We'd love to hear from you

If you have an enquiry about our solutions or services then feel free to drop us a line to see how we can help.

News


Don’t let the storm of GDPR catch you out, BA face £183m in fines.

Don’t let the storm of GDPR catch you out, BA face £183m in fines.

In recent news, British Airways has been given notice of a record-breaking £183 million fine, followed a day after by Marriott Hotels at £99.2 million.

The reason? Breaching data protection laws. This should be enough to unnerve anyone responsible for cyber security and handling personal data, whether they are a large corporate, or a small business.

Don’t fall into the same pit, it certainly won’t be easy to get out of…

What happened to British Airways and Marriott Hotels?

British Airways’ fine of £183 million represented 1.5% of its turnover in 2017, which was only achieved as a reduction to the maximum penalty through cooperation with the ICO investigation. If the ICO had sought the maximum fine of 4% of BA’s total revenue, the bill could’ve been £489m.

For Marriott Hotels, Information Commissioners Office are proposing a £99.2m fine.

It’s said that about 30 million of the hacked guest records related to residents of 31 countries in the European Economic Area. Seven million related to UK residents.

The General Data Protection Regulation (GDPR)?

The GDPR came into force in May 2018 and is the biggest transformation to data protection and privacy in the past 20 years. The GDPR gives data regulators the power to fine up to £18m, or 4% of annual global turnover, whichever is greater. In a new attempt by European policymakers to incentivise security practices and stop large-scale data breaches.

Last year Facebook was fined £500,000 by the ICO, which involved the data of up to 87 million users improperly being shared with third-party developers without sufficient consent. Given Facebook’s worldwide revenue was £31.5bn in 2017, they could have received a fine of up to £1.26bn had the case had been eligible under GDPR.

 

Small & Medium sized business are not immune.

It is a common mistake to think that your business will not be targeted. Most hackers are conducting their attacks at random – with businesses often falling victim to malicious software breaching their network, at the fault of a staff member inadvertently clicking on a suspect link in an otherwise unassuming email.

 

How can I protect our business from a Data breach?

If you’re unsure at this point, we’d recommend giving us a call; we’d be more than happy to advise your next steps.

This is not the best time to be worrying whether your security is up to date or not.

Which brings us onto the first point, cyber security best practice.

Making sure you’ve got the most appropriate security for your business, whilst also applying updates frequently to solidify its performance and protection. You don’t want to be left vulnerable simply because you’ve delayed the patch by a week or two.

Another major point; it is a legal requirement of GDPR to ensure you back-up your data, and ensure it is encrypted.

Whether this data resides on personal laptops, or stored away in remote data facilities via the internet, every business regardless of size should employ a 3-2-1 backup rule to best mitigate data loss & minimise the impact of an outage.

 

 Lastly, but very much still incredibly important, is to ensure that your team are trained and aware of their susceptibility to cyber-attack.

As discussed in a previous blog, phishing takes its aim directly at your team; firing emails left, right and centre, embedded malicious attachments and links to fraudulent websites, from which software to steal or corrupt your data can manifest itself into your network. Staff awareness is key to data protection, if your front-line team understand this level of importance, you’ll have few issues keeping out of its path.

 

We’re Urban Network, we can help save your Business.

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Save money by axing ISDN Telephony

Save money by axing ISDN Telephony

 Are you still using ISDN…?

As opposed to PSTN, (Analogue Lines), that are classically used at home for your phone & broadband line, ISDN, (Integrated Services Digital Network), combines more than a few pairs of copper cables, allowing businesses to operate with multiple telephone calls at once. Following the pattern with all legacy forms of communication, ISDN is expensive and restrictive; often seeing businesses spend quite a few hundred pounds per quarter for telephone lines & calls alone.

ISDN is the still the principal of voice communications for most businesses, but the end-of-life is already in the horizon for this 30-year-old technology. BT have announced their intentions to ‘switch off’ all these services by 2025, and therefore drive forward the adoption of VoIP (Voice-over-IP) telephony by trades up and down the country.

