Protecting Our Information and Systems All Services 4U is committed to protecting our information, systems, and data from cyber threats. This Cyber Security Policy sets out the controls and practices we implement to defend against common cyber attacks and maintain the security of our digital infrastructure. Our approach is aligned with the UK Government's Cyber Essentials framework. This policy applies to all employees, directors, officers, agency workers, contractors, and anyone who accesses our systems or data.
We are committed to:
Our security controls are based on the five technical controls of the Cyber Essentials scheme:
| Control | Purpose |
| Firewalls | Protect our network boundaries |
| Secure Configuration | Ensure systems are configured securely |
| User Access Control | Manage who can access what |
| Malware Protection | Defend against viruses and malicious software |
| Security Update Management | Keep systems patched and up to date |
These controls protect against the most common cyber attacks and form the foundation of our security programme.
This policy covers:
Firewalls protect our network by controlling incoming and outgoing traffic.
Requirements:
Our Controls:
| Control | Implementation |
| Hardware firewall | Installed at network perimeter |
| Default deny | All inbound traffic blocked unless explicitly allowed |
| Rule documentation | Firewall rules documented with business justification |
| Rule review | Rules reviewed at least annually |
| Logging | Firewall logs retained for security monitoring |
| Management access | Restricted to authorised IT personnel |
Requirements:
Our Controls:
| Control | Implementation |
| Windows Firewall | Enabled on all Windows devices |
| macOS Firewall | Enabled on all Apple devices |
| Mobile devices | Firewall/security enabled where available |
| User restrictions | Users cannot disable firewalls |
| Configuration | Managed centrally where possible |
Requirements:
Our Controls:
| Control | Implementation |
| Home routers | Guidance provided to enable firewall |
| VPN | Required for accessing internal network |
| Device firewall | Enabled on all remote devices |
| Public Wi-Fi | Prohibited for accessing sensitive data without VPN |
Systems are configured securely to reduce vulnerabilities.
Requirements:
Our Controls:
| Control | Implementation |
| Default accounts | Disabled or renamed where possible |
| Default passwords | Changed on all systems and devices |
| Unnecessary software | Removed or disabled |
| Unnecessary services | Disabled |
| Auto-run | Disabled for removable media |
| Guest accounts | Disabled |
Requirements:
Our Password Standards:
| Requirement | Standard |
| Minimum length | 12 characters |
| Complexity | Mix of uppercase, lowercase, numbers, and symbols |
| Uniqueness | Different password for each account |
| Password history | Cannot reuse last 12 passwords |
| Maximum age | 90 days (or risk-based) |
| Account lockout | Lock after 10 failed attempts |
| Lockout duration | 15 minutes or manual unlock |
Multi-Factor Authentication (MFA):
MFA is required for:
Password Protection:
| Prohibition | Requirement |
| Password sharing | Never share passwords |
| Written passwords | Do not write down passwords |
| Password storage | Use approved password manager only |
| Password transmission | Never send passwords by email |
| Browser storage | Only with IT approval |
Computers and Laptops:
| Control | Implementation |
| Operating system | Supported version (Windows 10/11, macOS) |
| Automatic updates | Enabled |
| Screen lock | After 5 minutes of inactivity |
| Encryption | Full disk encryption enabled (BitLocker/FileVault) |
| Antivirus | Installed and updated |
| Local admin | Restricted to IT only |
Mobile Devices:
| Control | Implementation |
| Screen lock | PIN, password, or biometric required |
| Minimum PIN | 6 digits |
| Encryption | Device encryption enabled |
| Remote wipe | Enabled for company devices |
| Automatic updates | Enabled |
| App sources | Official app stores only |
| Jailbreaking/rooting | Prohibited |
Servers:
| Control | Implementation |
| Hardening | Security baseline applied |
| Unnecessary services | Disabled |
| Default accounts | Disabled or secured |
| Access | Restricted to authorised administrators |
| Logging | Security events logged |
| Updates | Regular patching schedule |
| Control | Implementation |
| Auto-run | Disabled |
| Scanning | Automatic malware scanning on insert |
| Encryption | Required for sensitive data |
| Approved devices | Only company-approved USB devices |
| Personal devices | Prohibited unless approved |
Access to systems and data is controlled and managed.
Requirements:
Our Controls:
| Principle | Implementation |
| Least privilege | Users have minimum access needed |
| Unique accounts | Each user has a unique account |
| No shared accounts | Shared accounts prohibited |
| Role-based access | Access based on job role |
| Regular review | Access reviewed at least annually |
| Prompt removal | Access removed within 24 hours of leaving |
Account Creation:
Account Review:
| Review | Frequency |
| Access rights review | Annual (minimum) |
| Privileged access review | Quarterly |
| Inactive account review | Monthly |
| Leaver account removal | Within 24 hours |
Account Removal:
Administrator Accounts:
| Control | Implementation |
| Separate accounts | Admins have separate admin and standard accounts |
| Limited users | Minimum number of admin accounts |
| MFA required | Multi-factor authentication mandatory |
| Logging | All admin actions logged |
| Review | Admin accounts reviewed quarterly |
| No email/browsing | Admin accounts not used for email or browsing |
Local Administrator:
| Control | Implementation |
| User access | Standard users do not have local admin |
| IT only | Local admin restricted to IT personnel |
| Password management | Unique passwords per device |
| Emergency access | Documented break-glass procedure |
| Control | Implementation |
| VPN required | For accessing internal network |
| MFA required | For all remote access |
| Approved devices | Company or approved personal devices only |
| Session timeout | Automatic disconnect after inactivity |
| Logging | Remote access logged |
We protect against viruses, ransomware, and other malicious software.
