email@example.com London – 020 305 68855 Cornwall – 01726 247047
Cyber Essentials is a simple but effective, Government backed scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber attacks.
Cyber attacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. They’re the digital equivalent of a thief trying your front door to see if it’s unlocked. Our advice is designed to prevent these attacks.
Cyber Essentials Plus still has the Cyber Essentials trademark simplicity of approach, and the protections you need to put in place are the same, but this time the verification of your cyber security is carried out independently by us.
Cyber Essentials can help with your GDPR compliance but it’s not a solution for all your GDPR obligations. It’s also important to realise that the information security which GDPR requires extends beyond cyber security to include things like the physical and organisational security measures necessary to protect personal data.
We can add Cyber Essentials Plus onto your GDPR services.
Cyber Essentials brings many advantages to your organisation.
Reassure your customers/ clients that you take cyber security seriously.
Be listed in the Cyber Essentials Directory of organisations
Attract new business with the promise you have cyber security measures in place
You should protect your Internet connection with a firewall. This effectively creates a ‘buffer zone’ between your IT network and other, external networks. In the simplest case, this means between your computer (or computers) and ‘the Internet’. Within this buffer zone, incoming traffic can be analysed to find out whether or not it should be allowed onto your network.
To minimise the potential damage that could be done if an account is misused or stolen, staff accounts should have just enough access to software, settings, online services and device connectivity functions for them to perform their role. Extra permissions should only be given to those who need them.
Malware is software or web content that has been designed to cause harm. For example, the Wannacry attack used a form of malware which makes data or systems unusable until the victim makes a payment. Viruses are the most well-known form of malware. These programs infect legitimate software, make copies of themselves and send these duplicates to any computers which connect to their victim.
Registration number: 10427754. Registered office: Central Point, Beech Street, London EC2Y 8AD.
VAT Registration number: 285986235