How should you handle uncertain end-of-life dates in Cyber Essentials?

While most manufacturers and developers are open about the support milestones of their products, some companies instead prefer to guard their end-of-life dates, which may result in awkward situations during Cyber Essentials certification. One example of this is Apple’s iOS operating system. Traditionally, Apple has supported the two latest major versions of iOS, whereas recently …

Discounted Cyber Essentials Certification for Charities

Indelible Data is offering Cyber Essentials at a discount to charities over the next two weeks, writes Business Administrator Abbey Wright. Charities purchasing Cyber Essentials between the 6th November and the 17th November will benefit from advice and guidance as well as a discounted price as part of a national effort to educate charities about …

When are user accounts actually admin accounts?

Under Cyber Essentials, there are various controls that are related to administrative accounts and their use, writes Cyber Security Technologist Tyson McGuirk. The scheme makes it very clear that user accounts and admin accounts should be separate and only used for their intended purpose. Admin accounts have access to additional permissions and services that would …

The Electoral Commission failed Cyber Essentials certification ahead of major breach

The Electoral Commission has admitted failing Cyber Essentials at around the same time as it suffered a major security breach, writes Cyber Security Technologist Tyson McGuirk. In August 2021, names, addresses, and other personal information from the register was compromised in a suspected hack. This incident reflects the significance of the Cyber Essentials scheme as …

Should I include irregular devices and operating systems in Cyber Essentials?

The first step in a Cyber Essentials assessment is to determine what organisational data and organisational services are used in your business, writes Cyber Security Technician Tom Boughton. Common examples of organisational data are emails, documents, database data, or financial data, with common examples of organisational services being software applications, cloud applications, cloud services, and …

Vulnerability Scanning, Penetration Testing, and Cyber Essentials Plus – What’s the difference?

We are often asked to describe the differences between the different levels of technical assurance that we offer, writes Director Tony Wilson. In this blog we will focus on three different types of service and conclude with a hybrid service designed for companies with smaller budgets called a “Cyber Audit”: Cyber Essentials Plus Vulnerability Scanning …

Laptop with orange screen

MOVEit breach – another good reason to achieve Cyber Essentials

Many UK organisations suffered data breaches when criminals exploited a vulnerability in Progress Software’s MOVEit file transfer app, but with the right patch management the impact could have been greatly reduced. Those with Cyber Essentials may have been at an advantage as the scheme helps organisations identify gaps in patch management through auditing of installed …

Completing Cyber Essentials just got easier!

Cyber Essentials applicants can now add helpers to their portal account to help with their submissions. The update is significant, especially for large organisations who require more than one staff member to work on their project or for those companies who require assistance from their managed service provider. It has coincided with the introduction of …