Cyber Essentials Tag

Cyber Essentials and Cyber Essentials Plus are a set of basic – but fundamental – security requirements which, if implemented correctly, can protect your organisation against 80% of common cyber attacks. Cyber Essentials is a government-backed scheme aimed at small to medium businesses. We covered the...

In the previous blogs in the series, we have explored some of the different types of cyber-attack, how to combat them and the ramifications of not combatting them effectively. In this, the third and final blog of the series, we will take a look at...

As previously mentioned, cyber threats are everywhere and the likelihood of them causing severe - potentially business defining - problems are greater than ever. We have also discussed three of the most prominent cyber-attack methods used by cybercriminals, which are as follows. Ransomware Phishing Malware But,...

Cyber threats are everywhere and are now more likely to cause potentially business-debilitating ramifications than ever before. Cybersecurity is largely about never letting your guard down, being aware and alert at all times. Many do not know how serious of a threat cyberattacks are. The data...

Cyber Essentials - The Objective To prevent harmful code from causing damage or accessing sensitive data. The aim is to do this by restricting the execution of known malware and untrusted software.   What is Malware? “Malware (a portmanteau for malicious software) is any software intentionally designed to cause...

Cyber Essentials – The Objective To ensure that devices and software are not vulnerable to known security issues for which fixes are available. Keeping your devices and software up-to-date is of the utmost importance. If your devices aren’t equipped with the latest protection you are leaving...

Cyber essentials – The Aim of Access Control The objective of Cyber Essentials is – with the assistance of access control – to ensure user accounts only provide access to applications, networks and computers that the user needs to perform their role - the keyword in...

The second of the 5 controls is Secure configuration, which involves making device and software settings as secure as possible. This process requires a very proactive approach to your IT management.   The default security settings ARE NOT the most secure It is often the case that programmes...