Cyber essentials are
government- backed cyber security certification that helps to focus on business
objectives and protected from common cyber attacks. Following 10 steps to cyber
security published on 2012 and using steps means protecting organization from
cyber attacks.
- · Risk Management Regime
Defining
Risk management regime is central in an organization overall cyber security
strategy.
- · Secure Configuration
Security
patches should be applied to ensure the maintenance of secure configuration of
ICT systems.
- · Network Security
Network
should be protected against external and internal attacks by managing network
perimeter and filtering out unauthorized access and malicious content.
- · Managing User Privileges
Account
management processes should be established and the number of account privileges
should be limited
- · User Education and Awareness
User
security policies, staff training should be established and user awareness of
cyber risk should be maintained
- · Incident Management
Incident
response and disaster response capability should be established
- · Monitoring
Monitoring
strategy and supporting policies should be produced
- · Removable Media Controls
A
control should be produced to control all access to removable media
- · Home and Mobile Working
- · Malware Protection
Anti
malware should be established
No comments:
Post a Comment