Twisted Pair Technologies

Complete Data, Connectivity & Voice Solutions

|

02920 099966

Cyber Essentials, all you need to know.

Posted on By
Cyber Essentials

At Twisted Pair we are fully aware of the range of cyber-attacks that might threaten our business. Hence, we are getting prepared to obtain our Cyber Essentials Certification. 

Cyber essentials is a Government scheme that protects any business against the majority of common cyber-attacks. Businesses that haven’t sorted out their cyber essentials technical controls are becoming more vulnerable targets. Therefore, it is important to protect your business and customers’ private information by following this scheme. 

 

Cyber Essentials

Cyber Essentials: Requirements for IT infrastructure. 

We are covering all the requirements to obtain the Cyber Essentials Certification. These requirements include 5 technical control themes: 

Technical Control Theme  Devices  Objective 
Firewalls  Boundary firewalls; desktop computers; laptop computers; routers; servers; IaaS; PaaS; SaaS.   Guarantee that only safe and necessary network services can be accessed from the internet. 

All the devices must be protected by a configured firewall. 

Secure configuration  Servers; desktop computers; laptop computers; tablets; mobile phones; thin clients; IaaS; PaaS; SaaS.  All devices must be configured in order to prevent cyber-attacks. 
User access control  Servers; desktop computers; laptop computers; tablets; mobile phones; IaaS; PaaS; SaaS.   Accounts should be assigned to authorized individuals and access must be allocated according to the user roles. 
Malware protection  Servers; desktop computers; laptop computers; tablets; mobile phones; IaaS; PaaS; SaaS.  Restrict the execution of malware and untrusted software to avoid disruption and unauthorized access. 
Security update management  Servers; desktop computers; laptop computers; tablets; mobile phones; firewalls; routers; IaaS; PaaS; SaaS.   Constantly update devices and software to avoid vulnerabilities. 

 

You can rest assured knowing that we are taking cyber security measures and that your private information will always be safe. 

Reliable Mobile Phone Solutions for Sole Traders Access Points: Maximizing Your Connectivity  WIFI a guide to Wireless Standards Fibre Optic Revolution: Igniting Connectivity

Privacy Preference Center

Necessary

Analytics tracking like user duration frequency of visit.

_ga, _gat, _gid
_ga, _gat, _gid

Advertising

Analytics

GPDR

To track consent for cookies etc

gdpr[allowed_cookies], gdpr[consent_types]