Cyber Essentials Certification requires 5 key cyber security controls to be in place. This series of articles focuses on each control individually. Today we are looking at: Secure Configuration
You can find an introduction to Cyber Essentials here.
Secure configuration is reached by choosing the most secure settings for your devices and software and managing that process to ensure these controls remain in place. Without effective configuration management procedures, your systems are at exposed to additional risks including:
How to securely configure your system?
There are several keys factors which must be addressed for secure configuration, which include:
With the wide array of IT products used by modern businesses, however, secure configuration can seem challenging to achieve. Complex network infrastructures, servers, hardware, operating systems, software, applications etc all need to be configured securely. This must be achieved, in a way that allows them to interact effectively without negatively impacting functionality.
Secure configuration should be only one factor of your organisations security strategy. A layered approach to IT security is essential as no one element of IT security can protect your system from all the threats it faces. You need a set of different but complementary tools working together to protect your system from harm. Let our consultants take your IT from zero to hero by bullet-proofing your systems across the board.
The next step? Contact us today for more information on Secure Configuration and our cost effective Cyber Essentials service.
RedMosquito Ltd. provides IT support and managed services across Glasgow, Edinburgh and throughout Scotland.