We are delighted and proud to have been re-certified by Cyber Essentials, a government-backed accreditation designed to enhance Internet security among UK businesses. We have now held our Cyber Essentials Plus certification for two years, and in this time have greatly enhanced the technical security controls embedded in our cloud-based software solution.
What Is Cyber Essentials?
The Cyber Essentials scheme was created in 2014 by the National Cyber Security Centre, a division of GCHQ. The scheme establishes a series of best practices, safeguards, and a cybersecurity knowledge base. The purpose is to increase awareness of Internet security issues among an organisation’s employees and to bolster protection against the most common cyber threats. As most attempted cyber-attacks are opportunistic and unsophisticated – like a thief trying a door to check if it’s unlocked – the majority of threats can be counteracted by implementing basic security measures.
There are two levels of certification available. The entry-level Cyber Essentials certification involves deepening an organisation’s cybersecurity awareness and implementing basic safeguards. A more in-depth approach is embodied by the Cyber Essentials Plus accreditation, which involves more extensive security measures and processes.
Accreditation involves an independent audit to ensure the business complies with Cyber Essentials security principals and the GDPR data protection regulations.
Cyber Essentials & Statement Matching – What It Means For Our Customers
As a SaaS provider hosting our customers’ financial data, our Cyber Essentials certification brings great benefits to our customers. It not only demonstrates that we take cybersecurity seriously as a business, but also gives peace of mind that our software provides the highest level of Internet security for you and your customers.
We strongly recommend Cyber Essentials for any business that uses Internet-enabled devices or software. It can help protect you and your customers from malware, ransomware, and viruses, strengthen your Internet connections, and help control user access to sensitive data.