Cyber Secure Tag

In the previous blogs in the series, we have explored some of the different types of cyber-attack, how to combat them and the ramifications of not combatting them effectively. In this, the third and final blog of the series, we will take a look at...

As previously mentioned, cyber threats are everywhere and the likelihood of them causing severe - potentially business defining - problems are greater than ever. We have also discussed three of the most prominent cyber-attack methods used by cybercriminals, which are as follows. Ransomware Phishing Malware But,...

Cyber threats are everywhere and are now more likely to cause potentially business-debilitating ramifications than ever before. Cybersecurity is largely about never letting your guard down, being aware and alert at all times. Many do not know how serious of a threat cyberattacks are. The data...

Cyber Essentials - The Objective To prevent harmful code from causing damage or accessing sensitive data. The aim is to do this by restricting the execution of known malware and untrusted software.   What is Malware? “Malware (a portmanteau for malicious software) is any software intentionally designed to cause...

Cyber Essentials – The Objective To ensure that devices and software are not vulnerable to known security issues for which fixes are available. Keeping your devices and software up-to-date is of the utmost importance. If your devices aren’t equipped with the latest protection you are leaving...

Cyber essentials – The Aim of Access Control The objective of Cyber Essentials is – with the assistance of access control – to ensure user accounts only provide access to applications, networks and computers that the user needs to perform their role - the keyword in...

The second of the 5 controls is Secure configuration, which involves making device and software settings as secure as possible. This process requires a very proactive approach to your IT management.   The default security settings ARE NOT the most secure It is often the case that programmes...

Firewalls are one of the 5 key components required to achieve the Cyber Essentials certification. Let us take a look at how firewalls work, the different types and the various ways to configure them to ensure you satisfy the requirements of Cyber Essentials. Before we...

Cyber Essentials is a government backed scheme designed to help businesses protect themselves from some of the most common online threats. Since its introduction in 2014, 30,000 businesses have been awarded the highly regarded certification. In order to pass and achieve certification you must prove your...