 

IS NOW THE TIME?

There has not once been a better time to evaluate your communications by choosing to axe your use of ISDN whenever your contract permits. You can benefit from the instantaneous cost savings, while increasing your productivity by moving to VoIP technology.

Commissioning VoIP shouldn’t be a painful & costly experience – there are many different services and options available these days, with such a competitive marketplace ensuring costs are kept to a minimum. Switching from older methods of telephony doesn’t mean you have to leave your records behind; you can swiftly & easily port these crossways onto VoIP, enabling you to carry on making & receiving calls as you always have.

 

BUT, WHAT ABOUT MY INTERNET CONNECTIVITY?

Switching from ISDN to VoIP means that your calls will no longer be running fearful over those pairs of copper cables, but instead across your broadband connection. However, this does mean you’ll require a reasonably quick & steady internet connection to handle your volume of voice traffic, in addition to the data usage for visiting websites, sending/receiving emails and using cloud tools.

In some areas this isn’t an instant possibility – if your business suffers from sluggish ADSL speeds, and has yet to benefit from access to a fibre connection of some form, you may be anxious about the prospect of doing away with the steadiness of ISDN.

Nevertheless! In many cases we’ve seen the savings made from switching from ISDN to VOIP aid in the justification and backing of a dedicated fibre, (known as a Leased Line), connection. By upgrading to a Leased Line, you’ll benefit from a superfast fibre connection directly from your premises to the BT Exchange and achieve a much faster connection, which is stable and supported by the network operator on a contractual service level agreement.

As Leased Lines are run on an dispersed basis to each premises, you are not confined to the restrictions of the current Openreach fibre rollout plans – which sees fibre run only from the Exchange to the local cabinets, (with copper still being used between your building & the cabinet as before). Leased Lines, among numerous other connectivity options, are open to businesses wherever you may be located.

With the extra speed & data capacity brought with the installation of a Leased Line, any pain of switching to VoIP is eliminated. Your Leased Line would be more than suitable to carry your voice traffic over VoIP, meanwhile providing your team with a much quicker & dependable connection to the internet than ever before.

 

WHAT ARE MY OPTIONS?

There are numerous different facets to such a project… but, we’re here to help.

At Urban Network, we specialise in learning our clients’ business and best applying technology to their needs.

If you would appreciate a free brief discussion about your operational challenges & to explore the options for your business, please get in touch today – 020 7749 6899 or drop us a line hello@urbannetwork.co.uk.

Don’t be restrained by slow broadband speeds!

Don’t be restrained by slow broadband speeds!

 How is your broadband speed?

In the digital age, internet connectivity is as vital to our livelihoods as electricity. Despite being in the country’s capital, you might still be suffering from a lack of full fibre broadband, which is holding back the productivity of your business and is ultimately costing you time & money.

But there are options accessible – just because the big network operators aren’t connecting your building to superfast services, doesn’t mean that you can’t get admission to faster services via alternate means.

 

SOUNDS EXPENSIVE…

Yes, as you would expect, running a dedicated fibre line (a fibre Leased Line) into your business is more pricey when compared to traditional broadband services. But! With most businesses, this doesn’t mean you have to increase your comms budget. If you are still using ISDN lines for your telephony, then you have some choices.

ISDN, still the staple of voice communications for most businesses, has its end-of-life already in the distance following well over 30 years of use. BT have announced their intentions to ‘switch off’ all these services by 2025, and therefore drive forward the implementation of VoIP (Voice-over-IP) telephony by businesses up and down the country.

By choosing to bin your use of ISDN whenever your contract permits, you can benefit from the instant cost savings, which in-turn can fuel the budget for the fibre Leased Line.

 

BUT, WHAT DO I DO THEN ABOUT PHONE CALLS?

