Skip to content

Building Your Digital Defences: The Five Technical Controls of Cyber Essentials  

In today’s digital world, cyber security is no longer optional. Businesses of all sizes are under constant threat from cyberattacks, and even a minor breach can have devastating consequences. IASME’s Cyber Essentials scheme offers a framework to help organisations implement basic cybersecurity controls, significantly reducing the risk of attack. 

At the heart of Cyber Essentials lie five essential technical controls, forming the foundation of a strong cybersecurity posture. Let’s delve into each of these controls and understand their importance.  

Firewall and Network Security 

Imagine your network as a nightclub. Firewalls act as the door staff, meticulously controlling who and what enters and leaves, we refer to this as a firewall rule. By filtering incoming and outgoing traffic, correctly configured firewalls block unauthorised access and prevent malicious actors from accessing your systems. 

A poorly configured firewall is as bad as having no firewall at all. For example, if you have a database accessible over the public internet, when only internal employee should have access, its open to attack by a hacker who may be able to steal sensitive company data and credentials. A firewall, if correctly configured, can segregate traffic and ensure that only authorised computers can send traffic in and out of your organisation.  

Secure Configuration 

While we expect a new building to have strong walls and foundations, this may not always be the case. Regular maintenance is key to keep the building sturdy. Similarly, the default settings of computers and network devices are not always the most secure and need customisation to ensure better security. Secure device configuration guarantees that your devices and software are configured keeping security best practices in mind. 

Configurations such as limiting applications available to employees can reduce the risk of someone installing third party software that might not be from a reputable source. Such a software could contain malware which may provide a hacker with a back door into your network. Certain industry regulations like PCI-DSS may expect an organisation to configure systems to a more secure standard. Not following this regulatory guidance could lead to non-compliance issues and potential fines if a data breach occurs due to a poorly configured system. 

User Access Controls  

Would you give strangers the keys to your home or your prized car? It is the same with your business networks and data. User access control dictates who can access specific systems and data within your network, and when. By implementing strong access controls, you ensure only authorised users have the necessary permissions to perform their tasks for the time they require it. This minimises the risk of accidental or malicious misuse. 

If we think about user accounts, everyone should have a standard user account rather than an administrator account. An administrator account gives access to systems and data within the company network, including the ability to create new users and install programs. If a hacker steals the admin credentials, they have access to everything on that system and can create a malicious account to hide in plain sight. Limiting administrator access to those who need it, when they need it can help reduce the attack options available to a hacker. 

Malware Protection 

Think of malware as a cunning thief trying to break into your home. Malware protection acts as your vigilant guard or alarm system. It constantly scans for malicious programs like viruses, spyware, and ransomware that can steal data or disrupt operations. Potential sources include unsolicited email attachments, downloads (sometimes including those from application stores) and direct installation of unauthorised software. 

What if a malicious program is installed on your employee’s computer and is never identified due to lack of protection? An attacker could utilise this access into your network, stealing sensitive intellectual property, moving from system to system and exfiltrating your sensitive client data. Malware can spread to other systems on its own, potentially infecting many other devices and putting your business at financial and reputational risk. For example, the ‘WannaCry‘ worm. 

Patch Management

You’ve now made that building stronger, and filled some of those gaping holes but you need to maintain the house over its lifetime, right? Just like our building analogy, our computers and network devices need continuous care to keep them safe. Patch management ensures your systems and applications are protected by promptly installing the latest security updates for operating systems, software and firmware. These updates address known vulnerabilities that cybercriminals may exploit to gain access to your company data. 

Vulnerabilities are regularly discovered in all kinds of software. Once discovered, malicious individuals or hacker groups move quickly to exploit vulnerabilities, attack computers and networks. Some of the biggest data breaches published, could have been prevented by timely responses to vendors’ security updates. If an operating system vendor stops providing patches for older OS versions, then upgrading to a more current supported OS is the only way to stay protected. Having a proactive patch management policy is a great step to protect your organisation and stay one step ahead of hackers who want to do harm to your organisation. 

Implementing these five essential controls is a crucial first step in safeguarding your organisation’s digital assets. By combining Cyber Essentials with ongoing security awareness training for your staff, you can significantly strengthen your cyber defences and make your business a less attractive target for attackers. 

Don’t leave your organisation vulnerable to cyber threats – take proactive steps to safeguard your data and reputation with Cyber Essentials certification from Incursion Cyber Security. 

At Incursion Cyber Security, we understand the importance of building robust digital defences. With our expertise in Cyber Essentials accreditation, we can guide your business through the process, ensuring that you meet the highest standards of cybersecurity.  

CONTACT OUR EXPERTS AND GET YOUR CYBER ESSENTIALS AND CYBER ESSENTIALS PLUS CERTIFICATION TODAY! 

ABOUT THE AUTHOR

Chris Parker

Chris Parker is a cloud security penetration testing consultant here at Incursion Cyber Security (ICS). His background in the military and focus on offensive cybersecurity positions him to offer invaluable insights into cloud security audits, shedding light on common cloud security blind spots, the integration of AI technologies, and the tooling consultants at ICS deploy to ensure robust approach is taken when testing cloud security measures.

What our clients say

ICS’s penetration testing and audits have been invaluable.  Their team is professional, thorough and highly knowledgeable.  They are a key partner. 

Pete – Amicis

We partnered with Incursion Cyber Security on a recent onsite ITHC project. Lewis and Gareth were professional and communicative throughout the project – from set up calls with the client to providing updates to our PMO whilst onsite during the engagement.  

We received excellent feedback from our client about the quality of testing conducted and internally we were happy with how smoothly the project ran.  

I would highly recommend ICS for their personable and collaborative style of working whilst delivering high-risk Cyber Security projects to an excellent standard.  

Kezia – Prism Infosec


Incursion Security are a phenomenal team. We’ve worked with them on a number of occasions and have always been really happy with the standard of work, the responsiveness to questions, the depth of reporting and recommendations. Strongly recommend them. We will be using them again in the future. 

Mike – Incommsec