Cyber Essentials
Cyber Essentials involves both internal and external tests of your network and computers. Streamline your certification and achieve compliant status quickly with our team
What is Cyber Essentials...?
Cyber Essentials is a globally recognised IT security standard developed by the United Kingdom's National Cyber Security Centre that is used to ensure the security of IT software and processes and the protection of organisations from data breaches.
It provides a guiding framework for large UK organisations, the wider public sector, SMEs, and the general public. When incidents occur, they provide an effective incident response to minimise harm, aid recovery and contribute to building a pro-active security culture.
Build a robust security foundation
Cyber Essentials’ main objective is to guard your business against cyber attacks and the core areas covered in the assessment framework are as follows:
Just some of the ways we help with Cyber Essentials...
Firewalls
- Secure internet-facing devices
- Configure firewalls
- Change default passwords
- Restrict ports
- Allowlist IP addresses
- Isolate admin interfaces
Patch Management
- Use licensed applications only
- Remove unsupported software
- Automate security updates
- Regularly update all software, firmware and Operating Systems
- Apply patches within one week for CVSS >7
Secure Configuration
- Keep updated inventory of devices and applications
- Remove unnecessary software
- Secure device configurations with strong passwords
- Enforce authentication for system access
User Access Control
- Approve new user accounts via policies
- Remove unnecessary accounts
- Enterprise grade password management solutions
- Enhance security for admin accounts
- Remove local admin rights without hindering employees
- Prevent lateral movement
- Mandate MFA login for all critical applications
Malware Protection
- Daily malware updates
- Automatic web and email scanning, blocking suspicious sires
- Regular reviews of application allow lists
- Prevent unapproved software installations
- Isolate malicious code
- Isolate infected devices upon detection
- Extend malware protection to your entire estate
This website uses cookies