A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I am looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there for […]
MFA for Cyber Essentials
Cyber Essentials and Multi-factor Authentication (MFA) What is MFA? Multi-factor authentication (MFA) is an authentication process that necessitates users to provide evidence of their identity through the submission of multiple verification methods, commonly known as “factors.” This approach ensures both the user’s identity and the legitimacy of their credential access. Two-factor authentication (2FA) is […]
A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders Episode List Episode 1: It’s Dark Out There. The threat landscape. Episode 2: Know Thyself. Hardware, software and information asset management. Episode 3: Knock, knock, who’s there? The problem with passwords. Episode 4: Who goes there? Friend or foe? Applying […]
A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I am looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there for […]
A Hitch-Hacker’s Guide to the Galaxy – Developing a Cyber Security Roadmap for Executive Leaders In this blog series, I will be looking at steps that your organisation can take to build a roadmap for navigating the complex world of cyber security and improving your cyber security posture. There’s plenty of technical advice out there […]
There’s never a ‘good’ time to suffer a cyber attack, but there are certainly a few dates in the year when the financial and reputational effects of a website or email failure will be more damaging than others. One of those key periods is approaching right now for the higher and further education sector: clearing and […]
UCISA has launched an excellent new resource to help institutions plan the communication response during a major cyber incident. The Cyber Incident Communications Toolkit, developed by the UCISA Security Group focuses on the importance of collaboration both internally and with partners to ensure provision of an effective and coordinated communications response with students, staff, funders, […]
Another year, another question set and new updates on Cyber Essentials (CE). Effective from 24th April, 2023, the new question set is called Montpellier, which sees only clarifications, with a light touch of the question set, unlike the major changes that were introduced last year for the current Evendine question set. With the new question […]
Author: Stuart McCulloch, Lead Cyber Essentials assessor Continuing on from the previous blog the other myths surrounding CE are: Myth 5 – If I use Remote Desktop Services or VDI environments, then the devices connecting to those services are out of scope Reality – This is not true. The devices themselves that facilitate the connection to […]
Author: Stuart McCulloch, Lead Cyber Essentials assessor Overview The Cyber Essentials (CE) scheme was introduced in 2014 with backing from the National Cyber Security Centre (NCSC). The requirements have changed over the years, with the introduction of new elements. The latest question set is the largest change ever and has created some misunderstandings. This blog is […]