image

Cyber Essentials

Secure Data Management

Certified

Cyber Essentials is a UK government-led scheme that was  launched as an assessment strategy to accompany the NCSC (National Cyber Security Centre) “10 Steps to Cyber Security” publication.

The NCSC is part of GCHQ

The scheme provides an accessible way for companies and organisations like ours to demonstrate our commitment to cyber security through a recognised and government-backed standard.

Cavere is certified under the scheme and this can be verified by checking the governments National Cyber Security Centre website at  www.cyberessentials.ncsc.gov.uk

Cyber Essentials badge

Patch Management

All security updates and patches are applied to devices and installed software regularly.

Malware Protection

A robust anti-malware solution is applied to prevent servers and end-user devices from being infected with malicious software.

User Access Control

Access to our organisation’s data is controlled through correctly assigned user accounts and administration privileges are tightly controlled.

Secure Configuration

Devices and software are configured securely to prevent them from being compromised by a malicious user or malware.

Firewall Security

Firewall securely configured and be reviewed regularly.

At Cavere we take the protection of our policyholders data very seriously.

Following the far reaching set of regulations introduced by GDPR,  the privacy of individuals and protection of personal data is paramount for an organisation like ours.

Although the regulation demands that we take appropriate measures to protect the integrity and confidentiality of any personal data we hold, it does not provide a check list of measures for us to take. Instead, it specifies that we must determine your own cyber security approach based on the type of information we hold and the risk to individuals were that information to be lost or compromised.

Cyber Essentials helps us with this, but it is not the only solution for our GDPR obligations.

We are constantly working towards new and improved ways of working which keep us ahead of the cyber criminals and our competitors. An example of this is demonstrated by the two form authentication used when a customer accesses their customer account.