Why every company should get Cyber Essentials

How does Cyber Essentials benefit MSPs and their customers?

Cyber Essentials

Cyber Essentials is a UK-Government-backed cyber-security scheme which encourages businesses to take steps in order to prevent and protect themselves against the threat of cyber-attack. What you might not be aware of, however, is how beneficial a Cyber Essentials certification can be for managed service providers (MSPs) and their customers.

How to get Cyber Essentials certified

According to the official Cyber Essentials statistics, nearly half of businesses reported a cyber-attack in the past 12 months. And this is why the scheme dedicated to helping ensure businesses stay secure.

The Cyber Essentials certification serves as proof of your IT resilience, educating businesses across all sectors on the best way to protect themselves from a range of the most prevalent and threatening cyber threats. The Cyber Essentials certification is not just an award, but an ongoing education and protection process in which a business must put in place a range of security procedures and policies which help ensure sufficiently high levels of cyber-security within their IT infrastructure.

This helps prevent the risk of your business facing a cyber-attack, as well an ensuring that you have the infrastructure in place to appropriately counter and recover from an attack in the event of a disaster.

How does this Essentials benefit MSPs’ customers?

The threat of cyber-attack is heightened as an MSP or reseller and poses a very real threat to your customers, as well as your business. In order to tackle this, IT resellers can position themselves as cyber-security specialists, working with your customers to help them achieve a Cyber Essentials certification and transform their IT resilience.

This presents an incredible opportunity for you to add value for your customers and demonstrate your technical knowledge, helping them to make changes within their IT that will build their tolerance and tackle basic weaknesses and exploits in their infrastructure, preventing thousands of pounds worth of damage and threatening the survival of their business.

If you have any questions around Cyber Essentials and our partner hub or just want to have a chat, drop us a line at hello@cybersmart.co.uk.

This article was previously published by Marathon PS – one of our first partners.

Looking to improve your cybersecurity but not sure where to begin? Start by getting certified in Cyber Essentials, the UK government scheme that covers all the fundamentals of cyber hygiene.

CTA button

Cyber security policies 101 – information security policy

Information security policy

Cybersecurity and data protection can seem overwhelming. There’s a glut of advice on the internet, but it’s difficult to know where to start. At CyberSmart, we believe cybersecurity should be accessible and easy for everyone. So we’ve compiled a series of useful policies and procedures to help you find your way through the cyber-compliance jungle. This time, we’re looking at how to set up an information security policy.

(more…)

Cybersecurity and data protection can seem overwhelming. There’s a glut of advice on the internet, but it’s difficult to know where to start. At CyberSmart, we believe cybersecurity should be accessible and easy for everyone. So we’ve compiled a series of useful policies and procedures to help you find your way through the cyber-compliance jungle. This time, we’re looking at how to set up an information security policy.

(more…)

Five simple steps to (actually) securing your company’s sensitive information

Ignore this at your peril…

You’ve built a business, solved a problem, hired a team and planned for your future. There’s only one thing that can bring your empire crashing down before you can say “two-factor authentication”, and that’s a data leak. Since we’re literally obsessed with security, we’ve brought in the big guns — Jamie Akhtar of CyberSmart— to get you back on track.

(more…)

Ignore this at your peril…

You’ve built a business, solved a problem, hired a team and planned for your future. There’s only one thing that can bring your empire crashing down before you can say “two-factor authentication”, and that’s a data leak. Since we’re literally obsessed with security, we’ve brought in the big guns — Jamie Akhtar of CyberSmart— to get you back on track.

(more…)

Cyber Security 101 – Passwords

Passwords

Cybersecurity and data protection can be overwhelming. There’s enormous amount of advice on the internet, but it can be difficult to know how to get to started. At CyberSmart, we believe that Cybersecurity should be accessible and easy for everyone. So we’ve created a series of guides on how to protect your data, this week we’re tackling passwords. 

(more…)

Cybersecurity and data protection can be overwhelming. There’s enormous amount of advice on the internet, but it can be difficult to know how to get to started. At CyberSmart, we believe that Cybersecurity should be accessible and easy for everyone. So we’ve created a series of guides on how to protect your data, this week we’re tackling passwords. 

(more…)

Ciao Compliance™ – Traditional compliance is dead

Compliance

In cyber, traditional compliance models are ineffective, inefficient and can sometimes cause a headache. So we decided to say CIAO to traditional compliance.

(more…)

In cyber, traditional compliance models are ineffective, inefficient and can sometimes cause a headache. So we decided to say CIAO to traditional compliance.

(more…)

Cyber Essentials and Charities

Charities

We are thrilled to be partnering with IASME and Tresor Security to offer discounted Cyber Essentials Certifications for £225 plus VAT (instead of £300 plus VAT) and FREE platform use for one year for registered charities.

(more…)

We are thrilled to be partnering with IASME and Tresor Security to offer discounted Cyber Essentials Certifications for £225 plus VAT (instead of £300 plus VAT) and FREE platform use for one year for registered charities.

(more…)

One more GDPR post

At every cyber security event, people talk about the new General Data Protection Regulation (GDPR). It seems as the Cyber Security industry is obsessed with this new law and makes sure that everyone else knows about it too. Companies, consultants and lawyers are hopping on the GDPR train, because there is a significant opportunity for new services and products. However, there is also a lot of misconception going around and scaremongering, which is stereotypical for the cyber security industry.

(more…)

At every cyber security event, people talk about the new General Data Protection Regulation (GDPR). It seems as the Cyber Security industry is obsessed with this new law and makes sure that everyone else knows about it too. Companies, consultants and lawyers are hopping on the GDPR train, because there is a significant opportunity for new services and products. However, there is also a lot of misconception going around and scaremongering, which is stereotypical for the cyber security industry.

(more…)

Cyber Security 101 – User Access Control

User Access Control

Cybersecurity and data protection can be confusing. There’s a wealth of information out there, but what’s good advice and what’s bad? And how do you get started once you know what you need to do? At CyberSmart, we believe that Cyber Security should be accessible and easy for everyone. So, we’ve put together a set of simple guides to help you get started, this time we’re talking user access control.

(more…)

Cybersecurity and data protection can be confusing. There’s a wealth of information out there, but what’s good advice and what’s bad? And how do you get started once you know what you need to do? At CyberSmart, we believe that Cyber Security should be accessible and easy for everyone. So, we’ve put together a set of simple guides to help you get started, this time we’re talking user access control.

(more…)

Using AWS and automated deployment processes securely

(1) AWS: Remove (or do not generate) root account access keys

To access Amazon Web Services (AWS), an access key is required to verify your identity and the identity of your applications. An access key consists of an access key ID and a secret access key. Anyone with the access key for your root account has unrestricted access to all of your account.

(more…)

(1) AWS: Remove (or do not generate) root account access keys

To access Amazon Web Services (AWS), an access key is required to verify your identity and the identity of your applications. An access key consists of an access key ID and a secret access key. Anyone with the access key for your root account has unrestricted access to all of your account.

(more…)