Protects against 80% of cyber attacks – Protecting yourself against the most common cyber attacks, safeguarding important information about your employees, customers and partners.
Cyber Essentials is a government-backed scheme that helps businesses to protect themselves against a whole range of the most common cyber attacks. It also gives you a certification to show your employees, customers and business regulators that you take the threat of cyber attacks seriously.
By having a Cyber Essentials certification, there is evidence that you have carried out the basic steps towards protecting your business and your data from cyber attacks. This offers a good starting point in ensuring your cyber security is GDPR compliant.
Demonstrates commitment to security – By showing you care about cyber security and having procedures in place to minimise this risk, you illustrate that you are committed to safety and security.
Gives you a competitive edge – Having the Cyber Essentials Certification puts you ahead of your competitors.
Talk to Infologic about your Cyber Essentials needs.
By having the Cyber Essentials qualification in place, you provide evidence that you have carried out steps to protecting your business’s cyber security, which is vital for GDPR compliance.
As part of this compliance, you must protect the integrity and confidentiality of any personal data you hold, and you must determine your own cyber security approach.
Cyber Essentials offers a good starting point for the cyber security of the IT you rely on to hold and process personal data.
There are two levels of certifications:
- Cyber Essentials – organisations self-assess their systems and this is independently verified.
- Cyber Essentials Plus – systems are independently tested and Cyber Essentials is integrated into the organisation’s information risk management.
Annual re-certification is recommended in order for your business to stay up to date and current. The Council of Registered Ethical Security Testers has developed an assessment framework, which assesses boundary firewalls and Internet gateways, secure configuration access control, malware protection, and patch management.