by Eleanor Yerbury | Oct 7, 2022 | Uncategorized
Secure access to your online accounts- use a strong password plus an additional step of identification An online account that is protected with just a password is vulnerable to a breach. This is because if that password is stolen, guessed or brute forced, someone...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
How to create a subset Deciding what is in scope for you Cyber Essentials assessment The scope of your Cyber Essentials assessment and certification should ideally cover the whole of the IT infrastructure used to perform your business. Including your ‘whole...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Remote Working for Charities Remote working is the practice of an employee or volunteer working at their home, or in some other place that is not an organisation’s usual place of business. Remote working brings an increased reliance on technology. It...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Guidance on Bring Your Own Device (BYOD) for Charities What is Bring Your Own Device? Bring Your Own Device (BYOD) is a widespread term for when an organisation allows staff to use their own laptops, tablets or phones for work purposes. In addition to mobile or...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Applying the five controls to cloud services, for charities What are cloud services? Different components of computing are available to users remotely over the internet and payable on demand or by subscription. Cloud services is the collective name for these...