CYBER SECURITY

CYBER ESSENTIALS

What stands us apart from our competitors is our consultantive aproach to Cyber Essentials. We’ll be there from start to finish and beyond.

 

Cyber Essentials is a government backed standard, sponsored by the NCSC and governed by IASME.

It’s an excellent foundation to the cyber security strategy of comapanies and organisations of all sizes. Following the standard offers protection against common online cyber threats, which are basic threats that exploit simple weaknesses in your IT setup.

There is currently a successful cyber attack on UK-based companies/organisations every 19 seconds. 86% of all cyber attacks are common online cyber attacks. It’s also reported that on average, a small company/organisation who has suffered a cyber attack will close be forced to stop trading due to the financial impact of the cyber attack.

Imagine the impact we’d have on those statistics if we all had Cyber Essentials!

Cyber Essentials comes in 2 flavours: Cyber Essentials and Cyber Essentials Plus.

Cyber Essentials is a self-assessed, where after meeting the required standards in the 5 key focus areas and paying the annual IASME membership fee, a question set is filled out, and submitted to IASME, where you will hopefully meet the standard and receive the annual certificate.

Cyber Essentials Plus is an enhanced standard, provides an added level of credability, as it must be verified by an external assessor. You must first acquire Cyber Essentials, from then you’re given 3 months to provide evidence to the external assesor and undergo a successful vulnerability assessment  in order to meet the required standard for Cyber Essentials Plus.

 

THE 5 KEY CONTROLS

REMSON DESIGN | FIREWALL ICON

Firewall

Most networks already have an in-built firewall in their router, but you need to demonstrate that you have processes in place to manage the firewall in the event of a breach.

REMSON DESIGN | SECURE CONFIG ICON

Secure Configuration

Your devices and services should all be configured in a secure manner, with all the controls in place to prevent a breach.

REMSON DESIGN | PATCH ICON

Patch Management

Hackers work very hard to find holes in software and software developers work just as hard to plug those holes.  Keeping patches up-to-date is a no brainer!

REMSON DESIGN | USER ACCESS CONTROL ICON

User Access Control

This is about ensuring that you and your staff can only access what they need to and no more. This is about ensuring there are policies and processes in place to keep things safe.

REMSON DESIGN | MALWARE PROTECTION ICON

Malware Protection

Malware protection is the best way of keeping your laptops and desktops secured from nasty viruses lurking around every corner. This needs to be managed properly.

VIDEO

Take a look at this video which explains the requirements.

$

Sometimes it helps to visualise the process with a video.

Let us know what you think

We can manage this entire process for you from start to finish and beyond.

With us on board as your Cyber Essentials consultant, we believe that it’s important to fully engage with the process and to ensure that you achieve the standard and continually maintain the standard.

Common online threats are about exploiting weaknesses mostly in human behaviour. Human beings can either be your biggest weakness or your biggest strength. Cyber Essentials is mostly about education and staff engagement and we’ll make sure that the human beings in your team will be your biggest strength.

WHAT TO DO...

 

Use our Readiness Tool to get started.

Fill out the questionnaire and we’ll send you a report with your Current State Score.

Our process 

 

Starting with the FREE assessment, this is the basic process we follow to get you Cyber Essentials certified  

REMSON DESIGN | GOVERNANCE ICON

Free assessment

Kick the process off by taking up the FREE Readiness Assessment, from which you will receive a report with a Readiness Score.

Start here

REMSON DESIGN | TEAMS CALL ICON

Discovery call

We’ll arrange a meeting to discuss the findings of the report and to work out the next steps on the journey to cyber peace of mind.

Contact now

REMSON DESIGN | REMEDIATION PLAN ICON

Remediation plan

The next step will be to create a comprehensive remediation plan, which will include a list of actions and the designated owner of each action.

Contact now

REMSON DESIGN | CONSULTANCY ICON

Assessment

When the remediation plan has been completed, we’ll start the assessment for you. We know the correct vernacular that’s expected by the assessors, which is why it’s best to leave it to us.

Contact now

 

Aled at Remson IT got me through the Cyber Essentials certification process so smoothly that I hardly felt it. He was endlessly patient and friendly, and never baffled me with jargon. I can absolutely recommend him to anyone needing IT support, or any company needing Cyber Essential security certification, which is essential for attracting government contracts, and common sense for any company handling customer data.

Christopher Robertson

Director, Robertson IP Ltd

NEED HELP ACHIEVING

GREATNESS?

Our experts are here to help. Start your journey to stress-free operations.

Contact us today  to find out how.

Our Managed IT Support services:

  • Reduce operational costs
  • Free up critical resources
  • Maintain smooth operations

Fill out the form to get started

Please enable JavaScript in your browser to complete this form.
Enter your first name
Enter your last name
Enter your company name
Enter your business email address
Enter your phone number if you want
Enter your question or tell us if you would like to book a discovery session