Step 4 Architecture and Configuration – Design, build, maintain and manage systems securely. The technology and cyber security landscape is constantly evolving. To address this, organisations need to ensure that good cyber security is baked into their systems...
Step 3 Asset management – Know what data and systems you manage, and what business need they support. Asset management encompasses the way you can establish and maintain the required knowledge of your assets. Over time, systems generally grow organically, and it...
Step 2 Engagement and training – collaboratively build security that works for people in your organisation. People should be at the heart of any cyber security strategy. Good security takes into account the way people work in practice, and doesn’t get in...
Step 1 Risk Management – take a risk-based approach to securing your data and systems. Taking risks is a natural part of doing business. Risk management informs decisions so that the right balance of threats and opportunities can be achieved to best deliver your...
To assist organisations in managing their cyber security risks, this article identifies 10 components that must be considered. As of November 2021, it has been updated by the NCIS and is targeted at security professionals and technical staff in medium to large...
ESyn3rgy continues to demonstrate its ability to protect their customer data by securing the Cyber Essentials and Cyber Essentials Plus certifications. By meeting the more demanding requirements of the Cyber Essentials Plus award, ESyn3rgy will improve the resilience...