Where NAC is in use a network infrastructure will not allow a device to communicate with it until it has proven its identity and is up to date on the latest operating software and anti-malware software.
Cyber Essentials Scheme Cyber Resilience Cyber Risk Firewall & Network Security Industry & Updates Phishing & Security Awareness Training Technical Vulnerability Management