Author: admin

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Patch Management is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Patch Management is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] Vulnerabilities or security flaws are common in...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Malware Protection is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Malware Protection is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] An organisation should implement robust malware software...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Access Control is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Access Control is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] This control aims to ensure that only...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light"] Secure Configuration is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Secure Configuration is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] A new computer, network devices or installed...

[et_pb_section fb_built="1" _builder_version="3.22"][et_pb_row _builder_version="3.25"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|phone"]Boundary Firewall & Internet Gateway is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.25"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"]Why Boundary...

[et_pb_section bb_built="1" admin_label="section" _builder_version="3.0.91"][et_pb_row _builder_version="3.0.91"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" background_layout="light"] Over the past 12 months, we were busy producing useful blog content for our amazing audience of social followers, email subscribers, customers, and customers-to-be. Didn't have time to read it all? Here are the top 9 most popular posts...

[et_pb_section bb_built="1"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.105" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] What should business look for in their Outsourced IT Provider? [/et_pb_text][et_pb_text _builder_version="3.0.105" custom_padding="|100px||" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_text_align="left"] One of the hardest decisions any business needs to make is who their partners will be. This is especially true when...

We are proud to announce that Urban Network have achieved the Information Assurance for Small and Medium Enterprises (IASME) Governance Gold standard in addition to our existing Cyber Essentials accreditation.   About the IASME Governance standard The IASME Governance standard, based on international best practices and seen as a...

[et_pb_section bb_built="1" fullwidth="off" specialty="off" transparent_background="off" allow_player_pause="off" inner_shadow="off" parallax="on" parallax_method="off" padding_mobile="on" make_fullwidth="off" use_custom_width="off" width_unit="on" make_equal="off" use_custom_gutter="off" custom_padding="0px||0px|" custom_padding_tablet="0px||0px|"][et_pb_row][et_pb_column type="2_3"][et_pb_text background_layout="light" text_orientation="left" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.66"] Mayday was growing rapidly, nearly double its size and turnover since last year. It soon realised that the existing IT system...