Select Page

Managing the security impact of COVID-19 and the increased cyber security threat.

Few could predict how quickly the remote working revolution would take place. The fast enablement of remote working for entire organisations exposed cyber security vulnerabilities within the IT infrastructure.

SCC’s security approach begins with an effective program to understand the maturity of your organisation’s security strategy. This will lead to the implementation of the right tools and security controls for provision of continuous monitoring and incident response. Our aim is to mitigate legal and financial risk and to also remove any potential damage to your reputation.

Gartner’s recent publication, 7 Security Areas to Focus on During COVID-19, discusses the principal concerns for IT security teams. The report looks at how organisation’s don’t fall foul of increased cyber-attacks as a direct result of the pandemic. As we all get used to working in completely different environments, would-be cyber criminals look to capitalise on this new way of working.

Gartner: 7 Security Areas to Focus on

Ensure that the organisation’s incident response protocols reflect the altered operating conditions and are tested early.

Ensure that all remote access capabilities are tested and secure and endpoints used by workers are patched.

Reinforce the need for remote workers to remain vigilant to socially engineered attacks.

Ensure security monitoring capabilities are tuned to have visibility of the expanded operating environment.

Engage with security services vendors to evaluate impacts to the security supply chain.

Account for cyber physical systems security challenges.

Don’t forget employee information and privacy.

What our customers say


The nature of our business demands a close attention to detail and achievement of deadlines plus a need for flexibility in the light of changing demands. SCC currently meets our expectations as a partner and provision the necessary assistance on a day to day basis. They also work with us on planning future operations and responses to the IT demands of the MBDA business.


Alan Wood
Information Management CS&I, IT Operations Manager

Secure Trust Bank

We have a track record of successfully integrating businesses into STB Group, therefore it’s crucial we remain flexible so that when opportunities arise our IT strategy is an enabler rather than a blocker to growth. What helped SCC win our business was their approach to both the bid process and how they would manage the initial operation.


Roy Aston
Chief Technology Officer
Secure Trust Bank


SCC is a key strategic partner for Gist. We have had a long standing and trusted relationship and we consider them an incredibly safe pair of hands for the levels of service and support that Gist requires them to provide on our complex and mission-critical IT infrastructure.


Mike Hornby
Head of IT



Supply and Implement

Our approach



Challenges we see

Remote working

Enablement of remote working for entire organisations


The need to maintain business-as-usual operations whilst protecting employees, partners and customers.


Skill gaps of IT security staff with entire workforces having to work remotely, increasing vulnerability.


The biggest risk to any organisation’s IT security is its people, with human error, lack of training or not enough awareness of the latest techniques used by cyber criminals.


An increase in outsourced IT security functions post-COVID-19 can be expected, as businesses look to experienced partners to cope with the enhanced threat.

Risks and impact

Security of your people, processes and technologies as any security breaches may now have an even bigger impact than pre-COVID-19, economically and reputationally.

Security Brochure

Managing the security impact of COVID-19

SCC Security Brochure

Download SCC’s most recent Security brochure which includes results from our pre- and post- COVID-19 Security IT Insights survey in which we surveyed 550 IT decision-makers from 11 different sectors, both public and private, about the impact of COVID-19 on IT security.




Want to learn more?

Get in touch today

How we might use your information

We may contact you by phone or email, if you have not opted out, or where we are otherwise permitted by law, to provide you with marketing communications about similar goods and services, the legal basis that allows us to use your information is ‘legitimate interests’. If you’d prefer not to hear from us you can unsubscribe here. More information about how we use your personal data can be found in our Privacy Policy.