What You Need To Know


All computers and network devices within a business should be configured properly. ‘Out of the box’ configured computers and network devices cannot be classed as secure because of the default settings that come with them. An example of this is a predefined username and password for the administrator account when a device is set up. This makes it very easy for cyber attackers to gain access to the devices and all the information stored on them.
Secure Configuration sits across everything you do with information systems, including the other controls that comprise the Cyber Essentials scheme. The premise is that you should not rely on a piece of software or hardware being configured correctly ‘out-of-the-box’ for your needs or environment. The settings should be customised to provide the security and protection that your organisation requires.

Key Points

User Accounts
Unnecessary Software
Auto Run

To Top