by Phil W | Jan 6, 2022 | Firewalls, Hardware and Devices
About remote / home working What is remote or home working? Remote working is the practice of an employee working at their home, or in some other place that is not an organisation’s usual place of business. Anyone working from home for any amount of time is...
by Phil W | Jan 6, 2022 | Cloud Services, Passwords
The value of passwords and how to strengthen your access control Password fatigue A password is the access key to almost every digital device and online account you use. In today’s digital world, the average person has between 70-130 online accounts that require...
by Phil W | Jan 6, 2022 | Cloud Services, Hardware and Devices, Secure Configurations
Applying MFA to access cloud services A guide to using multi-factor authentication (MFA) to secure your cloud services. Organisations access their data and services hosted in the cloud over an internet connection. If access control to that information is not secure,...
by Phil W | Jan 6, 2022 | Cloud Services, Hardware and Devices, Secure Configurations
Applying the five controls to cloud services What are cloud services? Different components of computing are available to users remotely over the internet and payable on demand or by subscription. Cloud services is the collective name for these externally managed...
by Phil W | Mar 9, 2021 | Schools-Scope
About scope for schools What is the scope? The scope of your network defines what will and won’t be covered by the Cyber Essentials assessment. It is important to identify what is in and what is out of scope. You will be required to describe the scope of the...