Security & Compliance
Cyber Essentials
Cyber Essentials provides an audited review of SHL protection against a wide variety of the most common cyber attacks.
Annually SHL is assessed by an external auditor to review their adherence to core security controls.
The Cyber Essentials scheme addresses the most common Internet-based threats to cybersecurity.
The scheme considers these threats to be:
- Hacking — exploiting known vulnerabilities in Internet-connected devices, using widely available tools and techniques
- Phishing — and other ways of tricking users into installing or executing a malicious application
- Password guessing — manual or automated attempts to log on from the Internet, by guessing passwords
The Cyber Essentials scheme helps organizations to protect the confidentiality, integrity, and availability of data stored on devices that connect to the Internet. Such as:
- desktop and laptop PCs
- tablets and smartphones
- all types of server and networking equipment
Last updated: June 2024