iOS 16 and Cyber Essentials

September 21, 2022



iOS16-and-cyber-essentials.jpgWith the recent launch of Apple’s iOS 16 on September 12th, we discover that any device older than an iPhone 8 will not be able to support the new software update. This means that even the iPhone 7 and 7 Plus will not support this new update, and certainly no device older than this.

With this news, it becomes apparent that under the Government's National Cyber Security Centres Cyber Essentials scheme, any device below the iPhone 8 is no longer compliant with the scheme. This is because the only accepted version of the iPhone operating system that is compliant with the Cyber Essentials scheme is iOS 16.
 

What is Cyber Essentials?

Cyber Essentials is a UK Government backed scheme developed and maintained by the National Cyber Security Centre. It outlines the basic steps that organisations of any size can take in order to help protect against a wide range of the most common cyber attacks.

Most criminal hackers aren’t state-sponsored agencies or activists looking for high-profile targets, and they don’t spend countless hours staking out and researching their targets. Instead, they tend to be opportunistic, looking for any available target. In that regard, you can think of them as a burglar; yes, they’re aware of high-value marks, but it’s more effective to go after easier targets. Ensuring that you are Cyber Essentials compliant will help to protect you from the most common of these attacks.

There are five different key controls that Cyber Essentials focuses on and nearly 85% of the most common cyber attacks could be prevented by implementing these controls:

  • Firewalls
    These are designed to prevent unauthorised access to or from private networks, but a good setup of these devices either in hardware or software is essential to be fully effective.
  • Secure configuration
    Web server and application server configurations play a crucial role in cyber security. Failure to manage the proper configuration of your servers can lead to a wide variety of security problems.
  • User access control
    It is important to keep access to your data and services to a minimum. This should prevent a criminal hacker from being presented with open access to your information.
  • Malware protection
    It is essential to protect your business from malicious software, which will seek to access files on your system. Protecting against a broad range of malware (including computer viruses, worms, spyware, botnet software and ransomware) and including options for virus removal will protect your computer, your privacy and your important documents from attack.
  • Patch management
    All devices and software are prone to technical vulnerabilities. Cyber criminals can rapidly exploit vulnerabilities once they’ve been discovered and shared publicly.
     

How Viewdata can help you with Cyber Essentials

Viewdata can provide the appropriate resource to meet and train your staff to ensure all procedures and working practices are understood and delivered to ensure maximum protection from Cyber attacks. Viewdata can deliver this process as a one-off project with our IT support services. Alternatively, Viewdata's Managed IT Services does include Cyber Essentials consultancy as part of our on-boarding.

Protect your business against cyber-attacks and breaches today by working with us to implement simple measures and adopting Cyber Essentials good practice for information security.

Find out more about our Cyber Security services and get in touch if you have any specific questions about the security of your IT infrastructure and security procedures.


About Viewdata
Viewdata is an expert IT support provider, delivering nationwide IT support, device management and IT solutions to businesses of all sizes since 1991. Our passion, years of experience, commitment and technical excellence provide businesses with proactive, outstanding IT support and services required to maximise IT agility and business continuity. viewdata.co.uk 

HOW CAN WE HELP YOU...

Have any questions? Want to know more about any of our managed IT services or to discuss outsourcing IT... our expert IT consulting team are at hand.

Whether you're a small, medium or large enterprise, with our IT expertise we can tailor our IT services, cloud services and security servicee to accommodate your business needs whilst enabling innovation, reliability and providing peace of mind.

GET IN TOUCH

Required
Required
Required