HomeCyber SecurityCyber Essentials: going mainstream?

Cyber Essentials: going mainstream?

Date:

As I’m sure many of the readers of this blog will be aware Cyber Essentials is a UK Government scheme encouraging organisations to adopt good practice in information security. It includes an assurance framework, and a simple set of security controls, to protect IT.

It was launched in a big fanfare in June of last year; it became mandated for certain UK Government IT contracts in October 2014; but it has seen relatively low take-up. Or at least thus far.

- Advertisement -

Recently I helped organise an event in association between the East Midlands branch of the Institute of Information Security Professionals (IISP) and the East Midlands Chambers of Commerce that brought together about 75 people with an interest in the scheme on a cold winter’s eve in Nottingham.

The audience on the night was an eclectic mix ranging from one-man bands to global blue-chip companies; from novices to information security professionals. But that is exactly what a scheme like Cyber Essentials is about. Whilst it provides some guidelines it then allows the user to identify what a suitable cyber defence strategy is based on the circumstances of their organisation.

Paul Midian, from PwC, expertly covered the nuts and bolts of the scheme in a rapid 30-minute session.

Some of Paul’s top tips for the five categories were:

- Advertisement -
  • Firewalls do not provide complete protection against internet based threats. A multi-layered defence is required;
  • To ensure a secure configuration, rigorous IT asset management will pay dividends;
  • The Joiner/Mover/Leaver (JML) process is complex; tracking your user populations is hard!
  • End point malware protection is good hygiene but anti-virus software can be bypassed. Comprehensive malware protection requires a multi-layered approach – at the network perimeter, at the end point, and within the corporate environment;
  • The Cyber Essentials guidance document states patch management applies to “computer and network devices that are connected to or capable of connecting to the internet”. This should include every computer.

Following a chance for everyone to catch their breath and get a cup of coffee, Ian Glover from CREST gave a second presentation. This time the focus was on how the Cyber Essentials scheme fitted in to what at times can be a complex picture of different assurance schemes.

The final part of the evening was a panel discussion with delegates able to fire questions at the two presenters. Also joining the panel was Cyber Matter’s very own, Colin Robbins, who was able to draw upon the experience of Cyber Essentials certification last year.

Key themes emerging were:

  • How long would it take to achieve Cyber Essentials? Answer – depends upon the organisation and what is in place already; but with a few weeks of preparation, certifying can take a matter of days, so as a ball park figure 6-8 weeks potentially.
  • Cyber insurance – is this any good? Mixed opinion as to the value of it but definitely something worth considering. (see this previous blog)
  • What is the scope of Cyber Essentials? Again difficult to quantify but even something like a closed-circuit TV could well be within scope.

Overall the consensus of the evening seemed to be that Cyber Essentials was picking up some momentum as a scheme with growing interest from not only those working within cyber security and that it wasn’t necessarily an easy thing to do but it should be achievable for most.

More information on the Cyber Essentials scheme can be found at:

- Advertisement -

Related articles:

Understanding Non-Repudiation in Cyber Security

Discover the importance of non-repudiation in cyber security. Learn how it safeguards digital transactions, mitigates cyber threats, and promotes trust. Read more now!

Understanding Fuzzing in Cyber Security

Gain a comprehensive understanding of fuzzing in cyber security and its significance in identifying vulnerabilities and enhancing system resilience. Dive into this fascinating topic!

Understanding HSM in Cyber Security

Looking to understand the significance of HSM in cyber security? This post explains the functions and contributions of HSMs in protecting sensitive information and maintaining a secure digital environment. It covers the basics of HSM, types of HSMs, their importance in cyber security, applications, standards, integration challenges, case studies, and future trends. Explore HSM vendors and solutions to enhance your knowledge in this field.

What is MSSP? A Comprehensive Guide

Looking for comprehensive information on MSSP and its role in cyber security? This guide breaks down the concept and significance of MSSP in protecting organizations from cyber threats. Enhance your knowledge and gain valuable insights into the world of Managed Security Services Providers.

Understanding Baiting Techniques in Cyber Security

Learn about baiting techniques in cyber security and how to protect yourself from falling victim to these deceptive tactics. Understand the relationship between baiting and social engineering, identify common baiting incidents, and discover preventative measures to safeguard your information.

9 COMMENTS

  1. I can’t find the specific article you mentioned, but here’s a random, unpredictable comment:

    “Hey, did you guys hear about the new Cyber Essentials? Is it worth the hype or just another fad?”

    • “Sorry, couldn’t find that article either. But I gotta say, Cyber Essentials is no hype. It’s a legit way to protect your business from cyber threats. Definitely not just another fad. Get with the program!”

    • Actually, relying solely on antivirus software is like using an umbrella in a hurricane. Cyber Essentials offers a comprehensive approach, addressing vulnerabilities beyond traditional malware. It’s time to embrace modern solutions for modern threats. Stay safe!

    • Sorry to burst your bubble, but Cyber Essentials isn’t some superhero. It’s just a basic security standard. There’s a lot more to protecting ourselves in this digital age than a catchy hashtag. Let’s not get carried away with overhyping it. #RealityCheck

LEAVE A REPLY

Please enter your comment!
Please enter your name here