Cyber Essentials

If you're looking to get IASME Cyber Essentials certified our specialists will guide you through the entire process. Our expert team will support you with our knowledge that has helped hundreds of customers achieve certification.

What is Cyber Essentials?

Cyber Essentials is the first step towards securing your business. It is a UK government-backed scheme that helps protect your organisation from the most common security risks and common cyber attacks. It lets organisations and their clients know that a baseline level of cyber protection is in place.

In the new year, the NCSC and their accreditation partner, IASME, introduced an updated set of requirements for the Cyber Essentials scheme. This is the most significant change to the scheme's technical standards since it was introduced in 2014, and it is in response to the growing cyber security challenges that businesses are facing. We have created a short video to give you everything you need...

What is Cyber Essentials?

Cyber Essentials is the first step towards securing your business. It is a UK government-backed scheme that helps protect your organisation from the most common security risks and common cyber attacks. It lets organisations and their clients know that a baseline level of cyber protection is in place.

In the new year, the NCSC and their accreditation partner, IASME, introduced an updated set of requirements for the Cyber Essentials scheme. This is the most significant change to the scheme's technical standards since it was introduced in 2014, and it is in response to the growing cyber security challenges that businesses are facing. We have created a short video to give you everything you need...

Tiers of Cyber Essentials

The Cyber Essentials program offers three tiers, providing varying levels of cybersecurity measures to safeguard your organisation's infrastructure against potential threats.

Tiers of Cyber Essentials

The Cyber Essentials program offers three tiers, providing varying levels of cybersecurity measures to safeguard your organisation's infrastructure against potential threats.

Why should you get Cyber Essentials certified?

Government contracts require Cyber Essentials

Certification is now a requirement for organisations wishing to bid for central UK government contracts.

Trust and Credibility

Showcase your commitment to cybersecurity best practices by earning Cyber Essentials certification, instilling trust among clients, partners, and stakeholders.

Regulatory Compliance

Meet regulatory requirements and demonstrate your dedication to data security, as Cyber Essentials certification aligns with industry standards

Why should you get Cyber Essentials certified?

Government contracts require Cyber Essentials

Certification is now a requirement for organisations wishing to bid for central UK government contracts.

Trust and Credibility

Showcase your commitment to cybersecurity best practices by earning Cyber Essentials certification, instilling trust among clients, partners, and stakeholders.

Regulatory Compliance

Meet regulatory requirements and demonstrate your dedication to data security, as Cyber Essentials certification aligns with industry standards

Areas covered by Cyber Essentials

The Cyber Essentials scheme comprises two certifications that assess your organization's policies, configurations, and devices against security standards, ensuring competence in safeguarding systems across specific categories for certification.

01

Firewall

A boundary firewall is a network device that controls inbound and outbound network traffic by allowing or blocking based on source, destination, and communication protocol.

02

Configuration

Default configurations of computers and network devices are often insecure, containing vulnerabilities easily exploited by attackers. Establishing a secure configuration is crucial for basic network security.

03

Access Control

Active user accounts in your organisation grant access to devices, applications, and sensitive information. Mitigate risk by restricting accounts to authorised individuals with access only to essential information for their roles.

04

Anti-Virus

Malware infections can lead to data loss and unnoticed onward infections, causing harm to your organization. Implementing a robust anti-malware solution is crucial to prevent such incidents.

05

Patching

Regularly discovered software vulnerabilities are swiftly exploited by malicious actors. Vendors release patches for supported products, and applying them promptly significantly reduces the risk of compromise.

Areas covered by Cyber Essentials

The Cyber Essentials scheme comprises two certifications that assess your organization's policies, configurations, and devices against security standards, ensuring competence in safeguarding systems across specific categories for certification.

Scope of an Cyber Essentials Assessment

Most devices fall under the Cyber Essentials assessment's scope, designed for an entire organisation's assets. Some devices may require inclusion, not initially anticipated, while others can be excluded from the organisation's defined scope.

