Published by:

Cyber Essentials: Technical Control Themes

In our last blog we shared the fundamental information about the Cyber Essentials scheme. This blog will focus on explaining the five technical control themes in more depth. 

 

Firewalls

Firewalls are designed to prevent unauthorised access in or from private networks. The set up of these devices is crucial; many cyber attacks that take place are actually preventable if hardware or software is configured correctly.  A firewall is used as a buffer between the internet / other untrusted networks and the networks relating to the business. Authorised protocols, ports and applications should only be allowed to exchange data through the firewall. 

 

Secure Configuration

Computers and network devices should be configured in a way to minimise the number of vulnerabilities and provide only the services required to fulfil their intended function. Computers are often not secure upon default installation. An ‘out-of-the-box’ set-up can often include an administrative account with a standard, publicly known default password, one or more unnecessary user accounts enabled (sometimes with special access privileges) and pre-installed but unnecessary applications or services. All of these present security risks.

 

User Access Control

It is important to keep access to your data and services to a minimum. This should prevent a criminal hacker being presented with open access to your information. 

Obtaining administrative rights is a key objective for criminal hackers, allowing them to gain unauthorised access to applications and other sensitive data. Convenience sometimes results in many users having administrator rights, which can create opportunities for exploitation. User accounts, particularly those with special access privileges, should be assigned only to authorised individuals. User accesses must be managed effectively and provide the minimum level of access to applications, computers and networks. 

 

Malware Protection

It is important to protect your business from malicious software, which will seek to access files on your system. Malware can wreak havoc gaining access and stealing confidential information, damaging files and even locking them preventing access until you pay a ransom. 

Protecting against a broad range of malware (computer viruses / worms / spyware / botnet software / ransomware) and including options for virus removal will protect your computer, your privacy and your important documents from attacks. 

 

Patch Management

Any software is prone to technical vulnerabilities. Once discovered and shared publicly, vulnerabilities can rapidly be exploited by cyber criminals. Criminal hackers take advantage of known vulnerabilities in operating systems and third-party applications if they are not properly patched or updated. 

Updating software and operating systems will help to fix these known weaknesses. It is crucial to do this as quickly as possible to close any opportunities that could be used to gain access.

We hope this blog has helped you get a better understanding of the five technical control themes. If you have any questions, please email us at moreinfo@dataconnect.co.uk or call us on 01423 425 498. We also recently held a webinar called “Making Cyber Essentials Work For You” which you can still access. Please click this link to head to the video. 

 

Share this post

Related Posts

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring System (CVSS) is...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a Certification Body, Assured...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

Willow: New Cyber Essentials Question Set Published by IASME and the NCSC   Willow, the new Cyber Essentials question set, was published on Monday (23rd...

Get in touch

SPEAK WITH AN EXPERT

01423 425 498

Related Posts

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring System (CVSS) is...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a Certification Body, Assured...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

Willow: New Cyber Essentials Question Set Published by IASME and the NCSC   Willow, the new Cyber Essentials question set, was published on Monday (23rd...