What is Cyber Essentials
The Cyber Essentials scheme is a set of baseline technical controls produced by the UK Government and industry to help organisations, large and small, public and private, improve their defences and demonstrate publicly their commitment to cyber security.
The Cyber Essentials scheme addresses the most common internet-based attacks that use widely available tools and that need very little skill for the attacker to use.
The scheme helps organisations to protect the confidentiality, integrity and availability of data stored on devices which connect to the internet.
There are two certifications available for the Cyber Essentials Scheme.
Cyber Essentials, is a self assessment questionnaire that is submitted to us for assessment.
Download self assessment questionnaire here
Cyber Essentials Plus, is a assessment that is audited by a certification body like ID Cyber Solutions.
Note: For both certifications you must meet the same Cyber Essentials requirements.
Download Cyber Essentials requirements Document here
Cyber Essentials for your organisation starts here
Five controls that you can put in place today.
The Cyber Essentials Scheme requires all devices that are connected to the internet are to be protected with a firewall. This effectively creates a ‘buffer zone’ between your IT network or device and other, external networks. In the simplest case, this means between your computer (or computers) and ‘the Internet’.
Most manufacturers supply their hardware and software with a default configuration that makes it quick and easy to start using the product. Leaving the settings this way makes it easier for cyber attackers to gain access to your data.
To reduce the possibility of an attacker infecting your devices , user accounts should only have access to software, settings to perform the role intended. Admin permissions should only be given to those who need them.
All devices including laptops, PC's, phones and tablets, unless protected are open to attacks using malware. Viruses and malware like the ones used in the wannaCry attack in 2017, can infect devices and software and can quickly infect any other devices or software that is connected to it.
It is important that all phones, tablets, laptops or computers are kept up to date at all times. This is true for both Operating Systems and installed apps or software. Manufacturers and developers release regular updates which not only add new features, but also fix any security vulnerabilities that have been discovered.
What are the advantages of certification
- Reassure customers that you are working to secure your IT and their data against cyber attack
- Attract new business with the promise you take cyber security seriously
- Build a relationship with a trusted IT supplier
- Certain local & national government contracts require Cyber Essentials certification