By converting to full fibre, you will have the internet speed & line reliability to make VoIP a possibility. VoIP instead carries your voice calls over your broadband connection, and no longer over the copper ISDN cables.

Implementing VoIP doesn’t have to be a painful & costly experience – there are so many unique services and choices available these days, with such a competitive marketplace ensuring costs are kept to a minimum. Switching from older forms of telephony doesn’t mean you have to leave your contacts behind; you can swiftly & easily port these across onto VoIP, enabling you to carry on making & receiving calls as you always have.

 

Want the best for your business?

At Urban Network, we approach everything we do with an open mind.

If you have any concerns, questions or simply want to explore how to better secure your business, please do get in touch with the team for a FREE demonstration and initial consultation to explore how exposed your business might actually be.

To book a consultation or to arrange a further discussion, please get in touch via our form here, call 020 7749 6899 or email us hello@urbannetwork.co.uk.

Keeping your data protected… with Office 365 Advanced Threat Protection

Keeping your data protected… with Office 365 Advanced Threat Protection

Keeping your data protected… with Office 365 Advanced Threat Protection

We released a blog back in June 2017, soon after the release of the Advanced Threat Protection (ATP) service within Office 365. As a brief re-cap; in the wake of the rise in email born cyber-attacks, Microsoft released ATP as their optional add-on security service. Filtering emails, with little impact on productivity, ATP is among the strongest of the add-ons suite to 365, which we strongly urge businesses to adopt.

Including key features, such as Safe Links, ATP prevents users from inadvertently clicking on malicious links embedded within phishing emails that are falsely representing themselves from a genuine source, such as a bank, government body or trusted brand name.

Safe Attachments, protects your users from opening potentially damaging email file attachments, which can be embedded with viruses or malicious code that can install software in the background of a PC designed to steal or corrupt data, without the user even realising.

 

ATP has been around since 2017, so what’s new?

A key feature, which has been added to the service’s Anti-Phishing tools, focuses on Impersonation Detection. ATP has been working to defend against phishing attacks for quite some time, however attacks known as, “spear-phishing” or “whaling”, where criminals impersonate a trusted sender often targeting individuals within a business that may have access to valuable data, are far more difficult to detect.

If the hacker can get their email delivered to their intended target, they are far more likely to be fooled by domain name impersonation. Where two very similar names are used, so similar in fact, that at first glance most users wouldn’t notice anything wrong with the email.

The new Impersonation Detection service works to detect lookalike email addresses and domain names that may be used to trick users. Using “mailbox intelligence”, ATP will determine whether the email being received is from a trusted email sender, or a new email address. Security warnings will then automatically be applied to unknown email addresses, helping to draw user’s attention to possible risks.

This feature, among all other ATP tools, are included within the Office 365 Advanced Threat Protection bolt-on product, which are included as-standard with the Enterprise E5 license.

 

Could someone impersonate my domain?

Simple answer, yes. It is surprisingly easy for those with relatively basic knowledge of cyber hacking to mask your domain and an email address, then start firing out emails set to steal valuable data, or simply cause disruption & down time.

One particular risk with domain impersonation isn’t necessarily criminals impersonating other people’s domains, but them choosing to impersonate your domain, with the one key objective of fooling your own staff.

Recent examples include, a Finance Director’s email account being impersonated – with an accurate mask of the name, full email address, and even his email signature! An email gets sent from this fake account to another member of the Accounts Department, asking them to make payment on a fictitious invoice to a particular bank account. The email is well written in English and has a sense of urgency. Not wanting to upset their boss, the team members makes the payment as instructed. Losing the business thousands in one simple unknowing mistake.

 

How can I use ATP to protect against this impersonation?

ATP will automatically keep a look out for domains used within email addresses that are contacting your users. It will work to filter-out emails (based on your pre-defined choices) that fall into an untrusted category, perhaps a spoof domain that is very similar to your own (down to simple differences, such as being one character different), or from an unknown user/email address that doesn’t exist within your 365 – keeping your team out of harm’s way.

