The Cyber Essentials standard covers 5 key areas:
Secure configuration refers to security measures that are implemented when building and installing computers and network devices in order to reduce unnecessary cyber vulnerabilities.
Boundary firewalls and internet gateways provide a basic level of protection where a user connects to the Internet. While antivirus software helps to protect the system against unwanted programs, a firewall helps to keep attackers or external threats from getting access to your system in the first place. The firewall monitors all network traffic and has the ability to identify and block unwanted traffic that could be harmful to your computer, systems and networks.
Access control and administrative privilege management involves protecting user accounts and helping prevent misuse of privileged accounts is essential for any cyber secure system or network. 88% of insider threat incidents included privilege abuse, according to the 2014 Verizon Data Breaches Investigation Report (DBIR).
Patch management is about keeping software on computers and network devices up to date and capable of resisting low-level cyber attacks.
Malware protection refers to protecting against a broad range of malware (including computer viruses, worms, spyware, botnets and ransomware), including options for virus removal that will help protect your computer, your privacy and your important documents from attack.