors and logs network assets to prevent rogue device infiltration Augments existing system and software patch management Fully expandable to match your system growth
Contents Contents Contents Contents 04 05 06 08 08 09 10 12 13 14 15 16
17 18 20 21 22 22 24 26
04 Latest News Latest News 04 04Latest News 05 Quiss People Quiss People 05 05Quiss People 06 Cyber Essentials Plus Cyber Essentials 06 06Cyber Essentials PlusPlus What you need know to get certified you need to know tocertified gettocertified WhatWhat you need to know to get 08 Helping Darlingtons achieve Cyber Essentials Plus Latest News Helping Darlingtons achieve Cyber Essentials 08 08Helping Darlingtons achieve Cyber Essentials PlusPlus How we helped a client become more secure Quiss People HowHow we helped a client become secure we helped a client become moremore secure 08 Profile: Ian Wesley Cyber Essentials Plus Profile: Ian Wesley 08 08Profile: Ian Wesley 09 Help at hand at home What you09 need to know to 09Help Help atget hand at home at hand atcertified home Keeping your family Helping Darlingtons achieve Cyber Essentials Plus safe online Keeping family safe online Keeping youryour family safe online 10 Making more ofwith your Office with Circyl How we helped a client become more secure Making more of your Office Circyl 10 10Making more of your Office with Circyl A review of some new Microsoft apps Profile: Ian Wesley A review of some Microsoft A review of some new new Microsoft appsapps 12 Why outsource your IT support? Help at hand at home outsource IT support? 12 12WhyWhy outsource youryour IT support? Making the case for what we do Keeping your family safe online Making the case for what we do Making the case for what we do 13 Shortcuts for Word 2016 Making more of your Office with Circyl Shortcuts for Word 13 13Shortcuts for Word 20162016 littleyour help to improve your productivity A review of some new Microsoft apps A little help toA improve your productivity A little help to improve productivity 14 Demand increases for ISOcertification 27001:2013 certification Why outsource your IT support? Demand increases for 27001:2013 ISO 27001:2013 14 14Demand increases for ISO certification Why you will see more of these Making the case forWhy what we domore you will see more of these certificates certificates Why you will see of these certificates 15 helps ISO helps certification helps you supply assess your supply chain Shortcuts Word 2016 ISO certification you assess chain 15for15 ISO certification you assess youryour supply chain Don’t rely on words, ask for proof A little help to improve your productivity relywords, on words, askproof for proof Don’tDon’t rely on ask for 16 Stillyou to be convinced you need a unified Demand 16 increases forbe ISO 27001:2013 certification 16Still Still toconvinced be convinced you need a unified to need a unified communications solution? Why you will see more of these certificates communications solution? communications solution? Here’s the magnificent ISO certification helps you assess your supply chain seven Here’s the magnificent seven Here’s the magnificent seven 17 Bigger, stronger Don’t rely17on 17 words, ask for proof Bigger, stronger Legalex for firms law good firmsfor law firms Bigger, stronger Legalex goodgood for Legalex law If you’re going, it’d be good Still to be convinced you need a unified If you’re going, it’dgood be good to you see you to see you If you’re going, it’d be to see 18 Golfing in the rain communications solution? Golfing inrain the rain a change for a change 18 18Golfing in the for afor change The day wasn’t a complete washout Here’s the magnificent seven The wasn’t day wasn’t a complete washout The day a complete washout 20 Home grown talent is a game changer Bigger, stronger Legalex good for law firms Home grown talent is a game changer 20 20Home grown talent is a game changer Nurturing the talent within If you’re going,Nurturing it’d Nurturing be good to see you the talent within the talent within 21 Arrivals: Shelley Vaisey Golfing in the rain for a change Arrivals: Shelley Vaisey 21 21Arrivals: Shelley Vaisey 22 ClientBatemans in the spotlight: Batemans The day wasn’t a complete washout Client in the spotlight: Batemans 22 22Client in the spotlight: 22 Helping our clients to help others Home grown talent is a game changer Helping our clients to help others 22 22Helping our clients to help others Charity begins in the office Nurturing the talent within Charity begins inoffice the office Charity begins in the 24 Disruptive technology andimpact its growing impact Arrivals:24 Shelley Vaisey 24Disruptive Disruptive technology andgrowing its growing technology and its impact Microsoft Future Decoded Client in the spotlight: Batemans Microsoft Future Decoded justyou for you just for you Microsoft Future Decoded just for 26 Case Study: Debenhams Ottaway Helping our clients to help others Study: Debenhams Ottaway 26 26CaseCase Study: Debenhams Ottaway Charity begins in the office Disruptive technology and its growing impact Microsoft Future Decoded just for you Case Study: Debenhams Ottaway
PHI
Enter you
Password
PHISING Enter your name
0606
06
0909
09
1717
17
Password
NEXT
06
09
17
2222
181
18 22
22
Quiss Technology plc. Claymore Tame Valley Industrial Estate Tamworth B77 5DQ
Quiss Techno Quiss Technology Cert No. 1330 Claymore Claymore Cert No. Cert 1330No. 1330 ISO 9001:2008 ISO 9001:2008 ISO 9001:2008 ISO 27001:2013 Tame Valley I Tame Valley Indus ISO 27001:2013 ISO 27001:2013 Tamworth, Tamworth, B77 B7 5D Quiss Technology plc. Claymore Cert No. 1330 ISO 9001:2008 Tel: 0333 222 4334 Tame Valley Industrial Estate ISO 27001:2013 Quiss Technology hasITbeen delivering IT since support we were Email: enquiries@quiss.co.uk Quiss Technology has been delivering IT support services since we weresince Quiss Technology has been delivering support services we services were Tamworth, B77 5DQ Web: www.quiss.co.uk founded in 1988; years oftechnology thetechnology information technology revolution. founded in 1988; the early years ofearly the information revolution. founded in 1988; the early years of the the information revolution.
QuissTec QuissTechPL Toordiscuss content ornext to be part of our please next edition, please To discuss content or topart be part of our next edition, contact the contact the To discuss content toIT besupport of services our edition, Quiss Technology has been delivering since weplease were contact the editor, Tracy Armstrong. Quiss Tec Quiss Techno editor, Armstrong. editor, TracyTracy Armstrong. founded in 1988; the early years of the information technology revolution.