The threat management dashboard contains real-world statistical information on where emails are originating from, domains and users that have been impersonated. With this kind of information, you will be able to keep ahead of the threats.

Phishing

There is of course the risk that genuine emails may well be filtered out, so you can of course view a list of all of the quarantined emails and choose to take action on them all collectively or by individual email.

Phishing

 

What are the next steps?

If you are already a user of the Office 365 suite, you can bolt-on the ATP service almost immediately! Contact the team to receive support in obtaining and best-configuring the service to sufficiently protect your data, users and livelihoods.

 

Who are Urban Network?

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

Security, without the burden

Security, without the burden

Theft is on the rise!

Thieves are stealing from you… but, no longer are they climbing out of the bedroom window with your television. Today’s cyber criminals want to get access to your valuable & sensitive data, and with some slightly more sophisticated tools at their disposal, they are rather easily stealing your login credentials to get access to such private files & documents.

With businesses continually adopting cloud computing, it is only natural that cyber attackers are following this trend by shifting their focus towards these evolving cloud environments. They’re using their tried and tested methods, such as password guessing and phishing campaigns, to drive these attacks.

As one of the largest cloud communication & collaboration tools today, Microsoft’s Office 365 platform has become a particularly juicy target.

So, there’s most definitely a credible threat, completely regardless of your business size, type or location. But, what can you do about it?

 

Better secure your cloud services in a straight-forward way

Cyber Security tools & practices need not be ludicrously complex or expensive. There are many best practice methods that could be deployed within your business to mitigate the risk of attack & heavily reduce your vulnerability.

Multi-factor authentication (MFA), or often referred to as 2-factor authentication (2FA), is a straight-forward process of adding another user verification step, beyond just a password, to the login process for a system or cloud-based service.

As a simpler end-user friendly security provision, MFA typically triggers a single-use code to the user that must be input into the website/system before the login can complete. The code can be delivered to the user by text message, phone call or via an in-app notification – at the user’s choice.

Should a user receive such a notification without having requested it first, their account is likely vulnerable, and it would be advised to reset their password. Importantly, however, their account remains secure, as without the single-use code the account may not be accessed.

 

But this might be difficult for our users to adopt

The single-use codes may be difficult to rollout to your team without resistance. But there other means you can deploy to achieve the same goal – such as restricting the IP addresses from which user’s may login from, or control which devices may login through a pre-authorised list controlled by Azure Active Directory, are just two examples.

Businesses with the appropriate tier of licensing may be able to use conditional access to enforce the use of MFA within their organisation – giving users no choice but to comply with the more secure process.

 

New Office 365 guidance from Microsoft

Microsoft have recently released new security guidance, (albeit aimed at the public sector – is relevant to all industries), which provides up to date advice on how best to implement Office 365 installations, so that they meet the National Cyber Security Centre’s (NCSC) cloud security principles. We recommend this advice to organisations of all sizes & types.

The guidance covers the use of all Office 365 services. So, the measures suggested will provide you with the confidence that you are safely using newer cloud-only features that cover all of your familiar applications & services.

 

How can I implement this within my business?

Depending on your current licenses and tools you have access to, there may be different options available to you.

At Urban Network, we’re best placed to review, consult with you and configure cyber security best practice.

If you are an existing client of Urban Network, then we will be actively reviewing your cyber protection and providing direct advice to you to keep ahead of this ever-growing threat. If you have any questions, concerns or simply wish to discuss your cyber security options further, please consult your Account Manager.

If you are new to Urban Network, we’d love to help. We take a proactive stance on the review of technology within our client’s businesses – it’s our mission to help you and your business get the best value from technology to drive an efficient & profitable operation.

With such a heavy-reliance on our tech systems these days, protecting the data held within them is important, now more than ever. To receive some guidance & peace of mind, please contact us to schedule a free, no obligation review session to discover your current position & the options open to you.

