Your Cyber Security starts here.
The all in one, Cyber Security Risk Assessment platform.
The easier, more effective alternative to assessing and managing your cyber risk. No setup required. Instant results.
EDIT Cloud simplifies and combines the core cyber risk assessment tools into a user friendly, hassle free online platform.
Data Breach Monitor
Cyber Assessments
Vulnerability Scans
Policy Templates
Actionable insights
Baseline your cyber security
with instant insights and improvement plans.
How it works
One click registration allows you to create an account and begin securing your business in seconds.
1. Take an Assessment
Baseline your cyber security using our CIS and Cyber Essentials framework assessments.
2. Add your users and IPs
Add your email and IP addresses to the EDIT Cloud portal.
3. Monitor and Protect
Active monitoring and vulnerability scanning keeps you in the know, allowing you to stay one step ahead of attackers.
Try EDIT Cloud free
Assess. Scan. Monitor.
Cyber Risk Assessments. Simplified
Why choose EDIT Cloud
The only platform of its kind. A unique offering of the essential cyber risk tools, all in one place!
Designed for simplicity. The easiest way to manage your cyber risk.
Actionable insights and reports on your risk level, vulnerabilities and data exposure.
To most cost effective solution to managing cyber risk.
FAQs
Simply choose between Cyber Essentials or CIS Cyber assessment frameworks and complete your assessment. The questions are tailored around the specific controls of each framework. At the end of the assessment you’ll receive a breakdown of scores for each control with a list of actionable items to achieve 100% compliance. Your scores are adjusted as you implement the suggestions and mark them as complete.
A “breach” is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software
Our service will search repositories and databases of information collected on known data breaches, to detect whether your information has been exposed. Detections and details are listed against the affected email address.
Yes. Active monitoring starts as soon as you add an email address to our breach monitoring service.
We provide details on the source of the data breach, a description of the leak, dates, number of users impacted, and the data types that were exposed (usernames, passwords, etc.)
No. For security reasons, passwords are not retrieved or stored in our databases.
Breached data is lifted almost exclusively from underground sites and marketplaces, commonly known as the dark web. The information returned by our searches is from known and confirmed data breaches.
When you search for an email address, you may see that address appear against breaches of sites you don’t recall ever signing up to. There are many possible reasons for this including your data having been acquired by another service, the service rebranding itself as something else or someone else signing you up.
No. Once a data point such as a password or credit card number has been exposed to the internet, it’s no longer safe. It could have been shared and downloaded thousands of times on underground sites. Using a detection service provides insight into your compromised data and allows you to take action to mitigate the risk.
Vulnerability scanning is the process of scanning a network or system to identify any existing security vulnerabilities. It is a proactive measure used to detect any weaknesses that an attacker may exploit to gain unauthorised access to a system or network.
We conduct vulnerability scanning on your selected public IP addresses, scans are carried out according to your plan frequency. Reports are uploaded into the vulnerability scanning app. An email alert will be generated when a new report is available.
A vulnerability scan is a proactive security practice that helps you identify common vulnerabilities and exposures (CVEs) on your networks. The scanner needs to freely scan each port to be able to identify areas of weakness and exposures. Intrusion prevention systems and firewalls often block vulnerability scanners as they scan a network. This is great for unwanted traffic, but a scheduled vulnerability scan is not unwanted traffic. The scanner will only be able to see public facing open ports, by whitelisting the IP you are allowing the scanner to freely check those ports.
Hackers typically won’t run a scan against your network to check for open ports, they will target known vulnerabilities on specific ports. If your firewall stops the scanner from running it only stops potential vulnerabilities from being identified, leaving them open to exploitation.
Each plan provides with a maximum number of IPs and scan frequency. Paid plan users can upgrade the number of IPs or change the scan frequency. Please contact us to find out more.
The frequency of scans will depend on the size, nature and role of the network. It is recommended to conduct scans every 1-3 months.
What about user training and phishing simulations?
We can help you with that too. Alongside our cyber security risk assessment platform we have a full user cyber training suite, offering simulated phishing campaigns and 100+ micro training courses.
Humans are targets
84% of data breaches and attacks involve phishing.
Humans make mistakes
Human error is a key factor in over 90% of data breaches.
Compliance is essential
Key standards like ISO 27001 and CIS require regular security awareness training.
Transform employees into your first line of defence
With our Human Risk Management (HRM) platform