by Eleanor Yerbury | Oct 7, 2022 | Uncategorized
Secure access to your online accounts- use a strong password plus an additional step of identification An online account that is protected with just a password is vulnerable to a breach. This is because if that password is stolen, guessed or brute forced, someone...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
How to create a subset Deciding what is in scope for you Cyber Essentials assessment The scope of your Cyber Essentials assessment and certification should ideally cover the whole of the IT infrastructure used to perform your business. Including your ‘whole...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Remote Working for Charities Remote working is the practice of an employee or volunteer working at their home, or in some other place that is not an organisation’s usual place of business. Remote working brings an increased reliance on technology. It...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Guidance on Bring Your Own Device (BYOD) for Charities What is Bring Your Own Device? Bring Your Own Device (BYOD) is a widespread term for when an organisation allows staff to use their own laptops, tablets or phones for work purposes. In addition to mobile or...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Applying the five controls to cloud services, for charities What are cloud services? Different components of computing are available to users remotely over the internet and payable on demand or by subscription. Cloud services is the collective name for these...
by Eleanor Yerbury | Oct 5, 2022 | Uncategorized
Explaining the Shared Responsibility Model: Keeping your client, donor and supporter’s data secure in the cloud Cloud services are not secure by default The five core controls of Cyber Essentials will help protect your charity’s data and services from most...