Energy and Technical Services (ETS) is an expert in energy consulting, engineering, and carbon management services with 25 years behind them. Their primary goal is to drive sustainable performance through Smart Energy Management strategies while simultaneously making a positive impact on climate change.
It is vital that their IT is not only reliable but also secure, so that their innovative data-driven solutions consistently deliver.
Protecting their business with Cyber Essentials
Cyber Essentials is a UK Government-backed certification scheme designed to enhance cyber security hygiene. It provides a certification and a digital accreditation, aiming to improve businesses cyber security standard.
This scheme assists in safeguarding businesses against prevalent cyber attacks, helping establish basic controls to ensure network security and protect against around 80% of the most fundamental cyber security breaches. Developed by the National Cyber Security Centre (NCSC), Cyber Essentials offers a framework to ensure essential cyber security measures are in place and to demonstrate compliance.
ETS found themselves in need of Cyber Essentials certification due to several reasons. First and foremost, ensuring cyber security compliance was imperative, as it not only helped secure their data but also opened doors for potential government contracts.
Following their initial Cyber Essentials certification they gained through a project with our team last year, ETS recognised the necessity of renewing it annually and again contacted Geeks for guidance and support. This renewal was essential to maintain compliance and to continue working with specific suppliers.
Gaining Cyber Essentials Certification
Our Project Engineer, Tom, worked with ETS for the second time, helping them with the process of renewing their Cyber Essentials certification. He re-assessed ETS against the new 2023 certification criteria, identifying areas where cyber security improvements were necessary.
Tom worked closely with ETS to ensure compliance with the Cyber Essentials requirements, including updating firewalls and internet gateways, implementing secure configurations, and managing security updates. Tom also enforced strict password policies, ensured that Multi-Factor Authentication (MFA) was enabled for Microsoft 365 accounts, and that Endpoint Detection and Response (EDR) was deployed.
If there were any changes that needed to be made to meet certification standards, Tom promptly communicated this to ETS, ensuring a streamlined process.
Working with Geeks
The Cyber Essentials certification process involved completing a comprehensive questionnaire.
Our Project Engineer, Tom, played a crucial role in this phase. After collaborating with ETS to audit and update their systems, ensuring they met certification requirements, he then filled out the questionnaire on behalf of ETS, preparing it for submission to the accreditor.
Communication with the accreditor was also managed by Tom, providing any further details or changes that were requested. This ensured a smooth and efficient certification process, with ETS being kept informed of any necessary updates.
Upon approval from the accreditor, ETS received their renewed Cyber Essentials certificate and the accompanying digital accreditation.
What Were the Benefits of Cyber Essentials?
Renewing their Cyber Essentials Certification brought several significant benefits to ETS.
Firstly, it enhanced their credibility and trustworthiness in the eyes of their clients and suppliers, demonstrating a commitment to cybersecurity.
Businesses looking for partners with strong cybersecurity credentials can now easily identify ETS through the National Cyber Security Centre (NCSC) directory, further expanding their reach and opportunities.
This certification enabled ETS to work with public sector organisations and bid for contracts that require Cyber Essentials accreditation, creating opportunities for large-scale projects and long-lasting positive relationships.
Additionally, Cyber Essentials provided ETS with peace of mind, assuring them that they had the necessary tools in place to protect against common cyber attacks and breaches.
BACK TO CASE STUDIES