Introduction
Cyber Essentials Plus (Level Two) involves tests to determine whether an internet-based attacker can hack into systems. This article focuses on the malicious software checks that are carried out via email and internet browsing. Here, we look into why these tests are done, the benefits, what to expect, and how we help.
Aim of Malicious Software Protection
- To ensure devices have a basic level of protection against malicious software
- This is similar to checking whether a burglar alarm is working correctly to sound an alarm, or whether CCTV is checked to make sure burglars can be spotted and reported
- Common forms of cyberattack (vectors) relate to the delivery of malicious software over email and via internet browsing, so these are checked as part of the testing
Benefits of Malicious Software Protection
- Protect an organisation from ransomware and data breaches
- Identify security flaws before they’re exploited by threat actors
- Highlight and address critical risks that may otherwise go unnoticed
- Close risks before threat actors exploit and abuse them
- Increase protection capabilities from common forms of attack
- Strengthen security posture
- Adhere to regulatory standards and reduce the risk of fines
What to Expect
- Ensure people are available on devices that have been chosen for testing
- Confirm that a test email is received before proceeding with the email testing
- Be prepared to access a special portal for browser-based testing to take place
- Understand that screenshots are required to support evidence collection
- Take action to quickly address any findings
- A special portal is used to help with this testing, containing bespoke software that’s designed to trigger alerts in a safe and controlled manner
- Emails are sent from the portal to check whether an email system can detect malicious software and whether malicious messages are delivered to the recipient or not – this is where spam filtering can be checked
- Internet browsers are checked to determine whether downloads can take place, which would inadvertently infect devices
How We Help
At RB Consultancy Ltd, we support organisations looking to implement controls and/or certify to Cyber Essentials and Cyber Essentials Plus requirements:
- NCSC Cyber Advisor certified – we’re proven to help organisations understand and implement technical controls
- Vulnerability Assessment Plus certified – we have skills and tools to identify weaknesses, risk rank findings to support prioritisation, and provide remediation advice to enable swift action to be taken
- IASME Cyber Essentials Plus Assessor certified – we’ve been tested to assess organisations against the requirements and provide advice on how to apply fixes
- Cyber Essentials Plus Certification Body certified – we’re trusted to issue certificates to organisations who have met the required standards
Conclusion
- Cyber Essentials Plus provides extra assurance that technical controls are in place to prevent common internet-based attacks
- Malware checks are aimed at identifying whether devices have a basic level of protection from malicious software
- Testing focuses on email and internet browsing, which are the common forms of cyber attack vectors
- A special portal is used to facilitate the testing
- Written approval is required to conduct the testing
- Testing can highlight weaknesses that might otherwise go unnoticed
- We offer support and guidance through the whole process
- We’re certified to provide assessment, advice, and certification services
If you would like assistance for Cyber Essentials / Cyber Essentials Plus certification, please contact us for support.