IT Security News 11 November 2019

What is Cyber Essentials?

Ensure your IT meets the required security controls with a Cyber Essentials certification

Anthony Roberts, Infrastructure Manager, Fabric

Cyber Essentials is a scheme backed by the government. It aims to help businesses protect themselves against online threats and also demonstrates their commitment to cybersecurity.

Attaining Cyber Essentials gives customers the reassurance that their security will be a high priority against a cyber-attack.

Cyber Security

 The process of certification

  1. Select a certification body
  2. Ensure your IT estate meets the required security controls
  3. Complete the Cyber Essentials questionnaire

Read 4 simple ways to secure your network

Cyber Essentials logo

Cyber Essentials focus on the following technical controls:

Securing the internet connection

The internet connection should be protected with a firewall device that will monitor all incoming and outgoing network traffic. It also needs to block any malicious traffic. This is based on a set of security rules and access control lists.

Firewalls are the first line of defence between the internet (untrusted network) and the internal network (trusted network).


Securing devices and software

Manufactures will set default configurations of their software and hardware to be as open as possible to improve functionality. These settings can, unfortunately, be used by cyber attackers.

Standard settings within hardware should be checked and removed.

Controlling access to data and services

Giving staff members limited access to the system to perform their role will help prevent/minimize the damage which would be caused if the account becomes compromised.

Administrative account access should be reviewed often and should only be used to perform administrative functions. Standard user accounts should be used for general work.

All software installed on the system should be from approved manufacturers or official stores; this will ensure the software is malware-free.

Protecting from viruses and other malware

There are numerous ways that a computer or system can become infected with malware; this may be through an email, a malicious website or a USB memory stick.

All computers should have anti-virus/malware software configured; I would recommend Microsoft Intune along with Windows Defender.

Advanced Threat Protection can also be used to stop malware arriving by either an email link or an attachment. It achieves this by opening the link or attachment in a “detonation chamber” or sandboxed environment to analyze the results to determine if it is malicious.

Computer virus

Keep your devices and software up to date

Malicious attackers always find software vulnerabilities and flaws within operating systems and other software on the network. Applying these fixes and patches should happen every 30 days and is a crucial way of protecting the internal systems.

All applications have a supported lifespan. When this is reached, manufacturers will no longer support the software or hardware. In some cases, planning is required to replace an alternative. 

Want to read more? Discover what Microsoft Secure Score is and how to analyse the configuration of your Microsoft Cloud and on-premise solutions.

Anthony Roberts, Infrastructure Manager, Fabric

Get in touch Back to blog