Cyber Security

Get Your Cyber Essentials Certification

What is Cyber Essentials?

Cyber Essentials is a simple but effective, Government backed scheme, created to help you protect your organisation against a range of the
most common cyber attacks.

Cyber attacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals.

Cyber Essentials and Cyber Essentials Plus are Government backed certifications to demonstrate to your customers and other stakeholders you are serious about protecting them and their data. By having Cyber Essentials in place you will reduce your own companies cyber risk by around 80%

How Does Cyber Essentials Work?

  • To gain certification, Cyber Essentials ensures you have taken steps to protect yourself and others from cyber threats.
  • It also allows you to carry out remedial work and process changes that are needed to become certified.
  • Cyber Essentials Plus is the full certification that allows you to display logos and certification to show others you comply and are serious about cyber security.
  • Cyber Essential Plus –  Midland Comms gives you a guided hand through the process to ensure a 100% guaranteed pass rate

And Afterwards?

Re-certification is annual so we recommend an on-going compliance monitoring.

The Midland Comms Cyber Compliance can constantly and remotely scan for vulnerabilities and checks if you are aligned with the 5 Cyber Essentials Plus controls. This provides on-going protection and helps ensure you are compliant when it is time for re-certification renewable.

The Five Controls of Cyber Essentials

Cyber Essentials sets out five controls which you can implement immediately to strengthen your cyber defences:

  • Use a firewall to secure your internet connection
  • Choose the most secure settings for your devices and software
  • Control who has access to your data and services
  • Protect yourself from viruses and other malware
  • Keep your devices and software up to date
Firewall Protection image

Firewall Protection

You should protect your internet connection with a firewall. This effectively creates a ‘buffer zone’ between your IT network and other external networks. In the simplest case, this means between your computer (or computers) and ‘the internet’. Within this buffer zone, incoming traffic can be analysed to find out whether or not it should be allowed onto your network.

Data Back up image

Secure Access to Data

To minimise the potential damage that could be done if an account is misused or stolen, staff accounts should have just enough access to software, settings, online services and device connectivity functions for them to perform their role. Extra permissions should only be given to those who need them. Important Data should be backed-up off-site.

Data Back up image

Malware & Hacking Prevention

Malware is short for ‘malicious software’. One specific example is ransomware. This form of malware makes data or systems it has infected unusable – until the victim makes a payment. Viruses are another well-known form of malware. These programs are designed to infect legitimate software, passing unnoticed between machines, whenever they can.

Once you have taken the time to investigate and put them in place, these five basic controls will put you and your organisation on the path to better cyber security. Cyber Essentials Certification should be your next target, but you can work towards that goal at a pace which suits you. In the meantime, you can check how much progress you’ve already made by completing the handy checklists laid out below.

If you feel your organisation needs help to fast-track to a secure I.T. environment and to get you through to Cyber Essentials certification you can call upon Midland Comms to make the required compliance checks and changes.

DIY Checklist

Use a firewall to secure your internet connection

  • Understand what a firewall is
  • Understand the difference between a personal and a boundary firewall
  • Locate the firewall which comes with your operating system and turn it on
  • Find out if your router has a boundary firewall function. Turn it on if it does.

Choose the most secure settings for your devices and software

  • Know what ‘configuration’ means
  • Find the Settings of your device and try to turn off a function that you don’t need.
  • Find the Settings of a piece of software you regularly use and try to turn off a function that you don’t need
  • Read the NCSC guidance on passwords
  • Make sure you’re still happy with your passwords
  • Read up about second factor authentication

Control who has access to your data and services

  • Read up on accounts and permissions
  • Understand the concept of ‘least privilege’
  • Know who has administrative privileges on your machine
  • Know what counts as an administrative task
  • Set up a minimal user account on one of your devices

Protect yourself from viruses and other malware

  • Know what malware is and how it can get onto your devices
  • Identify three ways to protect against malware
  • Read up about anti-virus applications
  • Install an anti-virus application on one of your devices and test for viruses
  • Research secure places to buy apps, such as Google Play and Apple App Store
  • Understand what a ‘sandbox’ is

Keep your devices and software up to date

  • Know what ‘patching’ is
  • Try to set the operating system on one of your devices to ‘Automatic update’
  • Try to set a piece of software that you regularly use to ‘Automatic update’
  • List all the software you have which is no longer supported

Help Us With Cyber Essentials

Data Back Up and Protection

Business Continuity Made for Small Businesses.

As a small business owner, you’re always on. Your customers rely on you, as much as you rely on them. There’s no such thing as downtime, and you can’t afford to leave things to chance.
Midland gives you peace of mind knowing that no matter what happens, your business is protected from data disasters. Our business continuity solution brings together a compact, reliable device and a secure cloud storage environment.

The result is an affordable backup, recovery, and business continuity solution.

Double Protection, Big Time Security.

Data protection/back-up is provided both locally, on-premise and in the Cloud, in secure purpose-built data centres.

What you get is:-

  • Full Data Backup, including your operating systems and applications from Windows or Linux, and files and folders from your Mac automatically to the local device  with copies in our secure cloud storage environment.
  • Fast Critical Data Recovery.
    Should you experience a server failure, we can have your Windows or Linux environment and data recreated in minutes from the Cloud, and have your Mac files and folders recovered just as quickly.
  • Proof of Successful Backup.
    Visual proof in the form of a screenshot and service verification gives you peace of mind that your data has been successfully backed up.

Affordable backup, recovery, and business continuity solution.

Fill in the form below to arrange for a FREE IT Health Check or to request more information on Business Continuity.

We Are In IT Together.

Fill in the form below to arrange for a FREE IT Health Check or to request more information on Business Continuity.

We Are In IT Together.

Free IT Health Check

Maybe your current system is out-dated, slow and inefficient, or just needs improving. If you want to investigate a staged update, or complete upgrade of your systems, let us do the work for you. Start With A Free Health Check

FREE IT Health Check. Just Ask!

7 + 9 =

Other IT Services

IT Solutions

Midland have many solutions available to help with any IT need including Network cabling and Wireless networks, Voice & Data, UPS installation, Hardware and Software supply, Virtualisation, Data Backup and much more…

IT Consultancy

From a licence audit to a new virtual server farm, growth strategy to protection against external threats, cost reduction to disaster recovery – Midland can analyse and make impartial recommendations specific to your needs…

Voice & Data

Midland can provide your infrastructure – including MPLS or Fibre Leased Lines – as well as supply, install and maintain your telephone systems, whether it be adding an extension to your existing system to fitting a new unified VoIP system or simply moving your office – we are in IT together!

One IT Company. A Complete IT Solution.

We Are In IT Together

Pin It on Pinterest