 

Can I stay ahead?

The cloud tools we use are constantly changing & so are the risks to our data security. It is therefore worth planning to periodically review the configuration of your services and check to see if your vendor or support partner have updated their recommendations.

 

Who are Urban Network?

We specialise in managed IT & technology services to help businesses across London & the wider-South East, from our base in Wapping, East London.

Urban Network has a proven track record, with extensive experience and a full portfolio of industry accreditations & certifications.

Among our range of skills, we have a specialism in cyber security. Ensuring we aid our clients with employing the best & most appropriate security practices, procedures and tools to protect their sensitive data.

If you have any concerns or challenges with your cyber security, or with your technology generally, we would like to hear from you. Please contact the team today.

 

References –

Office 365 security guidance from the National Cyber Security Centre.

Microsoft public sector cloud security guidance.

National Cyber Security Centre cloud security principles.

 

Windows 7 End of Life

Windows 7 End of Life

On January 14th 2020 Microsoft will end extended support for the Windows 7 Operating System. This is known in tech terms as end-of-life for the software. So, what does this mean and how do you prepare for Windows 7 End of Life?.

What does “End of Extended Support” mean?

Firstly, end of extended support doesn’t mean that Windows 7 will stop working, but critically, end of support does mean that Microsoft stop developing the product, and this means no more security updates. After the 14th January 2020 all technical assistance and automatic updates that help protect your PC will no longer be made available for the product. Sticking with Windows 7 means you are extremely vulnerable to exploits and bugs. His is not a recommended position for your company to be in.

Microsoft “strongly recommends that you move to Windows 10 sometime before January 2020 to avoid a situation where you need service or support that is no longer available.
.

How Can you Prepare for Windows 7 End of Life

According to NetMarketShare’s January 2018 data, 42% of Microsoft’s customers who purchased Windows 7 are still using it. Meanwhile, only 34% of the people who used Windows 7 have upgraded to the most recent operating system, Windows 10.

The first step when preparing for Windows 7 End of Life is to identify the machines that are currently running this Operating System. If you are already a client of Urban Network, we can walk you through this process. Once you have this information, it’s time to think about upgrading or replacing.

With minimum specifications needed to run a Windows 10 Operating System, there is some speculation that as Windows 10 evolves that these specs may no longer be enough. We recommend that desktop PC’s are replaced every 4 years, with the cost of the upgraded Windows 10 license and professional services associated with the upgrade process, it may be more prudent to take the opportunity to perform a refresh of this older desktops. Having your employees using newer, faster computers will certainly improve productivity and overall happiness within their job roles which will all contribute to the bottom line.

How We Can Help

The most important step is to recognise that you need to start planning, whilst January 2020 may still seem some time away, if you have many PC’s running Windows 7, you will need to have a deployment plan in place.
Urban Network can help you to identify what PC’s are running Windows 7 and investigate the most prudent options for you to upgrade with Windows 10 Operating System.

14 + 15 =

7 Key Principles of Business Continuity for Business

7 Key Principles of Business Continuity for Business

Disaster recovery and business continuity planning should be considered a critical aspect of running a business. These 7 key principles of Business Continuity will help you get started in the right direction when crafting an effective business continuity plan.

1. Get employees involved

Business Continuity plans only work if everyone understands them. Employees are also a great source of ideas and insights about how your business might be affected by a disaster. So business must communicate Business Continuity plans to employees regularly – and actively solicit their input.

2. Keep customers in the loop

Customers are the lifeblood of every business. They should be treated as such even during a disaster. Alerts on the company website, email broadcasts, social media and text messages to key contacts’ mobile phones are all good ways for a business to express concern about the impact of a disaster on its customers. That level of service can even help transform a disaster into an opportunity for greater long-term customer loyalty.

