Thank you for downloading the Cyber Essentials Plus audit guidance

Thank You for Downloading. We hope you find this resource useful.

Thank you for downloading the Cyber Essentials Self-Assessment Preparation Booklet

Thank You for Downloading. We hope you find this resource useful.

Thank you for downloading the Cyber Essentials Review Toolkit Datasheet

Thank You for Downloading. We hope you find this resource useful.

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification   To maintain a valid Cyber Essentials certificate, organisations must...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...

PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity

PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called...

Podcast | Being Real With Cyber Security: The Implications of Emerging Apps

‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...

Podcast | Deep Dive: Cyber Essentials and Updates

Here we go again… continuing our discussion on Cyber Essentials but with a focus on the technical aspects of Cyber...

Cyber Essentials Technical Controls Themes

Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates

Cyber Essentials Plus

Cyber Essentials and the Plus version follow the same guidelines, however the difference is that a certification body, such as...

Cyber Essentials

Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a...

Cyber incident

In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order...

Cyber Attack

An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber...

The Benefits Of Outsourcing Your Cyber Security

The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance...

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...

Cyber Essentials: Major Updates in 2022

Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...

Threat Landscape: The Key Cyber Security Statistics from 2021

Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to...

Cyber Essentials: Important Updates

Cyber Essentials: Important Updates We hosted a webinar regarding the recent IASME updates last month and multiple connections have asked...

The Cyber Attack Stages Explained | Board Edition

The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages...

Building On Your Cyber Security Posture In The Construction Industry

Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...

The Education Roadmap: Mature Your Cyber Security Strategy

The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further...

NCSC Alert: Rise in cyber attacks hitting the education sector

NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...

Cyber Essentials: Technical Control Themes

Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...

The Fundamentals: Cyber Essentials

The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...

Cyber Essentials Webinar 2020

Cyber Essentials Webinar 2020 Join us for a 40 minute informative Cyber Essentials webinar.  We will share valuable information to...

Cyber Security for the Cloud

Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...

Whats your cyber security strategy for 2018?

Whats your cyber security strategy for 2018? In the link below, you can find some very interesting insights in to...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses,...

Why Your Business Is More Susceptible to Attack Over the Festive Season

Why Your Business Is More Susceptible to Attack Over the Festive Season   Often, the festive season sees a good...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...

Trojan

Inspired by the Trojan Horse story, trojan in cyber security is a malware disguised as a legitimate software. The fake...

Threat Analysis

The process of assessing an organisations already existing cyber security measures to identify potential threats and vulnerabilities.

Risk Mitigation

The process of prioritising, assessing and executing appropriate risk controls to avoid cyber security breaches.

Risk Assessment

The process identifying, analysing and evaluating cyber security risks to ensure that time, efforts and resources are being allocated correctly.

Resilience

Focuses upon an organisations ability to prevent, survive and recuperate from cyber security incidences.

Ey-Up! What’s Securin’? The Data Connect Podcast

We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...

Security Information and Event Management (SIEM)

A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...

Human Error

This is the lack of action or unintentional action made by users or employees that can cause, spread or permit...

Gap Analysis

A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....

Forensics

Investigating and analysing cyber attacks, while also preserving the evidence.

Common Vulnerability Scoring System (CVSS)

An industry standard that gives each vulnerability a qualitative score of its severity, starting from 0 to 10. There are multiple...

Business Continuity Plan

A framework implemented by a company detailing the procedures to take to maximise your businesses chance of survival subsequent to...

Backup

A backup is a copy of your systems that can be used if the current version fails or if the...

Awareness Training

This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...

Attacker

An actor with malicious intentions who aims to exploit systems by taking control, disrupting, damaging, stealing or manipulating data/systems. Attackers...

Alert

In cyber security, an alert is often an automated notification from your security systems to highlight an event which could...

AIM (Data Connect Term)

An acronym for assess, improve and maintain.  Assess: Review and identify key security areas of risk. Seeking out opportunity for...

Advanced Persistent Threats (APT)

Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to...

Access Control

Systems are configured in a way to only allow individuals and other systems access to functions they require to carry...

Terms & Conditions

The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...

FAQs

Firewall Management [sp_easyaccordion id="1371"]   Cyber Essentials [sp_easyaccordion id="1373"]   Vulnerability Management [sp_easyaccordion id="1376"]   Security Awareness Training [sp_easyaccordion id="1917"]

Privacy Statement

Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...

The 5 Critical Challenges Affecting Data Protection Officers

The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...

Human Layer Security: How To Reduce Risk If Awareness Training Fails

Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...

The Hard Truth About Security Training Your Employees

The Hard Truth About Security Training Your Employees Cyber Security training is currently a hot topic in the IT sector with...

Crypto Jacking

Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge?  Crypto mining is...

