WHAT IS A CYBER ESSENTIALS ASSESSMENT?

Cyber Essentials is a government backed scheme to help safeguard your organisation from some of the most common security risks which are prevalent in the world and provides you and your clients with a level of assurance that your systems are protected.

Ready to be Cyber Essentials Certified?

THE DIFFERENCE BETWEEN CYBER ESSENTIALS (CE) AND CYBER ESSENTIALS PLUS (CE+)

The Cyber Essentials scheme aims to assess your organisation against a number of categories to ensure you are meeting a baseline security standard for policies, procedures and configurations. The Cyber Essentials PLUS scheme expands upon the Cyber Essentials scheme by incorporating security testing against a range of common and automated threats which may target your publicly accessible systems and an onsite assessment against a number of your key systems which are used on a day to day basis.

CECE+
IASME Certification
Simple Online Questionnaire
External Infrastructure Vulnerability Scan
External Access Control Assessment
External Application Vulnerability Scan
Workstation Assessment
Antivirus Review
Access Permissions Review
Email Controls Review
Web Controls Review
Mobile Device Review

WHY CONDUCT A CYBER ESSENTIALS ASSESSMENT?

A large number of security incidents which occur are often the result of common attack vectors and automated exploit tools. Cyber essentials is a government backed scheme designed to assess your organisation against a number of these common attack techniques to provide an industry recognised security standard which can provide a level of assurance to your clients that you manage and maintain your data and systems securely.

The assessment has also become a requirement for those organisations wishing to bid for central government contracts which involve sensitive or personal data or the provision of technical products and services.

THE FIVE SECURITY CONTROLS OF CYBER ESSENTIALS

The Cyber Essentials scheme breaks down into two Certifications, each of which assess your organisations policies, configurations and devices against a number of security standards to ensure your systems are safeguarded against the following categories.