BlogKnowledgeServices

Do You Know Your Pre-Certification Weak Spots?

In Blog, Knowledge, Services on

At Net-Defence we are a trusted Cyber Essentials partner, implementer and practitioner. We provide a five-step service that prepares your business for the Cyber Essentials certification and allows you and your customers to sleep better at night.

To gain a Cyber Essentials certification, you must meet five key requirements:

1) Firewalls

Whatever type of firewall you have, we will make sure your firewall is correctly configured to protect all your devices.

Firewalls can be physical or virtual within a business, the latter being the most popular.

They essentially create a buffer zone between your network and external networks. A firewall protects you and becomes especially important when you have devices that connect to public or untrusted WiFi networks.

2) Secure configuration

We will ensure that every aspect of your software is up-to-date and passwords are correctly implemented.

Having up-to-date software is an essential component of secure configuration. Manufacturers often set up new software to be open and multi-functional for the user. Unfortunately, it is these easily connectable settings that leave your business vulnerable to attacks.

You may spend years using these settings without being aware of the potential consequences.

3) User access control

Our team will perform an in-depth analysis of your user access permissions and adjust them where necessary.

Initially, it is quite common for everyone in a business to have access control to many different aspects of the organization. But as the business grows, you will find that limiting user access control according to job role makes sense.

Contrary to popular belief, directors don’t require access to every aspect of the business. History proves that accounts with enhanced access can be used to promote large-scale corruption when compromised.

Restricting access is absolutely nothing to do with a lack of trust – this step is purely damage limitation control that protects your business from attack.

4) Malware protection

We will make sure that you have the most trusted and robust anti-virus software available.

Malware protection is often as simple as making sure that you have up-to-date anti-virus protection installed. In the current climate, most anti-virus software has this feature built-in.

The WannaCry ransomware attack is the perfect example of what can happen when cybersecurity recommendations are ignored.

For this reason, you must keep your anti-virus protections regularly up-to-date.

5) Patch management

We will ensure that all your devices are up-to-date and protected from vulnerabilities.

Once a patch is released, the patch quickly becomes a roadmap that hackers can exploit.

Therefore, the first step in ensuring in patch management is to perform a Windows Update.

We will also need to make sure that any third-party software like Adobe is up to date. When it comes to updates, it is best to take the bite-sized approach. Rather than update everything at once, your best option is to update regularly over time.

Final Words

A business often has Cyber Essentials near the top of their to-do list. It often comes down to scheduling it in at a suitable time.

You have to identify the disease before you can find the cure. We are here to help you do exactly that!

Getting your business pre-certification ready will ensure that you can prevent and protect against sophisticated attacks. In addition, your customers will be able to sleep more securely at night, knowing that their data is safe with you.

Give us a call on 0330 024 1666 or drop us a message to discuss how we can help you today.