{"id":7037,"date":"2021-06-14T12:11:43","date_gmt":"2021-06-14T12:11:43","guid":{"rendered":"https:\/\/cybersmart.com\/?p=7037"},"modified":"2021-06-14T12:12:02","modified_gmt":"2021-06-14T12:12:02","slug":"servers-and-cyber-essentials-explained","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/","title":{"rendered":"Servers and Cyber Essentials explained"},"content":{"rendered":"

Just about every business uses a server, but most of us only have a fuzzy idea of what they actually do. And it’s easy to assume that it\u2019s too technical or complex for us non-techy types to understand.\u00a0<\/span><\/p>\n

In reality, servers are pretty simple, and, they\u2019re a key part of your IT infrastructure as well as having a role to play in Cyber Essentials certification.\u00a0<\/span><\/p>\n

Here\u2019s everything you need to know.\u00a0<\/span><\/p>\n

What is a server?\u00a0<\/b><\/h3>\n

When most of us think of servers, we think of huge, thousand-acre data centres like <\/span>this<\/span><\/a>. However, most businesses have a server and they\u2019re often of a much more modest scale.\u00a0<\/span><\/p>\n

Any computer using the right software can be a server. Essentially, all a server does is collect and distribute information across a network. The network could be local, say within your office, or a wider network across many locations, like the internet. <\/span>
\n<\/span><\/p>\n

For more on the different types of networks and how they work, check out our <\/span>recent blog<\/span><\/a> on the subject.\u00a0<\/span>
\n<\/span><\/b><\/p>\n

How does a server work?\u00a0<\/b><\/h3>\n

Whether it\u2019s searching Google or pulling up a file at work, you probably access servers thousands of times each day. <\/span>
\n<\/span>
\n<\/span>Taking the internet as an example, the process works something like this:\u00a0<\/span><\/p>\n

    \n
  1. You enter a URL into your web browser<\/span><\/li>\n
  2. The browser requests the data for the site you\u2019ve asked it to display<\/span><\/li>\n
  3. This information is sent to the server<\/span><\/li>\n
  4. The web server finds all the data needed to display the site and sends it back<\/span><\/li>\n
  5. The site you\u2019ve requested appears on your browser<\/span><\/li>\n<\/ol>\n

    And that\u2019s it. The whole process shouldn\u2019t take more than a few seconds, depending on your internet speed.\u00a0<\/span><\/p>\n

    What is a virtual server?\u00a0<\/b><\/p>\n

    Servers are simple enough. But, things get a little more complicated when it comes to virtual servers. So, here\u2019s the simplest explanation we could come up with. <\/span>
    \n<\/span>
    \n<\/span>A virtual server is a server that shares its resources amongst multiple users, each of whom has some control over it. It\u2019s usually located offsite from the organisation using it, typically in a data centre.\u00a0<\/span><\/p>\n

    Think of it as a way of splitting a single, physical server into several smaller virtual servers, each of which can run its own operating system. The key advantage of this approach is cost saving.\u00a0<\/span><\/p>\n

    A virtual server is usually much more energy-efficient to run than a dedicated physical server and doesn\u2019t require any upkeep by the businesses using it. And, you only pay for the server capacity your business actually uses \u2013 far more cost-effective than running an entire server and only using a fraction of its capability.<\/span><\/p>\n

    Servers and Cyber Essentials\u00a0<\/b><\/h3>\n

    The Cyber Essentials certification questionnaire has several sections relating to servers, but what is it you need to do?<\/p>\n

    First, all servers whether virtual or physical need to be supported by the manufacturer. For example, Windows Server 2008 isn\u2019t Cyber Essentials compliant because Microsoft stopped supporting it some time ago. This means its defences won\u2019t have been updated to deal with new threats, making it vulnerable to attack. For more detail on the importance of updates, have a read of this<\/a>.<\/p>\n

