Cyber Essentials: Secure Configuration

Cyber Essentials: Secure Configuration

Introduction Having securely configured devices is a key component of cyber security best practice. This reduces risk and aims to ensure devices are not vulnerable to attack. Whether an organisation is pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, having a secure configuration for devices is a crucial step.   Why […]

Cyber Essentials: Firewalls

Cyber Essentials: Firewalls

Introduction Firewalls play a crucial role in cyber security, acting as the first line of defence against unauthorised access. Whether your organisation is pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, a suitably configured firewalls is a fundamental requirement.   Why Firewalls Are Important A firewall is a security barrier that […]

Cyber Essentials: Gap Analysis

Cyber Essentials: Gap Analysis

Introduction Knowing what an organisation has in place currently (current state) and where it would like to be in the future (target state) is crucial for organisations in planning strategy and defining change. Understanding this ‘gap’ and setting a way forward is a common technique when developing strategy. A similar approach can be taken by […]

NCSC Funded Cyber Essentials Programme: Helping UK Organisations Strengthen Cyber Security

NCSC Funded Cyber Essentials Programme

Introduction Cyber threats are an ever-growing concern for businesses, charities, and professionals across the UK. Recognising the need for stronger cybersecurity, the National Cyber Security Centre (NCSC) launched a Funded Cyber Essentials Programme to help organisations enhance their cyber resilience. This government-backed initiative provides funded expert support to eligible organisations, offering 20 hours of consultancy […]

Cyber Essentials – Willow or Montpellier: What’s The Difference and Why Does It Matter?

Cyber Essentials – Willow or Montpellier What’s The Difference and Why?

Introduction In a world of ever-evolving cyber threats, achieving a robust cybersecurity posture is essential. One way for organisations to ensure their systems are protected from common forms of cyber attack is through the implementation of technical controls relating to the Cyber Essentials scheme. But what do references to ‘Willow’ and ‘Montpellier’ mean when it […]

Cyber Essentials Plus: An Independent Audit

What is Cyber Essentials Plus? An Independent Audit of Cyber Essentials Technical Controls To Benefit Organisations of All Sizes

Introduction In today’s digital age, cyber security isn’t just an IT concern; it’s a necessity. With cyber attacks on the rise, organisations need robust technical controls to protect sensitive data. This is where certifications like Cyber Essentials Plus come into play. But what is it, and why should your organisation care? Let’s break it down. […]