To help reduce cyber security risks in its supply chains, the UK government requires suppliers bidding for certain types of public contracts to demonstrate that appropriate cyber security controls are in place. Ensuring a strong security posture is in place is also important to Thru as a vendor that provides secure file transfer of sensitive data.
This blog is an overview of our achievement of Cyber Essentials certification.
What Is Cyber Essentials?
About Cyber Essentials Certification
Cyber Essentials provides a secure online platform to guide an organization through an intensive self-assessment of its cybersecurity posture. Organizations assess their security controls in areas such as
- Hardware and software
- Cloud services
- Firewalls
- Secure configuration
- User access, including administrative accounts and password management
- Security update management
- Malware protection
A qualified assessor audits and verifies the information submitted in the Cyber Essentials platform before certification is granted.
Benefits of Cyber Essentials Certification
Besides providing necessary certification to be eligible to bid for certain UK Government contracts, Cyber Essentials also helps your organization in the following ways:
- Awareness and identification of potential risks to better protect against common cyber threats
- Adoption of proper, stronger security controls to protect customer data
- Mitigation of risks from common cyber security threats to your IT infrastructure
- Reassurance to existing customers that you take cyber security seriously
- Assurance to prospective and new businesses that you have cyber security measures in place
- Listing on IASME Consortium’s directory of organizations awarded Cyber Essentials certification
Thru’s Cyber Essentials Certificate
View Thru’s Cyber Essentials certificate information »
For more information about Thru’s security practices or to request a copy of this certificate, please contact your account representative or visit our Trust Center to download »
To learn more about security of your sensitive data in our MFT solution, go to our Secure File transfer page »