• Firewall management is an essential first step to securing your business and establishing a strong defensive foundation. Firewalls protect every device and connection within your network from unauthorized access and threats. With Rules, Policies, Users, VPNs, logging, updates, and many other settings to configure and maintain, we help ensure your firewall is properly secured, actively managed, and fully compliant with industry standards.

  • Secure Configuration is the digital equivalent of locking your doors and windows: it means identifying and eliminating weaknesses inside your network. This includes removing unnecessary default settings, preventing and uninstalling unauthorised software from company devices, and restricting user privileges to reduce the potential scope and impact of an attack or breach. Together, these measures are essential to keeping your business systems safe and resilient.

  • Restricting access to only the necessary systems and specific parts of a system are examples of a strong User Access Control policy. Enforcing Multi-Factor Authentication, performing regular audits of user accounts and permissions, and implementing the principle of Least Privilege are essential steps to reduce the risk of an account takeover and limit its potential impact on business operations.

  • Malware protection has evolved exponentially over the last five years. Today, most SMEs can leverage Microsoft Defender as part of their existing Microsoft 365 licensing at no extra cost, meaning you can significantly strengthen your security and protection without additional spend. Using OneDrive for file versioning and history to restore older copies of data when files are corrupted or targeted by ransomware is one clear example of how malware protection is now integrated into the modern workplace, providing built-in resilience and easier recovery.

  • Patching and securing your systems has become an ongoing, often daily task. Microsoft updates are now released daily in some cases. Security updates, firmware updates, and feature updates all require careful management, consistent enforcement and regular reviews to ensure systems remain protected. Testing patches, accounting for their known issues and evaluating the associated risks are all essential parts of a comprehensive patch management offering.

MJM Support helps companies adhere to the five pillars of Cyber Essentials by implementing a pragmatic, policy-driven approach: we secure boundary firewalls and internet gateways with correctly configured hardware and network segmentation; ensure secure configuration by hardening devices and minimising unnecessary services and default accounts; implement strong access control through least-privilege accounts, multi-factor authentication and role-based permissions; maintain malware protection with centrally managed endpoint defences, timely signature updates and behavioural detection; and keep software and firmware up to date via automated patch management and scheduled vulnerability scans.