Securing Information
Strengthening Business

£5000 Innovation Vouchers for SME Cyber Security

Innovation-Vouchers Cyber Security

The latest application window forvouchers for up to £5000 to invest in cyber security closed onOctober 22nd 2014. However, it is worth ‘watching this space’ as when applications re-open, Ascentor will publish details on our blog.

The Innovation Voucher scheme run by the UK’s Technology Strategy Board, has been going for some time now. Each round lasts 3 months and thevoucher is worth up to £5000 – and any UK based SME that meets the criteria can apply for one.

If you are considering applying in the future, I hope this article will be of help.

If being more cyber secure would help you grow your business then these vouchers might be for you. The Cyber Security Innovation Voucher is for companies that would get value from investing in some aspect of cyber security such as:

  • Protecting your own information that has significant business value e.g IP of some form
  • Increasing your customer base – by protecting client information to a higher standard than the competition making you a more attractive supplier, or achieving a cyber security standard (27001, IASME, PCI DSS) allowing access to new markets

The voucher is for SMEs, entrepreneurs and early stage start-ups who see value in protecting and growing their business by having effective cyber security.

How to make best use of your cyber security voucher

Why not take advantage of the Innovation Voucher scheme and book yourself an Ascentor Information Risk Management Review . See how IRM could help you face the ever-increasing cyber threat.

As you may know, we are continually banging the drum that the most effective way to improve a company’s cyber security posture is via good governance. Technology is essential but without some structure around what you do to protect yourself from the myriad of cyber based attacks you never really know how effective that technology is at protecting what you care about.

We call this governance piece Information Risk Management . The principles can be applied to any size company and doesn’t mean layers of bureaucracy that stifles agility or unworkable polices that get ignored. Its about making informed and balanced decisions based on the reality of operating a company in the information age where more than ever business success and failure is inescapably linked to technology.

How to apply for a Cyber Security Innovation Voucher

The application process isn’t difficult and is akin to a writing business case. You have a good idea that needs expert external support in one of the priority themes and as long as you haven’t won a voucher before and the expert support is coming from a company you don’t have a business relationship with you should meet the criteria. Then its sit back and wait for the end of the round when a draw takes place and 100 lucky winners are selected who can then use the voucher for its stated purpose.

  1. Go to where there are more guides to download and read, then apply here.
  2. Fill in your company information.
  3. Complete the Your Idea section. This is the business case. If you need any ideas, give me a call and I can talk you through the options. You don’t even have to use Ascentor, although obviously we would be devastated if you went somewhere else!
  4. You’ll also find information on how to find a knowledge supplier. Ascentor is listed and here is the link .The website suggests you may want to use a CESG Listed Advisory Scheme (CLAS) consultant. We have 6 such consultants here at Ascentor.
  5. Next is the “evaluation” which consists of lots of questions about your company but they are all multiple choice.
  6. The final step “Agreements”. Don’t forget to press the “Submit application” button and that’s it. Sit back and wait to find out of you have won.

Good luck with the process if you apply in the future. I’m here to help if you need it (call me on 01452 881712).


For Further Information

If you have any questions about the topics we've covered, or would like to have a chat about any aspect of your own cyber security strategy, please get in touch with the team at Ascentor.

Please use the contact details below - also found on our Contact Us page.


Fields marked with an * are required
Share this:

You may also be interested in:

Building business resilience - through Information Security, Business Continuity and Disaster Recovery

How would you recover if something went drastically wrong with some, or all of your business operations? When we think of worst case scenarios,

Ascentor’s cyber security review of 2020

2020 wasn’t the first year where a virus emerged causing large scale disruption and opportunities for cybercrime. It was, however, the first time

Cyber security myths putting SMEs at risk

SMEs have long been a favourite hunting ground for cyber criminals. Big enough to be of interest in terms of data held and yet often small enough not