    For Cyber Essentials Plus<\/a>, your servers only need to be tested by an auditor if they \u2018touch\u2019 the internet and a non-admin user can use it to browse. If you\u2019re unsure of the difference between admin and non-admin users, never fear, we\u2019ve put together a handy blog <\/a>to help.<\/p>\n

    For both Cyber Essentials and Cyber Essentials Plus, you\u2019ll also need to answer questions on who has access to your servers, the protections you have in place, and the software installed on your servers.<\/p>\n

    And that’s all there is to know about servers; a complex technology with a very simple job. Hopefully this blog has armed you with all the knowledge you need, but if you have any questions please get in touch, our team are always happy to help.<\/p>\n

    Looking to improve your cybersecurity but not sure where to begin? Start by getting <\/span>certified in Cyber Essentials<\/span><\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/span><\/p>\n

     <\/p>\n

    \"CTA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

    Just about every business uses a server, but most of us only have a fuzzy idea of what they actually do. And it’s easy to assume that it\u2019s too technical…<\/p>\n","protected":false},"author":8,"featured_media":7038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[9,83,214,213,16],"yoast_head":"\nServers and Cyber Essentials explained - CyberSmart<\/title>\n<meta name=\"description\" content=\"Just about every business uses a server. But do you know what one is or how it works? And what does this have to do with Cyber Essentials?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Servers and Cyber Essentials explained - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"Just about every business uses a server. But do you know what one is or how it works? And what does this have to do with Cyber Essentials?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-14T12:11:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-14T12:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob S\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob S\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\"},\"author\":{\"name\":\"Rob S\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\"},\"headline\":\"Servers and Cyber Essentials explained\",\"datePublished\":\"2021-06-14T12:11:43+00:00\",\"dateModified\":\"2021-06-14T12:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png\",\"keywords\":[\"Cyber Essentials\",\"cybersecurity\",\"data centre\",\"Servers\",\"SMEs\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\",\"name\":\"Servers and Cyber Essentials explained - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png\",\"datePublished\":\"2021-06-14T12:11:43+00:00\",\"dateModified\":\"2021-06-14T12:12:02+00:00\",\"description\":\"Just about every business uses a server. But do you know what one is or how it works? And what does this have to do with Cyber Essentials?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png\",\"width\":1200,\"height\":627,\"caption\":\"Servers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Servers and Cyber Essentials explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\",\"name\":\"Rob S\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"caption\":\"Rob S\"},\"url\":\"https:\/\/cybersmart.com\/author\/rob-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Servers and Cyber Essentials explained - CyberSmart","description":"Just about every business uses a server. But do you know what one is or how it works? And what does this have to do with Cyber Essentials?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/","og_locale":"en_US","og_type":"article","og_title":"Servers and Cyber Essentials explained - CyberSmart","og_description":"Just about every business uses a server. But do you know what one is or how it works? And what does this have to do with Cyber Essentials?","og_url":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2021-06-14T12:11:43+00:00","article_modified_time":"2021-06-14T12:12:02+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png","type":"image\/png"}],"author":"Rob S","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Rob S","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/"},"author":{"name":"Rob S","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff"},"headline":"Servers and Cyber Essentials explained","datePublished":"2021-06-14T12:11:43+00:00","dateModified":"2021-06-14T12:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/"},"wordCount":698,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png","keywords":["Cyber Essentials","cybersecurity","data centre","Servers","SMEs"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/","url":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/","name":"Servers and Cyber Essentials explained - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png","datePublished":"2021-06-14T12:11:43+00:00","dateModified":"2021-06-14T12:12:02+00:00","description":"Just about every business uses a server. But do you know what one is or how it works? And what does this have to do with Cyber Essentials?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/06\/Retargeting_V.5-6.png","width":1200,"height":627,"caption":"Servers"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/servers-and-cyber-essentials-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"Servers and Cyber Essentials explained"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff","name":"Rob S","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","caption":"Rob S"},"url":"https:\/\/cybersmart.com\/author\/rob-s\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/7037"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=7037"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/7037\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/7038"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=7037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=7037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=7037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}