Scroll Top
SECURITY GUIDES

Introduction

In the cyber world, the line between safety and vulnerability often hinges on how well your network is configured. Secure configuration isn’t just a best practise; it’s a cornerstone for achieving Cyber Essentials certification. In this post, we’ll explore the why and how of secure configurations, setting you on the path to a safer digital environment.

  1. Significance of Secure Configuration:

    • Cyber Essentials certification hinges on effective secure configurations.
    • Misconfigured software and hardware pose significant vulnerabilities, accounting for 96% of penetration test weaknesses.
  2. What is Secure Configuration?

    • Secure configuration involves fine-tuning device settings to minimise vulnerabilities and enhance security.
    • Default settings, often prioritising convenience over security, can lead to risks, especially for internet-facing elements like web servers.
  3. Robust Configuration Practises:

    • Implement robust user and administrator password policies.
    • Use passwords at least eight characters long and avoid reuse across accounts.
    • Enable multifactor authentication for critical services.
    • Regularly remove unnecessary accounts, uninstall unused software, and review default configurations.
    • Educate employees on cyber hygiene to strengthen overall network security.
  4. Preparing for Cyber Essentials Assessment:

    • Diligently follow best practises for secure configurations to meet Cyber Essentials criteria.
    • Encourage employees to maintain complex passwords and regularly update configurations to align with evolving threats.
    • Continuous vigilance ensures the confidentiality, integrity, and accessibility of your network.

What is Secure Configuration and Why Does it Matter?

When setting up devices on your internal network, minimising vulnerabilities is key. Secure configuration refers to fine-tuning your devices’ settings to enhance security and mitigate risks. A staggering 96% of penetration tests by Rapid7, a leading security data and analytics provider, reveal weaknesses due to misconfigured software and hardware. Often, these issues stem from default settings prioritising convenience over security. This is especially risky for internet-facing elements like web servers, share points, and gateways.

Ensuring Your Configurations Are Robust

A frequent misstep in secure configurations involves user and administrator password policies. Here are some best practises:

  • Protect against brute-force attacks by locking accounts after ten unsuccessful attempts within five minutes.
  • Store passwords securely, preferably using online password management solutions.
  • Use passwords that are at least eight characters long.
  • Avoid reusing passwords across multiple accounts or services.
  • Change passwords immediately if you suspect a compromise.
  • Implement multifactor authentication for critical services, such as cloud platforms.

Beyond passwords, consider these routine changes:

  • Remove or disable any unnecessary accounts, both administrator and standard user.
  • Uninstall unused software or services to reduce potential attack vectors.
  • Review default configurations for any non-essential features.
  • Disable auto-run features and ensure authentication is required for internet access or network device connections.
  • Educate employees on cyber hygiene to strengthen overall network security.

Preparing for a Cyber Essentials Assessment

To meet the Cyber Essentials criteria, follow the above advice diligently. Encourage employees to maintain complex passwords and secure accounts. Regularly review and update configurations to match evolving software updates and internet threats. This continuous vigilance ensures the confidentiality, integrity, and accessibility of your network.

Conclusion

Secure configuration is more than a technical requirement; it’s about creating a culture of security within your organisation. By following these guidelines, you’re not just preparing for a Cyber Essentials assessment; you’re fortifying your defences against the ever-evolving cyber threats.

Stay safe, stay secure, and remember – a well-configured network is your first line of defence in the digital world!

get CE/CE+ CERTIFied