The third installment in the “How to Pass Cyber Essentials” series. In this post, I am looking at one of the most important, and often the hardest to pass section of the questionnaire. Secure Configuration.
This vulnerability will allow an attacker on a connected network to view any of the files contained within the file share. In some circumstances, it may be possible to add new files and modify existing files within the file share.