Clevertouch Cyber Essentials Certification

Andrew Neale

Cyber Essentials is a UK government-backed, industry-supported scheme that helps businesses protect themselves against cyber threats. Cyber Essentials certification is the first level of cybersecurity compliance.   

To achieve this certification, Clevertouch had to prove its adherence to security and privacy in all data technology business practices. 

 This includes the ability to protect data and systems from unauthorized access, use, or destruction through the implementation of secure company protocols. 

 To achieve Cyber Essentials certification, Clevertouch met the five security requirements:  

  1. Boundary Firewalls and Network Segmentation: demonstrate the Clevertouch network is configured correctly with firewalls and network segmentation to prevent unauthorized access 
  2. Access Control: Deploy controls that ensure that only authorised personnel can access the company’s systems, data, and networks. 
  3. Network Protection: Maintain measures to prevent unauthorised access to its network, including regular software and system patching and updates. 
  4. Secure Configuration: ensure systems and software are configured securely, including regular updates and patching. 
  5. User Education: provide regular training and awareness programs for its employees to ensure they understand the importance of cybersecurity and how to maintain good security practices. 

Clevertouch partners and customers can be confident that the company and the team are committed to cybersecurity best practices and maintain the highest standards of data security and privacy. 

 “As an award-winning global manufacturer, we understand the need to ensure our partners have trust in us to keep data secure from cyber threats”, said Shaun Marklew, EVP and Managing Director EMEA, adding, “With this Cyber Essentials certification, we can demonstrate a solid foundation for protecting the company’s data”. 

 The Clevertouch commitment to Cyber Essentials certification and the protocols deployed to achieve it ensure attacks are met with barriers and preventions that will strengthen data cybersecurity. 


Leave a Reply