Requirements:
Our Controls:
| Control | Implementation |
| Antivirus software | Installed on all computers and laptops |
| Mobile protection | Security software on mobile devices |
| Server protection | Antivirus on all servers |
| Real-time scanning | Enabled |
| Scheduled scans | Weekly full system scan |
| Definition updates | Automatic, at least daily |
| User restrictions | Users cannot disable antivirus |
| Central management | Managed and monitored centrally |
Email Protection:
| Control | Implementation |
| Spam filtering | Enabled on email system |
| Attachment scanning | All attachments scanned |
| Dangerous attachments | Blocked (.exe, .js, .vbs, etc.) |
| Link protection | Malicious links detected and blocked |
| Phishing protection | Anti-phishing filters enabled |
Web Protection:
| Control | Implementation |
| Web filtering | Malicious sites blocked |
| Download scanning | Downloads scanned for malware |
| HTTPS inspection | Where appropriate |
| Category blocking | High-risk categories blocked |
Application Control:
| Control | Implementation |
| Approved software | Only approved software permitted |
| Installation rights | Users cannot install software |
| App stores | Official stores only for mobile apps |
| Whitelisting | Considered for high-security systems |
If malware is detected or suspected:
Systems are kept up to date to protect against known vulnerabilities.
Requirements:
Patching Timescales:
| Severity | Timescale |
| Critical/High risk | Within 14 days of release |
| Medium risk | Within 30 days of release |
| Low risk | Within 90 days of release |
| Zero-day/actively exploited | As soon as possible (within 48 hours) |
Our Controls:
| Control | Implementation |
| Automatic updates | Enabled where possible |
| Windows Update | Automatic updates enabled |
| macOS updates | Automatic updates enabled |
| Mobile updates | Automatic updates enabled |
| Application updates | Regular update schedule |
| Server patching | Scheduled maintenance windows |
| Patch testing | Critical systems tested before deployment |
| Patch monitoring | Compliance monitored |
Requirements:
Supported Versions:
| Software | Minimum Supported Version |
| Windows | Windows 10 (current feature update) |
| macOS | Current and previous two major versions |
| iOS | Current and previous two major versions |
| Android | Manufacturer-supported versions |
| Microsoft Office | Microsoft 365 or supported perpetual version |
| Browsers | Current version (auto-updating) |
End-of-Life Planning:
| Activity | Frequency |
| Vulnerability scanning | Monthly (minimum) |
| Patch compliance reporting | Monthly |
| Critical vulnerability response | Within 48 hours |
| Penetration testing | Annual (or after significant changes) |
Beyond Cyber Essentials, we implement additional controls.
| Control | Implementation |
| SPF | Configured to prevent spoofing |
| DKIM | Email signing enabled |
| DMARC | Policy configured and monitored |
| Encryption | TLS for email in transit |
| Attachment limits | Large attachment limits enforced |
| External email warning | Banner on external emails |
| Control | Implementation |
| Encryption at rest | Sensitive data encrypted |
| Encryption in transit | TLS/HTTPS for all connections |
| Data classification | Data classified by sensitivity |
| DLP | Data loss prevention for sensitive data |
| Backup encryption | Backups encrypted |
| Control | Implementation |
| Network segmentation | Separate networks for different purposes |
| Guest Wi-Fi | Isolated from corporate network |
| Wireless security | WPA3 or WPA2-Enterprise |
| Network monitoring | Traffic monitored for anomalies |
| Intrusion detection | IDS/IPS implemented |
| Control | Implementation |
| Secure premises | Access controls on buildings |
| Server room | Restricted access, environmental controls |
| Device security | Laptops secured when unattended |
| Visitor management | Visitors escorted in secure areas |
| Clear desk | Sensitive information secured |
| Secure disposal | Secure destruction of hardware and media |
| Control | Implementation |
| Regular backups | Daily backups of critical data |
| Backup testing | Regular restore testing |
| Offsite storage | Backups stored offsite/cloud |
| Ransomware protection | Offline or immutable backups |
| Recovery plan | Documented recovery procedures |
| Recovery time | Defined recovery objectives |
All users must use systems and data responsibly.
