01795 255 600
Posted 7 months ago by Liam Kingsnorth

What is Cyber Essentials?

A background to Cyber Security

In 2012, HM Government launched the 10 Steps to Cyber Security guide. This guide was published to inspire organisations to reflect their cyber security measures, and to establish whether organisations thought they were managing their cyber risks appropriately.

The 10 steps created great awareness in industry but after careful analysis the government discovered that a number of security controls were still not being implemented effectively, hence the Cyber Essentials scheme and its requirements being born.

What are the 10 steps?

  1. Information risk management regime –
  2. Managing user privileges - limit user privileges and monitor user activity
  3. Incident management – Incident response and disaster recovery capabilities
  4. Monitoring – Continuously monitor all systems and network logs for unusual activity
  5. Home and mobile working – Implement mobile working policies and train staff to adhere
  6. Secure configuration – Security patch and configuration management
  7. Removable media controls – Implement policies to control access to all removable media
  8. Malware prevention – Establish anti-malware defences across your organisation
  9. User education and awareness – Staff awareness training
  10. Network security – Monitor and test all security controls

What is Cyber Essentials?

Cyber Essentials is a government-backed, industry-supported scheme that provides a set of technical controls to help organisations protect themselves against common online security threats. The Cyber Essentials scheme is suitable for all organisations, of any size, in any sector.

From 1 October 2014, Government requires all suppliers bidding for contracts involving the handling of certain sensitive and personal information to be certified against the Cyber Essentials scheme, this is a compulsory pre-requisite before entering in to any works.

Scheme focus

Cyber Essentials focuses on five crucial approaches within the context of the 10 Steps to Cyber Security guide.

  1. Boundary Firewalls and Internet Gateways
  2. Secure Configuration
  3. Access Control
  4. Malware Protection
  5. Patch Management

Kayo and Cyber Essentials

Recent reports show that the number of cyber attacks is increasing, threats are becoming more sophisticated and are constantly adapting to complex IT environments, systems and corporate connections.

Having Cyber Essentials allows us to demonstrate to our customers that their data is protected, and we take management of their information seriously. Having this accreditation boasts that at Kayo we are constantly taking the necessary steps to reduce cyber risks to our business, developments and customers sensitive information.

About the author

Liam is Business Analyst for Kayo and has a degree in Business Information Technology.  He's worked on IT and digital projects for the last 8 years working with a variety of clients from small start-ups through to large organisations like Volkswagen. 

Share on social media

Powerful web products created for you. By us, together.

Request a callback

Let us contact you

Please leave your name and email address behind and we will be in touch shortly. If you have a time preference please also select from that field.

01795 255 600

Need some help?

Call us on

01795 255 600

Find us

The Innovation Building,
Kent Science Park,
Sittingbourne,
Kent.
ME9 8HL.