0800 082 2420 email
0800 082 2420 email

Cyber Essentials

Identify vulnerabilities in your IT systems, fix them and get certified

Jack

Managing Director

close
0800 082 2420

 

Get your IT systems ready for GDPR

Becoming compliant under the Government backed Cyber Essentials scheme is a great way of guarding against the most common cyber threats and demonstrate your commitment to cyber security. At Evaporate we can guide you through the process and ensure you pass.

What is Cyber Essentials?

The Government worked with the Information Assurance for Small and Medium Enterprises (IASME) consortium and the Information Security Forum (ISF) to develop Cyber Essentials, a set of basic technical controls to help organisations protect themselves against common online security threats.

The Cyber Essentials scheme is a well recognised, cyber security standard which organisations can be assessed and certified against. It identifies the security controls that an organisation must have in place within their IT systems in order to have confidence that they are addressing cyber security effectively and mitigating the risk from Internet-based threats.

 

The scheme focuses on the following five essential mitigation strategies within the context of the 10 Steps to Cyber Security guide:

 

 

Together we will ensure you’re effectively managing all of the above, get you certified and more importantly ensure your business is safe.

Where does this fit in with GDPR?

Cyber Essentials and GDPR compliance fit perfectly together.

Whilst gaining Cyber Essentials accreditation does not cover the wider governance systems for ‘management’ and ‘control’ of personal data it will show from the crucially important IT security perspective that you are ‘GDPR ready’.

 

It is certified evidence that you’ve implemented basic steps to protect your business and your data from cyber attacks and proves you’ve taken security seriously in the event of a breach.

 

How will we get you accredited?

We identify

We use technology and our qualified experts to search for weaknesses in your system.

We fix

After analysing and finding the weaknesses within your systems we set to work to fix the technical and procedural controls, where necessary.

We certify

We work with the Cyber Essentials accreditation bodies to prove your IT infrastructure fully meets the five technical controls that are required and obtain an official Cyber Essential certificate.