Red Mosquito - Blog

Cyber Essentials and Secure Configuration

Cyber Essentials Certification requires 5 key cyber security controls to be in place.  This series of articles focuses on each control individually.  Today we are looking at: Secure Configuration 

You can find an introduction to Cyber Essentials here.

What is secure configuration? 

Secure configuration is reached by choosing the most secure settings for your devices and software and managing that process to ensure these controls remain in place.  Without effective configuration management procedures, your systems are at exposed to additional risks including: 

  • Users gaining access to restricted data 
  • Accidental or malicious changes to or uses of data 
  • Users making changes to systems – leaving them at risk by removing protections 

How to securely configure your system? 

There are several keys factors which must be addressed for secure configuration, which include: 

  • Check settings – of all new devices and software. Default configurations of new devices are often open, with ‘everything on’.  Robust policies controlling software installation, configuration and ongoing management should be in place.  
  • Systems should be configured to prevent the installation of unauthorised software. 
  • Password control –  Devices often come with default passwords enabled or no password enabled.  These should be changed before the devices are distributed in your organisations.  You should have a company password policy in place with 2 factor authentication activated where possible.  
  • Auto run features – should not be enabled unless necessary 
  • Windows – many unnecessary services will run unless disabled and will expose your systems to risk.  Such unnecessary functionality must be identified and disabled.
  • Vulnerability scans – regular scans can help you manage vulnerabilities  
  • Ensure you are using supported software and have robust patch management policies 

Secure configuration as a managed service? 

With the wide array of IT products used by modern businesses, however, secure configuration can seem challenging to achieve.  Complex network infrastructures, servers, hardware, operating systems, software, applications etc all need to be configured securely.  This must be achieved,  in a way that allows them to interact effectively without negatively impacting functionality. 

How can RedMosquito help?

Secure configuration should be only one factor of your organisations security strategy. Alayered approach to IT security is essential as no one element of IT security can protect your system from all the threats it faces. You need a set of different but complementary tools working together to protect your system from harm. Let our consultants take your IT from zero to hero by bullet-proofing your systems across the board. 

 The next step?  Contact us today  for more information on Secure Configuration and our cost effective Cyber Essentials service. 

 RedMosquito Ltd. provides IT support and managed services across Glasgow, Edinburgh and throughout Scotland. 

The Growing Importance of Cybersecurity for Irish SMEs in 2025

The Growing Importance of Cybersecurity for Irish SMEs in 2025

Introduction The digital world is evolving at an unprecedented pace, and with it, the risks that businesses face are also growing. Cybersecurity is no longer just a concern for large corporations; it has become a critical priority for Small and Medium Enterprises (SMEs) in Ireland. Many SMEs mistakenly believe that[…]

19 Mar 2025
The Future of IT Support: How Irish Businesses Can Stay Ahead in 2025

The Future of IT Support: How Irish Businesses Can Stay Ahead in 2025

Introduction The way businesses approach IT support is undergoing a significant transformation. In the past, IT support was primarily reactive—companies would only call for help when something broke. However, in 2025, Irish businesses must adopt a proactive approach, ensuring that systems remain efficient, secure, and[…]

18 Mar 2025
Disaster Recovery Planning: Why Irish Businesses Need It in 2025

Disaster Recovery Planning: Why Irish Businesses Need It in 2025

Introduction Unexpected IT failures, cyberattacks, and natural disasters pose serious risks to businesses. Without a solid disaster recovery plan (DRP), companies may suffer data loss, operational downtime, and financial damage.

17 Mar 2025
Cloud Computing Trends: How Irish Businesses Can Benefit in 2025

Cloud Computing Trends: How Irish Businesses Can Benefit in 2025

Introduction Cloud computing is no longer just an IT trend; it has become the foundation of modern business operations. Over the past decade, companies in Ireland have transitioned from traditional on-premise IT infrastructure to cloud-based solutions, benefiting from scalability, flexibility, and cost efficiency.

15 Mar 2025