The following are some of the technologies that should be considered for Cyber Essentials:

There are several gadgets that do not need to be evaluated as part of the Cyber Essentials framework. This can assist in precisely defining where the Cyber Essentials standards should be implemented:

Scope of an Cyber Essentials Assessment

Most devices fall under the Cyber Essentials assessment's scope, designed for an entire organisation's assets. Some devices may require inclusion, not initially anticipated, while others can be excluded from the organisation's defined scope.

The following are some of the technologies that should be considered for Cyber Essentials:

  • Desktops, Laptops, Thin Clients, and Virtual Desktops used by the organisation
  • Any servers (virtual & physical), including underlying hypervisors
  • Personal devices (BYOD) accessing company resources or data (e.g., email, remote access) like laptops, desktops, and mobile phones
  • Cloud Services, including IaaS, PaaS, and SaaS
  • Internet-accessible Firewalls, Routers, Switches, and Wireless Devices used to route communications via the internet

There are several gadgets that do not need to be evaluated as part of the Cyber Essentials framework. This can assist in precisely defining where the Cyber Essentials standards should be implemented:

  • Mobile devices exclusively for voice, text, or MFA apps are out of scope.
  • ISPs and routers are not considered in scope.
  • Switches and wireless devices are out of scope if not directly accessible over the internet.
  • Some devices not in scope include those unable to accept inbound connections, generate user-initiated outbound connections, or manage data flow between devices and the internet.

Process of a Cyber Essentials Assessment

Explore the unique testing processes for Cyber Essentials and Cyber Essentials Plus, uncovering distinct approaches to enhancing cybersecurity.

Cyber Essentials (CE)

The scheme aims to assess your organisation to ensure you are meeting a baseline security standard for policies, procedures and configurations.

For CE Basic you are required to complete and evidence a self-assessment questionnaire to gain certification. The questionnaire will then be reviewed by a member of our qualified team. If everything checks out you will gain your certification.

Cyber Essentials Plus (CE+)

The Cyber Essentials PLUS scheme expands upon the CE scheme by incorporating security testing against a range of common and automated threats.

Process of a Cyber Essentials Assessment

Explore the unique testing processes for Cyber Essentials and Cyber Essentials Plus, uncovering distinct approaches to enhancing cybersecurity.

Cyber Essentials (CE)

The scheme aims to assess your organisation to ensure you are meeting a baseline security standard for policies, procedures and configurations.

For CE Basic you are required to complete and evidence a self-assessment questionnaire to gain certification. The questionnaire will then be reviewed by a member of our qualified team. If everything checks out you will gain your certification.

Cyber Essentials Plus (CE+)

The Cyber Essentials PLUS scheme expands upon the CE scheme by incorporating security testing against a range of common and automated threats.

  • Self Assessment Questionnaire - Work through a series of questions to assess your organisation against CE standards
  • External Security Controls - We evaluate the security of your public-facing services against the CE key technical controls.
  • End-User Device Protection - All end-user devices are assessed against 5 key areas.

Why choose us?

Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.

Think you’re ready to certify against Cyber Essentials?

Lots of organisations try to undergo certification without being ready. Advanced preparation can help reduce costs and improve your chances of passing successfully the first time.

Work through our free Cyber Essentials Plus Checklist to get a full gap analysis report and expert recommendations. This will make sure your organisation meets all of the Cyber Essentials requirements and Cyber Essentials Plus requirements ahead of certification.

Take the Test

Think you’re ready to certify against Cyber Essentials?

Lots of organisations try to undergo certification without being ready. Advanced preparation can help reduce costs and improve your chances of passing successfully the first time.

Work through our free Cyber Essentials Plus Checklist to get a full gap analysis report and expert recommendations. This will make sure your organisation meets all of the Cyber Essentials requirements and Cyber Essentials Plus requirements ahead of certification.

Take the Test

See how we can help get your business Cyber Essentials certified today...

Get in touch with us for a free consultation or quote.

Check - Elements Webflow Library - BRIX Templates
Thank you for your message, we will be in touch.
Oops! Something went wrong while submitting the form.