0121 222 5630

Email Aristi Ltd Follow Aristi Ltd on Facebook Follow Aristi Ltd on Twitter Follow Aristi Ltd on LinkedIn Follow Aristi Ltd on Google Plus

Insights and Updates.
Made for you.

You are here:
Posted on Thursday, 24 September 2015

Cyber Essentials – Patch Management.

Written by

Having good patch management is essential. Patch management is the process of maintaining systems and software updates, encompassing how and when they are kept up to date, change control, testing, prioritisation and in what time frame they are applied. Being able to keep on top of your Microsoft patching as well as other system software is very important. With automated off the shelf hacking tools being made available as soon as exploits are released, it’s important to have a process to follow in order to patch a system when a zero day exploit hits the news. It’s also important to embed the patching policy into the business and have the appropriate management buy-in. The UK government recognises patch management as a key control that business should be following. Patch management is one of the five mandated controls of Cyber Essentials. Cyber Essentials is a UK government scheme designed to allow businesses to demonstrates to their suppliers and customers good cyber security practices.

The five key controls of Cyber Essentials are:

  • Boundary firewalls and internet gateways
  • Secure Configuration
  • User access control
  • Malware protection
  • Patch management

Here at Aristi our qualified Cyber Essentials assessors who specialise in Cyber Security will guide you through the process. As part of the Cyber Essentials Plus certification we will test your patch management along with the four other controls to make sure you are demonstrating good cyber security. We can also offer you guidance on any remediation tasks you may need to perform. We can help your organisation to comply with the requirements of Cyber Essentials and achieve formal certification against the standard. Give your organisation the edge show your competitors, suppliers and customers you demonstrate good cyber security within your business.


Please contact Aristi to discuss your requirements. Filling in the form below is the quickest way to get in touch with the relevant person at Aristi.


Keep up-to-date with insights and info on all areas of Information Assurance, Information Security, Penetration Testing & Data Sharing from the award-winning consultants Aristi.

Latest Tweets

Still using Windows 7? https://t.co/TZq4J1xXNl
https://t.co/yRF05uVC9i These scams are getting more realistic. User awareness is crucial to detect malicious emails from legitimate ones.
If Marriott Hotels couldn’t protect their data when they were subject to data breaches, how can your business?:… https://t.co/2DKYoum6zP

Subscribe to our Newsletter

Latest Blog Posts

  • 500 million customers can’t sleep easy with Marriott data breach

    Share the post “500 million customers can’t sleep easy with Marriott data breach” FacebookGoogle+LinkedInTwitter The world’s largest hotel chain, Marriott Hotels, announced on Friday (November 30, 2018) that half a billion of its customers’ data had been breached dating as far back as 2014. Marriott owns more than 5,800 properties around the world with 1.1 […]

    Written on Wednesday, 12 December 2018
  • Virtual Data Protection Officer

    Share the post “Virtual Data Protection Officer” FacebookGoogle+LinkedInTwitter The GDPR introduces a duty for you to appoint a data protection officer (DPO) if you are a public authority, or if you carry out certain types of processing activities. To support your on going GDPR compliance and management requirements, we can provide a Virtual Data Protection […]

    Written on Thursday, 10 May 2018
  • Protecting Businesses with Cyber Essentials

    Share the post “Protecting Businesses with Cyber Essentials” FacebookGoogle+LinkedInTwitter The lack of basic cyber security controls remains a significant factor in the vast majority of cyber attacks in the UK today. Businesses are left worried about hackers, data loss and security, and are not sure where to turn. The scale of the threat is nothing […]

    Written on Monday, 05 March 2018