{"id":4442,"date":"2017-11-02T14:53:08","date_gmt":"2017-11-02T14:53:08","guid":{"rendered":"https:\/\/cybersmart.com\/?p=4442"},"modified":"2021-02-11T15:42:06","modified_gmt":"2021-02-11T15:42:06","slug":"why-every-company-should-get-cyber-essentials","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/","title":{"rendered":"Why every company should get Cyber Essentials"},"content":{"rendered":"

<\/p>\n

What is Cyber Essentials?<\/h1>\n

 <\/p>\n

 <\/p>\n

The Cyber Essentials<\/a> scheme is a cyber security standard designed by the government, which organisations can be assessed and certified against.
\nIt identifies the security controls that an organisation must have in place within their IT systems to have confidence that they are addressing cyber security effectively and mitigating the risk from Internet-based threats.
\nThe scheme focuses on the following five essential mitigation strategies:<\/p>\n

Malware Protection<\/h4>\n

Computer viruses are probably the most common type of malware. They spread by making copies of themselves. Well-designed anti-malware protection checks any newly downloaded program to ensure that it is malware-free<\/p>\n

Boundary Firewalls and Internet Gateways<\/h4>\n

Firewalls and gateways provide a basic level of protection where a user connects to the Internet. While antivirus software helps to protect the system against unwanted programs, a firewall helps to keep attackers or external threats from getting access to your system in the first place. The firewall monitors all network traffic and can identify and block unwanted traffic that could be harmful to your computer, systems and networks.<\/p>\n

Secure Configuration<\/h4>\n

Failure to manage the proper configuration of your servers and IT devices can lead to a wide variety of security problems. In particular, it can enable rogue agents to detect vulnerabilities with common security scanning tools easily. Once detected, vulnerabilities can be exploited very quickly and result in the total compromise of a system or website, including databases and corporate networks.<\/p>\n

Access Control<\/h4>\n

Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.
\nThere are two main types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data.<\/p>\n

Patch Management<\/h4>\n

Patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system. Patch management tasks include: maintaining current knowledge of available patches, deciding what patches are appropriate for particular systems, ensuring that patches are installed properly, testing systems after installation, and documenting all associated procedures, such as specific configurations required.<\/p>\n

Cyber Essentials provides organisations with clear guidance on implementation as well as offering independent certification for those who want it.<\/p>\n

While providing a basic but essential level of protection, the Cyber Essentials scheme enables organisations that believe they are practising robust cyber security to benefit by making this a unique selling point thereby enabling business. Upon certification, they can then demonstrate to their customers that their data is adequately protected and that they take cyber security seriously.<\/p>\n

Cyber Essentials protects against 80% of threats and is designed for organisations of all sizes, and in all sectors.<\/p>\n

Failure to protect against cyber-threats and data loss can lead to a fall in share price, hefty fines and reputational damage.<\/p>\n

Having been assessed as meeting the requirements of Cyber Essentials, an organisation’s approach to information risk management becomes integral to its operations and demonstrates market leadership in cyber-security. Cyber Essentials offers a useful mechanism for organisations to effectively demonstrate to customers, investors, insurers and others that they have taken the essential precautions.<\/p>\n

If you have any questions about Cyber Security in general or just want to have a chat, drop us a line at hello@cybersmart.co.uk<\/p>\n

Protecting your data and organisation is hard work \u2014 let us help you make it easier.<\/strong><\/em><\/h4>\n","protected":false},"excerpt":{"rendered":"What is Cyber Essentials?     The Cyber Essentials scheme is a cyber security standard designed by the government, which organisations can be assessed and certified against. It identifies the...","protected":false},"author":4,"featured_media":6505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11,204],"tags":[9,10,43,28],"yoast_head":"\nWhy every company should get Cyber Essentials - CyberSmart<\/title>\n<meta name=\"description\" content=\"Cyber Essentials identifies the security controls that an organisation must have within their IT systems to address cyber security effectively\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why every company should get Cyber Essentials - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"Cyber Essentials identifies the security controls that an organisation must have within their IT systems to address cyber security effectively\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-02T14:53:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-11T15:42:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\"},\"author\":{\"name\":\"Franklin\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\"},\"headline\":\"Why every company should get Cyber Essentials\",\"datePublished\":\"2017-11-02T14:53:08+00:00\",\"dateModified\":\"2021-02-11T15:42:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\"},\"wordCount\":581,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg\",\"keywords\":[\"Cyber Essentials\",\"Cyber Security\",\"Data Protection\",\"Information Security\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\",\"Industry\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\",\"name\":\"Why every company should get Cyber Essentials - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg\",\"datePublished\":\"2017-11-02T14:53:08+00:00\",\"dateModified\":\"2021-02-11T15:42:06+00:00\",\"description\":\"Cyber Essentials identifies the security controls that an organisation must have within their IT systems to address cyber security effectively\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why every company should get Cyber Essentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\",\"name\":\"Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"caption\":\"Franklin\"},\"url\":\"https:\/\/cybersmart.com\/author\/franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why every company should get Cyber Essentials - CyberSmart","description":"Cyber Essentials identifies the security controls that an organisation must have within their IT systems to address cyber security effectively","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/","og_locale":"en_US","og_type":"article","og_title":"Why every company should get Cyber Essentials - CyberSmart","og_description":"Cyber Essentials identifies the security controls that an organisation must have within their IT systems to address cyber security effectively","og_url":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2017-11-02T14:53:08+00:00","article_modified_time":"2021-02-11T15:42:06+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg","type":"image\/jpeg"}],"author":"Franklin","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Franklin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/"},"author":{"name":"Franklin","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13"},"headline":"Why every company should get Cyber Essentials","datePublished":"2017-11-02T14:53:08+00:00","dateModified":"2021-02-11T15:42:06+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/"},"wordCount":581,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg","keywords":["Cyber Essentials","Cyber Security","Data Protection","Information Security"],"articleSection":["Blog","Cyber Security 101","Industry"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/","url":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/","name":"Why every company should get Cyber Essentials - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg","datePublished":"2017-11-02T14:53:08+00:00","dateModified":"2021-02-11T15:42:06+00:00","description":"Cyber Essentials identifies the security controls that an organisation must have within their IT systems to address cyber security effectively","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/28.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/why-every-company-should-get-cyber-essentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"Why every company should get Cyber Essentials"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13","name":"Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","caption":"Franklin"},"url":"https:\/\/cybersmart.com\/author\/franklin\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/4442"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=4442"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/4442\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6505"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=4442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=4442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=4442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}