aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days

Page 01 Download the article


We take a look at the important roles that Privilege Management, Application Control and Content Isolation solutions play in helping comply with the CESG's 10 Steps to Cyber Security.

The Communications-Electronics Security Group (CESG) has issued a guide for UK businesses covering 10 critical areas of cyber security management.

The CESG's 10 steps provide a foundation for effective risk management, and while the advice needs to be tailored for the individual needs of each organization, it is recommended that CIOs should state why a measure is not required if it is deemed unnecessary.

Each area is divided into risk and risk mitigation. These 10 areas can also be mapped to the Top 20 Critical Controls for Effective Cyber Defence, produced by SANS and the Council on Cyber Security and endorsed by the CPNI.

This article addresses how Avecto's Defendpoint software can help businesses meet the recommendations of the guide