Cyber Essentials Plus: Missing Security Patches

Cyber Essentials Plus: Missing Security Patches

Introduction With the pace of technology accelerating, staying on top of security vulnerabilities is crucial for organisations of all sizes. Security updates are released on a regular basis, aimed at reducing risk and closing system weaknesses. Cyber criminals are constantly looking to exploit weaknesses for nefarious gain, so a holistic approach to applying security patches […]

Cyber Essentials Plus: Windows SMB Version 1 (SMBv1) Detected

Cyber Essentials Plus: Windows SMB Version 1 (SMBv1) Detected – Learn why SMBv1 is a security risk and how to disable it for better protection.

  Introduction With cyber threats constantly evolving, staying ahead of vulnerabilities is crucial. One significant, yet long-standing vulnerability relates to Windows Server Message Block Version 1 (SMBv1). This outdated protocol allows attackers to gain unauthorised access to systems, posing a serious risk to security. Cybercriminals can use this weakness to infiltrate your network, steal sensitive […]

Cyber Essentials Plus: WinVerifyTrust Vulnerability

WinVerifyTrust: the vulnerability, why it matters, multiple remediation options and importance for Cyber Essentials Plus certification.

  Introduction With cyber based threats evolving at an unprecedented pace, one (long-standing) vulnerability that continues to demand attention is WinVerifyTrust. This allows cybercriminals to cause damage by installing malicious software in files and disguise it as a ‘trusted software update”. By addressing this flaw, unauthorised access can be prevented, along with data breaches and […]

Cyber Essentials Plus: What Does The Audit Involve?

Cyber Essentials Plus: What Does The Audit Involve?

  Introduction Cyber Essentials Plus (Level Two) is a technical audit of IT systems. It’s based on the same technical requirements of Cyber Essentials (Level One) and is a way to verify the controls are in place and operating effectively. It can provide more assurance to organisations regarding the risks associated with internet-based threats. The […]

Cyber Essentials: Can ‘Out of Support’ Software be Used?

Cyber Essentials Out of Support Technology

Introduction Technical debt and out of support software can be a challenge when considering Cyber Essentials certification. This summary demystifies the topic, with advice, explanation and an example – aimed to help and inform. In this article, we consider why technology may be a challenge to replace, urge organisations to plan for the replacement of […]

Cyber Essentials: Malware Protection

Cyber Essentials Malware Protection

Introduction Deploying malicious software (like ransomware) is just one way that cyber criminals can impact organisations and people – having suitable protection in place is key to good cyber security posture. It helps to prevent malicious software from appearing on devices and running – effectively aimed at preventing damage and impact. Here, we explore the […]

Cyber Essentials: User Access Control

Cyber Essentials: User Access Control

Introduction User access control is a fundamental aspect of Cyber Essentials, ensuring that only authorised individuals have access to sensitive systems and data. Effective access control measures significantly reduce the risk of data breaches and cyber attacks by limiting unnecessary exposure to critical information. In this article, we explore the importance of user access control, […]

Cyber Essentials: Security Updates

Cyber Essentials: Security Updates

Introduction Keeping devices secure with vendor-provided updates is key for cyber security best practice. It helps prevent unauthorised access and helps keep devices safe from harm. Whether pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, applying security updates is a crucial step. In this article, we explain why security updates are […]

Cyber Essentials: Secure Configuration

Cyber Essentials: Secure Configuration

Introduction Having securely configured devices is a key component of cyber security best practice. This reduces risk and aims to ensure devices are not vulnerable to attack. Whether an organisation is pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, having a secure configuration for devices is a crucial step. In this […]

Cyber Essentials: Firewalls

Cyber Essentials: Firewalls

Introduction Firewalls play a crucial role in cyber security, acting as the first line of defence against unauthorised access. Whether your organisation is pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, a suitably configured firewalls is a fundamental requirement. In this article, we explain why firewalls are so important, make consideration […]