3. Collaborate with suppliers

Businesses increasingly work in tightly interdependent networks of suppliers and partners. By working collaboratively with these third parties, businesses can make themselves even more resilient and well protected against disasters large and small.

4. Periodically test and update Business Continuity plans

It’s not enough to formulate a plan once and put it on paper. Assumptions about a plan should be validated with real-life testing. Plans also have to be updated continuously to ensure that they accommodate changes in the business’s products, services, relationships, size, geographic reach, etc.

5. Factor in compliance

Businesses are subject to a variety of regulatory mandates that may require certain disaster preparedness measures. Health and Safety Executive (HSE) may be particularly relevant in regards to workplace safety.

6. Examine insurance options carefully

Coverages vary greatly, and policy language can be confusing. Businesses have to exercise careful legal and financial diligence to ensure that their policies cover all aspects of disaster recovery and revenue loss, not just the repair of initial damage. In some cases, it may make sense to obtain contingent business interruption insurance. This type of policy provides additional coverage for the harm a disaster can do to a business indirectly, for example, if a supplier in a different climate fails to deliver promised goods because of a local blizzard.

7. Data backup is not enough

Many businesses think they’re safe just because they’ve backed up their critical files. The problem is that those files depend on applications and systems to be of any use to the business. That’s why, in the event of a disaster, it’s essential to be able to run applications on-demand from virtual machines backed up in the cloud.

Take a peek inside at the eBook

What you should look for in a Backup and Data Protection Solution?

Due to limited financial and IT resources, it is crucial for a business to know exactly what to look for in a backup and data protection solution. In this guide we’ll be outlining 6 key criteria for business to keep in mind when seeking out total data protection.

  • Comprehensiveness

  • Ease of use

  • Recoverability

  • Performance and reliability

  • Affordability

  • Scalability

6 + 10 =

We keep your business running, no matter what

Here at Urban Network, we don’t want to see your business get caught unprepared for a disaster. With our award-winning business continuity solutions, we can ensure that we provide your business with the tools to survive and recover from un-foreseen dramas.

Book a free on-site, no obligation attached Disaster Recovery demonstration and see how Urban Network’s Disaster Recovery & Business Continuity Solution can keep your business running in a complete disaster situation.

Demo

Book your Business Continuity and Disaster Recovery Demo with our experts

Case Study

Read our case study on how we help a global financial institution got back on its feet after getting hit with a major server failure, in fewer than 2 hours

Free Network Health Check

Get a Free Network Health Check completely free of charge, and with no obligation attached.

[Download] Backup and Data Protection for Business eBook

[Download] Backup and Data Protection for Business eBook

Why backup and data protection is critical for a business?

It is important to understand why backup is critical for a business.

Today’s businesses are creating more data than ever and you need a robust backup and data protection for your business sensitive data.

Successful backup is the foundation for disaster recovery and business continuity. Without it, recovery and continuity cannot exist. Technologies that were created decades ago to store data are simply not enough. Antiquated methods, like tape backup, aren’t going to ensure data retention and recovery during business critical time windows.

Take a peek inside at the eBook

What you should look for in a Backup and Data Protection Solution?

Due to limited financial and IT resources, it is crucial for a business to know exactly what to look for in a backup and data protection solution. In this guide we’ll be outlining 6 key criteria for business to keep in mind when seeking out total data protection.

  • Comprehensiveness

  • Ease of use

  • Recoverability

  • Performance and reliability

  • Affordability

  • Scalability

6 + 15 =

We keep your business running, no matter what

Here at Urban Network, we don’t want to see your business get caught unprepared for a disaster. With our award-winning business continuity solutions, we can ensure that we provide your business with the tools to survive and recover from un-foreseen dramas.

Book a free on-site, no obligation attached Disaster Recovery demonstration and see how Urban Network’s Disaster Recovery & Business Continuity Solution can keep your business running in a complete disaster situation.

