by Phil W | Mar 10, 2023 | Cloud Services, Hardware and Devices, Software and firmware
About Asset Management Know what you have, where it is and who is in charge of it . Asset management creates the foundation on which to build all of your other security features In a similar vein to backing up data, asset management isn’t a specific Cyber Essentials...
by Phil W | Jan 6, 2022 | Hardware and Devices
Guidance on Bring Your Own Device (BYOD) What is Bring Your Own Device? Bring Your Own Device (BYOD) is a widespread term for when a company allows employees to use their own laptops, tablets or phones for work purposes. In addition to mobile or remote devices owned...
by Phil W | Jan 6, 2022 | Firewalls, Hardware and Devices
About remote / home working What is remote or home working? Remote working is the practice of an employee working at their home, or in some other place that is not an organisation’s usual place of business. Anyone working from home for any amount of time is...
by Phil W | Jan 6, 2022 | Cloud Services, Hardware and Devices, Secure Configurations
Applying MFA to access cloud services A guide to using multi-factor authentication (MFA) to secure your cloud services. Organisations access their data and services hosted in the cloud over an internet connection. If access control to that information is not secure,...
by Phil W | Jan 6, 2022 | Cloud Services, Hardware and Devices, Secure Configurations
Applying the five controls to cloud services What are cloud services? Different components of computing are available to users remotely over the internet and payable on demand or by subscription. Cloud services is the collective name for these externally managed...
by Eleanor Yerbury | Jan 6, 2022 | Hardware and Devices, Software and firmware
About virtualisation What is virtualisation? Many organisations today use virtual servers (VS) and virtual machines (VM). Many employees log onto virtual desktops which allows them to use any device from any location to access the desk top they use for work. To the...