Cyber Essentials, all you need to know.
At Twisted Pair we are fully aware of the range of cyber-attacks that might threaten our business. Hence, we are getting prepared to obtain our Cyber Essentials Certification.
Cyber essentials is a Government scheme that protects any business against the majority of common cyber-attacks. Businesses that haven’t sorted out their cyber essentials technical controls are becoming more vulnerable targets. Therefore, it is important to protect your business and customers’ private information by following this scheme.
Cyber Essentials: Requirements for IT infrastructure.
We are covering all the requirements to obtain the Cyber Essentials Certification. These requirements include 5 technical control themes:
Technical Control Theme | Devices | Objective |
Firewalls | Boundary firewalls; desktop computers; laptop computers; routers; servers; IaaS; PaaS; SaaS. | Guarantee that only safe and necessary network services can be accessed from the internet.
All the devices must be protected by a configured firewall. |
Secure configuration | Servers; desktop computers; laptop computers; tablets; mobile phones; thin clients; IaaS; PaaS; SaaS. | All devices must be configured in order to prevent cyber-attacks. |
User access control | Servers; desktop computers; laptop computers; tablets; mobile phones; IaaS; PaaS; SaaS. | Accounts should be assigned to authorized individuals and access must be allocated according to the user roles. |
Malware protection | Servers; desktop computers; laptop computers; tablets; mobile phones; IaaS; PaaS; SaaS. | Restrict the execution of malware and untrusted software to avoid disruption and unauthorized access. |
Security update management | Servers; desktop computers; laptop computers; tablets; mobile phones; firewalls; routers; IaaS; PaaS; SaaS. | Constantly update devices and software to avoid vulnerabilities. |
You can rest assured knowing that we are taking cyber security measures and that your private information will always be safe.