cyber security FAQ IT Security IT support Technology
10 steps to cyber security cesg

Are your IT systems secure?

With the ability for staff to work from home and a new cyber attack in the news each week, what is protecting your systems?  Threats come in a number of forms, from hardware/software failure, user error or malicious act by internal or external persons.   The ability to protect the critical data from these threats is constantly evolving. 

In 2012, the UK Government’s department of Business Innovation and Skills (BIS) and the Cabinet Office and GCHQ published guidance on the 10 steps to cyber security.  They also introduced a Cyber Essentials and Cyber Essentials Plus standard in order to provide good practice & certification that companies can use to show other companies they are achieving the required standard.

The Cyber Essentials covers 5 key areas:

  • Secure Configuration
  • Boundary firewalls and internet gateways
  • Access control and administrative privilege management
  • Patch management
  • Malware protection

For the Cyber Essentials plus the assessment also required an internal and external vulnerability scan each year.

Many businesses which work with local government are required to achieve the Cyber Essentials standard as part of the tender process.

For more information regarding the 10 steps required:

Since the standard has been established, we have helped many clients achieve and maintain the requirements.

As well as trying to stay one step ahead of the threats, overall, we have found that the key to any security system we have provided, is that users understand that their role is essential in preventing any threat. 

Backups, Good password practices, least privilege and multi factor authentication are relatively of little use if the end users are not trained or given the ability to improve their security awareness through training which helps to identify the areas which they need training on. 

Working with a trusted partner can help to prevent your staff falling for some of the threats which we see on a daily basis.  If you would like to know more contact us now.