Cyber Essentials Framework compliance for Microwave Marketing

Cyber Essentials Framework compliance for Microwave Marketing

Following further investment and support of our IT team at Datcom, Microwave Marketing are pleased to announce completion of our stage one security strategy with compliance to Cyber Essentials framework. Led by our Director Ben Skipper, the team have completed a programme of Educational awareness and hardware upgrade within the business. Hardware improvements utilised features within our existing Enterprise server and Office 365 platforms to enhance security of information management. Our reliance on mobile working gave us additional challenges that the team overcame with encryption and enhanced VPN use.

Summary introduction from the Cyber Essentials website states:

“A primary objective of the UK Government’s National Cyber Security Strategy is to make the UK a safer place to conduct business online. However, determining the benefits of cyber security and knowing where to start are a significant challenge for many organisations. This document presents requirements for mitigating the most common Internet based threats to cyber security. Firstly specific types of attack are identified and secondly the most basic technical controls an organisation needs to have in place are described. Deploying these controls will assist every UK organisation in defending against the most common forms of cyber attack emanating from the internet using widely accessible tools which require little skill from the attackers. Organisations implementing these controls can benefit by gaining confidence that basic technical security measures are in place and that important steps are being taken to protect its information and the information of its customers. The document was developed in collaboration with industry partners, including the Information Security Forum (ISF), the Information Assurance for Small and Medium Enterprises Consortium (IASME) and the British Standards Institution (BSI), and is endorsed by Government. The technical controls within this document focus on five essential mitigations within the context of the ‘10 Steps to Cyber Security’. They reflect those covered in well-established and more extensive cyber standards, such as the ISO/IEC 27000 series, the ISF’s Standard of Good Practice for Information Security and the IASME Standard.

Read more..