Demo

Book your Business Continuity and Disaster Recovery Demo with our experts

Case Study

Read our case study on how we help a global financial institution got back on its feet after getting hit with a major server failure, in fewer than 2 hours

Free Network Health Check

Get a Free Network Health Check completely free of charge, and with no obligation attached.

Cyber Essentials 101 – IT Security Checklist [PDF Download]

Cyber Essentials 101 – IT Security Checklist [PDF Download]

Why do you need an IT Security Checklist?

According to the Government’s Cyber Security Breaches Survey 2017:

  • 46% of all UK businesses identified a cyber security breach or attack in the last 12 months
  • 6 in 10 of those who identified breaches also say the breach adversely impacted their organisation (being forced to implement new protective measures or having staff time taken up dealing with the breach)

To protect your company’s data and reputation, it is essential to ensure that the network is safeguarded against unauthorised access, data loss, malware infestations, and security breaches.

Take a peek inside at the Checklist

This IT Security Checklist will walk you through five key areas that you need to keep an eye on and help you make sure that all essential measures are taken to keep your network system safe and secure.

  • Legislation
  • Personnel Security
  • Access Management
  • Computer and Network Management
  • Incident Response & Reporting

2 + 4 =

How Urban Network can help

It is now becoming more important than ever to ensure your business is protected and certified against the cyber risks. As a Gold IASME certified company and Cyber Essentials audit body, Urban Network is fully qualified to help your business achieve security compliance with the Cyber Essentials Scheme. Get in touch with our cybersecurity experts today to learn how you can improve your business security, assess current IT infrastructure and prepare a successful accreditation process.

Get Cyber Essentials Certification

For a better preparation of your application, get exclusive FREE access to the Cyber Essentials Questionnaire Portal here

Have A Question?

Contact us and speak with a CyberSecurity expert who will answer any questions you might have.

Free Network Health Check

Get a Free Network Health Check completely free of charge, and with no obligation attached.

Cyber Essentials 101 – Patch Management

Cyber Essentials 101 – Patch Management

Patch Management is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme.

Why Patch Management is important?

Vulnerabilities or security flaws are common in software and are frequently discovered. Once known, it can quickly be exploited by malicious individuals or groups to gain access to networks and computer systems.
Vendors of applications and software will typically try to provide fixes for identified vulnerabilities as soon as possible, in the form of software updates known as “patches”.

What are Patch Management Control requirements?

  • Update software regularly (including operating system software and firmware)
  • Remove software that is no longer supported by vendor
  • Use licensed and supported software
  • All security patches are installed as soon as they are available (within 14 days), especially for ‘critical’ or ‘high risk’

About the Cyber Essentials Scheme

This is part of a series of blog posts dedicated to the five key controls of the Cyber Essentials Scheme.

Cyber Essentials is a government-backed, industry supported scheme to help organisations implement measures to help protect themselves against common cyber-attacks. The scheme focuses on the five most important technical security controls that, when implemented correctly, can reduce significantly an organisation’s vulnerability.

Download our non-technical, no-jargon “Quick Guide to Cyber Essentials – Cyber Security starting point for small and medium businesses” to learn more about Cyber Essentials Scheme, its five key controls and how to implement them correctly.

1 + 9 =

How Urban Network can help

It is now becoming more important than ever to ensure your business is protected and certified against the cyber risks. As a Gold IASME certified company and Cyber Essentials audit body, Urban Network is fully qualified to help your business achieve security compliance with the Cyber Essentials Scheme. Get in touch with our cybersecurity experts today to learn how you can improve your business security, assess current IT infrastructure and prepare a successful accreditation process.

Get Cyber Essentials Certification

For a better preparation of your application, get exclusive FREE access to the Cyber Essentials Questionnaire Portal here

Have A Question?

Contact us and speak with a CyberSecurity expert who will answer any questions you might have.

Free Network Health Check

Get a Free Network Health Check completely free of charge, and with no obligation attached.