Cyber Essentials Plus: Account Separation

Introduction Cyber Essentials Plus (Level Two) is a technical audit that demonstrates protections are in place to guard against the most common forms of cyberattacks. Here, we focus on account separation checks, explaining why these tests are carried out, the benefits, what to expect, and how we help. Aim of Account Separation Testing […]
Cyber Essentials Plus: Multi-factor Authentication

Introduction Cyber Essentials Plus (Level Two) is a technical audit that demonstrates protections are in place to guard against the most common forms of cyberattacks. Here, we focus on multi-factor authentication and account separation checks, explaining why these tests are carried out, the benefits, what to expect, and how we help. Aim of […]
Cyber Essentials Plus: Malicious Software Protection

Introduction Cyber Essentials Plus (Level Two) involves tests to determine whether an internet-based attacker can hack into systems. This article focuses on the malicious software checks that are carried out via email and internet browsing. Here, we look into why these tests are done, the benefits, what to expect, and how we help. […]
Cyber Essentials: User Access Control

Introduction User access control is a fundamental aspect of Cyber Essentials, ensuring that only authorised individuals have access to sensitive systems and data. Effective access control measures significantly reduce the risk of data breaches and cyber attacks by limiting unnecessary exposure to critical information. Here, we explore the importance of user access control, why it’s […]
Cyber Essentials: Security Updates

Introduction Keeping devices secure with vendor-provided updates is key for cyber security best practice. It helps prevent unauthorised access and helps keep devices safe from harm. Whether pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, applying security updates is a crucial step. Why Security Updates Are Important Devices that run […]
Cyber Essentials: Firewalls

Introduction Firewalls play a crucial role in cyber security, acting as the first line of defence against unauthorised access. Whether your organisation is pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, a suitably configured firewalls is a fundamental requirement. Why Firewalls Are Important A firewall is a security barrier that […]
Cyber Essentials: Scoping

Introduction Cyber Essentials is a UK government-backed scheme and the recommended minimum baseline cyber security standard for organisations – it aims to protect organisations from the most common forms of internet-based attacks. One of the first steps in achieving Cyber Essentials is scoping – this defines what systems, devices, and networks are covered under the […]
NCSC Funded Cyber Essentials Programme: Helping UK Organisations Strengthen Cyber Security

Introduction Cyber threats are an ever-growing concern for businesses, charities, and professionals across the UK. Recognising the need for stronger cybersecurity, the National Cyber Security Centre (NCSC) launched a Funded Cyber Essentials Programme to help organisations enhance their cyber resilience. This government-backed initiative provides funded expert support to eligible organisations, offering 20 hours of consultancy […]
Cyber Essentials – Willow or Montpellier: What’s The Difference and Why Does It Matter?

Introduction In a world of ever-evolving cyber threats, achieving a robust cybersecurity posture is essential. One way for organisations to ensure their systems are protected from common forms of cyber attack is through the implementation of technical controls relating to the Cyber Essentials scheme. But what do references to ‘Willow’ and ‘Montpellier’ mean when it […]
Cyber Essentials Plus: An Independent Audit

Introduction In today’s digital age, cyber security isn’t just an IT concern; it’s a necessity. With cyber attacks on the rise, organisations need robust technical controls to protect sensitive data. This is where certifications like Cyber Essentials Plus come into play. But what is it, and why should your organisation care? Let’s break it down. […]