ITM Cyber Essentials
Cyber Essentials is a comprehensive and highly acclaimed security standard that is recognised by the European Union. ITM has helped many Irish companies to achieve this certification.
It has been specifically designed to assist organisations of all types and sizes in safeguarding against the numerous and widespread cyber threats that exist today. Cyber Essentials is considered to be a fundamental level of certification and can be obtained by completing a detailed self-assessment questionnaire, which is then thoroughly examined and verified by security specialists at ITM. This standard is equivalent to ISO 27001.
It has been specifically designed to assist organisations of all types and sizes in safeguarding against the numerous and widespread cyber threats that exist today. Cyber Essentials is considered to be a fundamental level of certification and can be obtained by completing a detailed self-assessment questionnaire, which is then thoroughly examined and verified by security specialists at ITM. This standard is equivalent ISO 27001.
Essentially, the Cyber Essentials programme bestows basic and effective cybersecurity guidelines for companies to follow. It particularly focuses on cyber threats that are simple to execute by even the most unskilled attackers.
The plan incorporates five essential areas of IT security controls, which together can stop around 80% of cyber-attacks known today:
By gaining the Cyber Essentials Certification, an organisation can greatly reduce the likelihood of suffering a cyber-attack. Whether big or small and regardless of industry, Cyber Essentials is applicable for all business types.
The audit includes extensive testing of your IT security including (but not limited to):
(sometimes referred to as ethical hacking) – simulating a cyberattack to try and break through your firewall.
Vulnerability scan of devices to look for vulnerabilities relating to unpatched software.
Testing Email Client defences and Internet Browser defences by seeing if malware files are blocked on download from either an email or internet page.
Testing for Two-Factor Authentication – ensuring this is set up to access cloud services such as Microsoft 365.
"*" indicates required fields