NCSC Cyber Essentials Certification

by Andre Vaux

Andre is Managing Director at claireLOGIC - a business which delivers IT and Communications services to businesses in the UK.

 

Cyber Essentials, for us it's... essential.

We’re pleased to announce that we have gained our Cyber Essential status, within the UK Government’s National Cyber Security Centre (NCSC) framework.

The requirements for our IT infrastructure – within this framework – cover five core technical principles; these are:

  • Firewall protection
  • Security configuration
  • User access control management
  • Malware protection
  • Patch management

What is covered under Cyber Security Essentials

Each of the above is defined and applied to the following:

  • Software including operating systems, commercial off-the-shelf applications, plugins, interpreters, scripts, libraries, network software and firmware.
  • Devices including all types of hosts, networking equipment, servers, networks and end-user equipment such as desktop computers, laptop computers, tablets and mobile phones (smartphones) — whether physical or virtual.
     CyberEssentials_Scope_RequirementsITInfrastructure

As a certified Cyber Security Essentials organisation we instil the importance of all technical security parameters covered within the scope of the certification to our clients.

The importance of a Firewall

It is essential that all organisations have a robust and up-to-date firewall. A firewall protects your network or system from unauthorised access – and is your first line of protection from inbound harm.

In conjunction with products like Cisco umbrella, Secure Internet Gateways offer a solid secure fence around your core IT and communications infrastructure.

The importance of your security configuration

It is incredibly important to have a team of professionals who can affectively map-out your Security Configuration policies – as well as being able to implement and manage these configuration standards within your organisations' IT environment.

The importance of user access management

Access management is the important process of granting your authorised users the right to use a service, piece of hardware or software – whilst preventing access to non-authorised users. It is the most important internal security process as it mitigates the risk of human error, and purposeful deliberate user harm against your business set-up.

The importance of malware protection

As a robust firewall is your first line of defence, anti-virus and endpoint security software protects individual users and computers from harm caused by hackers, dubious files and downloads – as well as threats from your users visiting suspect websites, which can cause serious harm to your systems.

The importance of patch management

‘Patching’ is the important process of repairing vulnerabilities within your system, both from an operating system perspective, as well as patching individual software applications and your website architecture; if ignored you are essentially highlighting security weak-spots for scammers and cyber criminals.

Don’t leave the back door open… update your system when prompted. Your IT system is only as secure as its last update.

 


 

Getting help with your cyber security

 

We don't need to tell you about the importance of making sure your systems, users and data is secure – however, traversing all of the technical requirements to ensure this, can be very complicated.

Talk with the experts – claireLOGIC work with people like you everyday, ensuring you're safe and secure.

Call us today on 01865 601000 or email one of our friendly team hello@clairelogic.net

 

Unknown-9

02-Apr-2019 10:54:03

We regularly share informative content on the latest trends, best practice and things to watch out for…