LYNQ is proud to announce that we’ve obtained The Cyber Essentials Certification which confirms that we have followed cybersecurity best practices to alleviate common cyber threats and to prove our commitment to protecting sensitive information.
Completing the application for the certificate involves providing detailed information on our company’s practices, including evidence of compliance and implementation of recommended security measures in the following areas:
- Boundary Firewalls and Internet Gateways: In order to prevent unauthorised access to a company’s internal network, providing a secure barrier between it and the external Internet is one of the most important security measures against cybersecurity. Boundary Firewalls and Internet Gateways work by monitoring, filtering, and controlling incoming and outgoing network traffic, they ensure secure communication and protect the organisation’s resources from malicious attacks.
- Secure Configuration: An organisation’s network’s configuration plays a crucial role in enhancing cybersecurity by implementing and maintaining vigorous security settings. A security assessment examines the security measures in place on devices and software to reduce vulnerabilities.
- User Access Control: An organisation’s User Access Control programme does an assessment of how well it manages its user base, such as assigning access rights based on business needs, enforcing strong passwords, and periodically withdrawing access to users.
- Malware Protection: The term malware refers to a wide range of harmful software such as viruses, worms, Trojan horses, ransomware, spyware, and adware that are designed to compromise or manipulate the targeted system for unauthorised purposes. An important part of malware protection is ensuring all devices have malware protection software, such as antivirus and anti-malware, to prevent malicious software from interfering with a system or compromising it.
- Patch Management: To address security vulnerabilities, improve functionality, and ensure system stability, patch management entails acquiring, testing, and deploying software, application, operating system and firmware updates and patches. Maintaining a secure and resilient IT environment requires Patch Management.
- Network Security: The security of a network revolves around keeping the networks secure and protected against unauthorised access. It includes measures such as separating networks, monitoring network traffic and securing Wi-Fi configurations and passwords.
Our customers and partners can rest assured that their information is protected with us!