Booklet open showing a speech bubble with a laptop and a shield on the screen. Continue reading...

Cyber Essentials 101: Secure Configuration February 27, 2025 – Posted in: Cyber Security

This is the next article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. Computers and cloud services often aren’t secure on default installation or setup. An out-of-the-box set-up can often include an administrative account with a standard, publicly known, default password, one or more unnecessary user accounts…

Continue reading
Booklet open showing a speech bubble with a laptop and a shield on the screen. Continue reading...

Cyber Essentials 101: Firewalls February 21, 2025 – Posted in: Cyber Security

This is the fourth article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. A firewall is the software or a hardware device which provides protection between your network devices and the Internet. Your organisation will have physical, virtual or software firewalls at your internet boundaries. Software firewalls…

Continue reading
Booklet open showing a speech bubble with a laptop and a shield on the screen. Continue reading...

Cyber Essentials 101: Insurance February 6, 2025 – Posted in: Cyber Security

This is the third article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. If you want to use the free insurance then you’ll need to answer all the questions in this section. The answers to these questions won’t affect the result of your Cyber Essentials assessment. It’s…

Continue reading