ATET Security

Cyber Essentials Mark (CEM)

Cyber Essentials mark is a cybersecurity certification scheme developed by the Cyber Security Agency of Singapore (CSA) for organizations that are embarking on their cybersecurity journey. It is catered for Small and Medium Enterprise (SMEs) which starting their digitalization and cybersecurity journey with limited IT and cybersecurity resources.

ATET offer comprehensive CISO as a service to assist SMEs to attain this cybersecurity certification by ensuring the presence of good cyber hygiene practices. It is essential that organizations can ensure and demonstrate robustness of their cyber security measures, which serve business assurances to partners and customers.

We help in these five aspects:

ASSETS

Cyber awareness and training for employees, as people are the first line of defense, recognize the hardware and software of your organisation, critical data, understand valuable assets, and secure them.

SECURE/PROTECT

Introducing malware and virus protection. Managing and controlling access to your data and services. Ensure secure configuration is placed in organisations.

UPDATE

Keep software, operating systems, and digital infrastructure up to date. Patch against known vulnerabilities and threats.

BACKUP

Implement reliable backups for your data and store them securely.

RESPOND

Enabling incident detection and being able to respond to and recover from cyber incidents

Enhanced Cyber Essentials Mark (Enhanced CEM)

The enhanced Cyber Essentials Mark equips organisations in Singapore with the security controls and best practices to address emerging cyber risks in key areas:

The Key areas

bf9c734b16a524ba271026198d9fafaf159a7bcf

Cloud Security

Ensure secure cloud adoption and management by:

  • Reviewing Cloud configurations and access policies
  • Managing shared responsibilities with Cloud providers
  • Strengthening user-level protections to prevent data exposure
bdc52f407d39a8e2f402e0bee1b5bba93040a5ec

Operational Technology (OT) Security

Protect industrial control systems (ICS) and physical infrastructure through:

  • Network segmentation between IT and OT environments
  • Restricting and securing remote access
  • Implementing physical and logical safeguards for OT assets
47a81919122688dd99c54c9d0847f010a25aeab0

AI Security

Support safe and responsible AI use in your organisation by:

  • Identifying and managing third-party AI tools used by staff (e.g., ChatGPT, Copilot)
  • Reducing risks of sensitive data leakage via AI applications
  • Enhancing visibility and control over AI integrations in your workflows

Why Add Enhanced CEM?

  • Establish or strengthen your cybersecurity foundation
  • Address modern risks across Cloud, OT, and AI environments
  • Align with CSA’s latest guidelines for emerging threat areas
  • Demonstrate maturity and commitment to clients, partners, and regulators

Ready to Upgrade?

Let us support your journey with Enhanced Cyber Essentials.
 Our team will assess, guide and implement the necessary controls to help you achieve CSA’s updated certification.

Our support team of cybersecurity experts is available 24/7

Why us?

Cybersecurity in ATET is about:

1. Securing the business, not just the technology
2. Risk-based approach to ensure effort commensurate
3. Providing security is a process, not just a product

Start With A Free Consultation

Allow us to provide you a free, no-obligation consultation so that you can get an overview of your existing security posture, including a clear indication of your strengths and any potential weaknesses, as well as a grade.

Select your Tier

In order for us to direct you to the appropriate package, please let us know how many endpoints does your organisation have
(Note: Endpoints are laptops, desktops, tablets, corporate handphones, servers, virtual machine)

For 1-10 Endpoints, Click here
For 11-20 Endpoints, Click here
For 21-50 Endpoints, Click here
For 51-100 Endpoints, Click here
For 101-200 Endpoints, Click here

Select your Tier

In order for us to direct you to the appropriate package, please let us know how many endpoints does your organisation have 
(Note: Endpoints are laptops, desktops, tablets, corporate handphones, servers, virtual machine). Funding support right now is based on the value from CISOaaS (Cyber Essentials)

 
For 1-10 Endpoints, Click here
For 11-20 Endpoints, Click here
For 21-50 Endpoints, Click here
For 51-100 Endpoints, Click here
For 101-200 Endpoints, Click here