Cyber Essentials is a simple yet incredibly effective UK Government backed initiative supported by the NCSC (National Cyber Security Centre), suitable for any organisation, of any size, in any sector.
Designed to protect organisations against the most common cyber-attacks, it's a certification that we recommend to all our customers and one that we have first-hand experience of achieving.
As a managed IT services provider with a strong focus on ensuring our customers have modern and secure IT environments, we are strong advocates of Cyber Essentials certification.
Organisations need to consider that cyber attacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. They’re the digital equivalent of a thief trying your front door to see if it’s unlocked. Therefore, in committing to Cyber Essentials you'll access an effective and affordable way to reduce your organisation’s exposure to these attacks.
In kicking off your Cyber Essentials journey we'll work with you to analyse your current environment, identifying the areas you need to focus on to achieve certification. Key questions to consider include:
Our Cyber Essentials certification process is tried and tested across many of our existing customers, meaning we can quickly get your path towards certification mapped out and delivered. Once achieved, your organisation will benefit from:
With Cyber Essential Plus you'll have the highest level of certification offered under the Cyber Essentials scheme. Your organisation will need an even stronger, more robust cyber security environment than necessary for Cyber Essentials, with particular focus in areas such as phishing attacks and hacking. We can take you through the Cyber Essentials Plus process, kicking off with a review of your current set up.
Boundary firewalls and internet gateways
Establish network perimeter defences, and firewall policies to detect and block access to known malicious domains and prevent users’ computers from communicating directly with the Internet
Build and maintain malware defences to detect and respond to known attack code
Patch known vulnerabilities with the latest version of the software, to prevent attacks which exploit software bugs
Whitelisting and execution control
Prevent unknown software from being able to un or install itself, including AutoRun on USB and CD drives
Restrict the functionality of every device, operating system and application to the minimum needed for business to function
Passwords and access
A password policy is essential, along with limiting normal users’ execution permissions and the least privilege principle
Cyber Essentials Certification with Kick ICT
We deliver a two-day engagement to assess your organisation’s levels of protection against a wide variety of the most common cyber-attacks. This is important because vulnerability to simple attacks can mark you out as target for more in-depth unwanted attention from cyber criminals and others. We'll then work through the assessment process, identifying any areas that require improvements before submitting the assessment for formal accreditation. Get in touch to discuss your organisation's requirements.
Managed IT & Support
Our Managed IT solution for small to medium sized organisations.
Flexible cloud solutions and services.
Safeguard your business against threats and vulnerabilities.
As a long-established provider of a range of IT services and support, our new cyber security division has the expertise and resources to focus solely on providing premier protection and safeguarding your vital data.
Ask the experts
We're here to help
Whether you are ready to start scoping or just want to discover more about Kick ICT, our experts are at hand to help.
Click here for more information.