Company systems are provided for business use. Limited personal use is permitted if it:
The following are prohibited:
| Category | Prohibited Activities |
| Security | Attempting to bypass security controls, sharing passwords, installing unauthorised software, disabling security software |
| Content | Accessing or distributing illegal, offensive, or inappropriate material |
| Malware | Deliberately introducing viruses or malicious code |
| Hacking | Attempting to access unauthorised systems or data |
| Personal use | Running a personal business, excessive personal use |
| Copyright | Downloading pirated software, music, or videos |
| Data | Unauthorised copying or sharing of company data |
| Sending spam, phishing attempts, chain letters | |
| Social media | Posting confidential information, damaging company reputation |
| Allowed | Not Allowed |
| Business research | Illegal content |
| Professional development | Gambling |
| Appropriate personal browsing | Adult content |
| Approved cloud services | Unapproved file sharing services |
| Circumventing web filters |
| Allowed | Not Allowed |
| Business communication | Sending confidential data to personal accounts |
| Appropriate personal email | Forwarding chain emails |
| Encrypted attachments | Sending sensitive data unencrypted |
| Opening suspicious attachments |
| Allowed | Not Allowed |
| Professional networking | Disclosing confidential information |
| Company-approved posts | Posting on behalf of company without approval |
| Damaging company reputation | |
| Harassing or discriminatory content |
Personal devices may only be used for work if:
Everyone must understand and manage cyber security risks.
| Training | Audience | Frequency |
| Cyber security induction | All new starters | On joining |
| Annual security awareness | All employees | Annual |
| Phishing awareness | All employees | Annual |
| Secure development | Developers | As required |
| Incident response | IT team | Annual |
| Advanced security | IT administrators | Ongoing |
Training covers:
We conduct regular phishing simulations to:
Users who fail simulations receive additional training.
We reinforce security awareness through:
We have procedures to detect, respond to, and recover from security incidents.
A security incident is any event that threatens the confidentiality, integrity, or availability of our information or systems.
Examples:
| Type | Examples |
| Malware | Virus infection, ransomware, spyware |
| Unauthorised access | Hacking, stolen credentials, insider threat |
| Data breach | Data stolen, lost, or disclosed inappropriately |
| Phishing | Successful phishing attack, credential theft |
| Denial of service | System or network unavailable due to attack |
| Physical | Stolen or lost devices, unauthorised access to premises |
| Social engineering | Manipulation to disclose information |
All security incidents must be reported immediately.
Report to:
IT Helpdesk Phone: [Phone number] Email: it@allservices4u.co.uk
Out of hours: Phone: [Emergency number]
If a data breach: Also notify: dataprotection@allservices4u.co.uk
When reporting, provide:
Step 1: Identification
Step 2: Containment
Step 3: Eradication
Step 4: Recovery
Step 5: Lessons Learned
| Severity | Description | Response Time |
| Critical | Major impact on business, data breach, ransomware | Immediate (within 1 hour) |
| High | Significant impact, spreading malware, system compromise | Within 4 hours |
| Medium | Limited impact, contained incident | Within 24 hours |
| Low | Minimal impact, near miss | Within 72 hours |
| Severity | Escalate To |
| Critical | Managing Director, Data Protection Lead, external support |
| High | IT Manager, relevant Director |
| Medium | IT Manager |
| Low | IT team |
We manage security risks from third parties.
Before engaging suppliers with access to our systems or data:
Contracts with suppliers include:
Before using cloud services:
Additional security requirements apply when working remotely.
We monitor our systems and networks for security purposes.
Monitoring is conducted to:
We verify our security controls are effective.
We maintain Cyber Essentials certification:
| Level | Status | Renewal |
| Cyber Essentials | [Certified/In progress] | Annual |
| Cyber Essentials Plus | [Certified/Planned] | Annual |
| Audit | Frequency |
| Internal security review | Quarterly |
| External vulnerability scan | Monthly |
| Penetration test | Annual |
| Cyber Essentials assessment | Annual |
| Policy compliance audit | Annual |
Non-compliance with this policy may result in:
We maintain the ability to continue operations during and after security incidents.
| Data Type | Backup Frequency | Retention |
| Critical business data | Daily | 30 days |
| System configurations | Weekly | 90 days |
| Continuous | 1 year | |
| Databases | Daily | 30 days |
This policy is reviewed annually and updated to reflect:
This policy should be read in conjunction with:
This Cyber Security Policy has been approved by the Managing Director.
Review Date: [Date + 1 year]
IT Helpdesk Email: it@allservices4u.co.uk Phone: [Phone number]
Report Security Incidents Phone: [Phone number] (24-hour) Email: security@allservices4u.co.uk
Data Protection Lead Email: dataprotection@allservices4u.co.uk
✓ Use strong, unique passwords
✓ Enable multi-factor authentication
✓ Lock your device when unattended
✓ Report suspicious emails — don’t click
✓ Keep software updated
✓ Report security incidents immediately
✓ Complete security training
✓ Follow this policy
Phone: [Phone number] Email: security@allservices4u.co.uk
When in doubt, report it!
All Services 4U is committed to protecting our information and systems from cyber threats. Everyone has a responsibility for security.