Load more
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification   To maintain a valid Cyber Essentials certificate, organisations must...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...

PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity

PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called...

Podcast | Being Real With Cyber Security: The Implications of Emerging Apps

‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...

Podcast | Deep Dive: Cyber Essentials and Updates

Here we go again… continuing our discussion on Cyber Essentials but with a focus on the technical aspects of Cyber...

The Benefits Of Outsourcing Your Cyber Security

The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance...

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...

Cyber Essentials: Major Updates in 2022

Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...

Threat Landscape: The Key Cyber Security Statistics from 2021

Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to...

Cyber Essentials: Important Updates

Cyber Essentials: Important Updates We hosted a webinar regarding the recent IASME updates last month and multiple connections have asked...

The Cyber Attack Stages Explained | Board Edition

The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages...

Building On Your Cyber Security Posture In The Construction Industry

Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...

The Education Roadmap: Mature Your Cyber Security Strategy

The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further...

NCSC Alert: Rise in cyber attacks hitting the education sector

NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...

Cyber Essentials: Technical Control Themes

Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...

The Fundamentals: Cyber Essentials

The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...

Cyber Essentials Webinar 2020

Cyber Essentials Webinar 2020 Join us for a 40 minute informative Cyber Essentials webinar.  We will share valuable information to...

Cyber Security for the Cloud

Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...

Whats your cyber security strategy for 2018?

Whats your cyber security strategy for 2018? In the link below, you can find some very interesting insights in to...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses,...

Why Your Business Is More Susceptible to Attack Over the Festive Season

Why Your Business Is More Susceptible to Attack Over the Festive Season   Often, the festive season sees a good...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...

Ey-Up! What’s Securin’? The Data Connect Podcast

We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...

The 5 Critical Challenges Affecting Data Protection Officers

The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...

Human Layer Security: How To Reduce Risk If Awareness Training Fails

Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...

The Hard Truth About Security Training Your Employees

The Hard Truth About Security Training Your Employees Cyber Security training is currently a hot topic in the IT sector with...

Crypto Jacking

Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge?  Crypto mining is...

Load more
Thank you for downloading the Cyber Essentials Plus audit guidance

Thank You for Downloading. We hope you find this resource useful.

Thank you for downloading the Cyber Essentials Self-Assessment Preparation Booklet

Thank You for Downloading. We hope you find this resource useful.

Thank you for downloading the Cyber Essentials Review Toolkit Datasheet

Thank You for Downloading. We hope you find this resource useful.

Terms & Conditions

The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...

FAQs

Firewall Management [sp_easyaccordion id="1371"]   Cyber Essentials [sp_easyaccordion id="1373"]   Vulnerability Management [sp_easyaccordion id="1376"]   Security Awareness Training [sp_easyaccordion id="1917"]

Privacy Statement

Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...

Load more
Cyber Essentials Technical Controls Themes

Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates

Cyber Essentials Plus

Cyber Essentials and the Plus version follow the same guidelines, however the difference is that a certification body, such as...

Cyber Essentials

Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a...

Cyber incident

In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order...

Cyber Attack

An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber...

Trojan

Inspired by the Trojan Horse story, trojan in cyber security is a malware disguised as a legitimate software. The fake...

Threat Analysis

The process of assessing an organisations already existing cyber security measures to identify potential threats and vulnerabilities.

Risk Mitigation

The process of prioritising, assessing and executing appropriate risk controls to avoid cyber security breaches.

Risk Assessment

The process identifying, analysing and evaluating cyber security risks to ensure that time, efforts and resources are being allocated correctly.

Resilience

Focuses upon an organisations ability to prevent, survive and recuperate from cyber security incidences.

Security Information and Event Management (SIEM)

A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...

Human Error

This is the lack of action or unintentional action made by users or employees that can cause, spread or permit...

Gap Analysis

A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....

Forensics

Investigating and analysing cyber attacks, while also preserving the evidence.

Common Vulnerability Scoring System (CVSS)

An industry standard that gives each vulnerability a qualitative score of its severity, starting from 0 to 10. There are multiple...

Business Continuity Plan

A framework implemented by a company detailing the procedures to take to maximise your businesses chance of survival subsequent to...

Backup

A backup is a copy of your systems that can be used if the current version fails or if the...

Awareness Training

This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...

Attacker

An actor with malicious intentions who aims to exploit systems by taking control, disrupting, damaging, stealing or manipulating data/systems. Attackers...

Alert

In cyber security, an alert is often an automated notification from your security systems to highlight an event which could...

AIM (Data Connect Term)

An acronym for assess, improve and maintain.  Assess: Review and identify key security areas of risk. Seeking out opportunity for...

Advanced Persistent Threats (APT)

Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to...

Access Control

Systems are configured in a way to only allow individuals and other systems access to functions they require to carry...

Load more