Cyber & Data Security

Cyber Essentials Certification: Everything You Need to Know

This article was updated on:
Dec 2nd, 2017

Cyber Essentials Certification: Everything You Need to Know

Cyber security has become a hotly debated topic in recent years, with its prevalence and prominence only continuing to grow. Cyber crime is on the rise, and the ramifications of a successful cyber attack can be devastating for businesses. Not only are organisations impacted financially, but their reputation could be damaged, they could find themselves in hot water regarding compliance and many businesses never manage to fully recover.

It is therefore essential that cyber security is a top priority for organisations of all sizes, and the Cyber Essentials scheme has been introduced to ensure that it is. There are a number of reasons why an organisation may choose to complete the Cyber Essentials certification, such as:

  • Demonstrating security to existing or potential customers
  • New opportunities for your organisation
  • Saving on costs
  • Avoid your organisation becoming a victim of avoidable attacks
  • And many, many more...

What is Cyber Essentials?

Cyber Essentials is a scheme launched in 2014 and sets out the baseline standards for basic Cyber Security in businesses. The Government consulted and worked with industry organisations to come up with what we now know as the Cyber Essentials Accreditation. As organisations face significant risk of a cyber attack, now more than ever it is essential that you are doing everything in your power to protect your organisation.

In order to bolster your cyber security posture, in accordance with a government backed scheme, you must complete a Cyber Essentials questionnaire. This will take a look at five integral components of cyber security, and assess whether there are areas that need further attention, investment or support.

There are two versions of the scheme: Cyber Essentials basic and Cyber Essentials PLUS, and it is down to you to decide which would be a better fit for your organisation.

Cyber Essentials Vs Cyber Essentials PLUS

Cyber Essentials come in two levels of certification:

Cyber Essentials – an independently verified self-assessment. Organisations assess themselves against five basic security controls and a qualified assessor verifies the information provided.

This level comprises of eight sections and 70 questions, all of which must be answered. Prior to submitting your questionnaire answers, however, they must first be approved by a Board level representation, business owner or somebody of an equivalent level, declaring that all answers provided and accurate and correct.

This level is appropriate for organisations of all sizes, and many micro or small businesses have reported that preparing for the questionnaire was a great learning experience – leading to a heightened awareness around cyber security, and even a change in behaviour.

For many larger organisations, they will already be deploying a range of the security controls that are listed in Cyber Essentials, but may be looking to showcase their commitment to strengthened cyber security to reassure existing customers, or perhaps attract new clients, as Cyber Essentials is a Government approved scheme.

Cyber Essentials PLUS – a higher level of assurance. An independent assessor examines the same five controls, testing that they work in practice by simulating basic hacking and phishing attacks.

The assessor will typically test roughly 10% of your systems, but they may choose to conduct further testing if it is necessary. The test will examine the strength of your devices, internet gateways and servers against hacking and phishing attacks.

In order to qualify for Cyber Essentials PLUS, you must complete the Cyber Essentials questionnaire, however, the two can be completed simultaneously. If you have already completed the Cyber Essentials questionnaire, you are required to undertake the Cyber Essentials PLUS audit within three months.

What’s Involved in Cyber Essentials Training?

So, what are the five controls that Cyber Essentials tests in our business?

  1. Boundary firewalls and internet gateways
  2. Secure configuration
  3. Access control
  4. Malware protection
  5. Patch management

Between these five areas, 64 questions are asked to see if you meet the required standard that together mitigate over 99% of the most common, unskilled cyber-attacks that businesses fall victim to every day.

Cyber Essentials has become the minimum standard required for working with some central government departments, and this is pushed down the supply chain, and is widely expected to be required across government departs and local government over time.

Let’s take each of those 5 controls and give some examples as to what is expected:

Boundry firewalls and internet gateways

This area looks to check that only safe, and necessary internet traffic is accessed by correct configuration on the firewall and also that the firewall configuration is protected with strong credentials, and restricted to only those that require access.

Secure Configuration

The secure configuration checks are there to reduce the level of vulnerabilities that are in systems as default and that machines or services run with the minimum level of security for the role being fulfilled. An example of this would be to remove administrative privileges for employees and change all default password to secure ones.

Access Control

This area looks at user accounts and makes sure they are assigned to authorised individuals only, and that they provide access to only those applications, computers and networks actually required for the user to perform their role.

Malware Protection

This is the one that’s always in the news currently, and this area is used to confirm that you have adequate security to stop the running of known malware and to prevent harmful code from causing damage or accessing data. This is the area that most people concentrate on protecting themselves for, but without the other controls within the Cyber Essentials standard it is not effective.

Patch Management

Patch management is the process for which you ensure that devices and software are not vulnerable to known security issues for which fixes are available. Software vendors regularly release fixes and patches for vulnerabilities that the standard requires are installed in a timely manner.

As you can see the 5 areas cover all the basics, but they are basic areas that most SME’s do not control within their businesses, if they do some of them, it’s rare that small businesses do them all, and to a good standard.

How Southern IT Can Help You Get Started with Cyber Essentials Certification

At Southern IT, we have a wealth of experience in helping organisations of all sizes with attaining their Cyber Essentials certification. Whether you are hoping to strengthen your cyber security posture, or reassure customers that you are cyber security conscious through a government back scheme, we are here to help!

To garner a greater understanding of Cyber Essentials, and to discover what it is you need to do to prepare for it, check out our Cyber Essentials Readiness Tool, today. You can also find more info on why you should become Cyber Essentials certified, by downloading our Cyber Essentials eBook.

Keen to learn more? Explore our other related resources below:
December 13, 2025
Password ‘Sextortion’ and Ransomware
Cyber & Data Security
July 1, 2025
How Might Hackers Exploit My Cyber Security? 7 Tricks Small Business Owners Need-To-Know!
Cyber & Data Security
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
April 1, 2025
Why Digital Offboarding Needs to Be on Your Radar!
Cyber & Data Security
February 12, 2025
Upgrading to Windows 11: It’s ESSENTIAL, Let us explain why!
Cyber & Data Security
February 1, 2025
11 Simple Steps to Keep Your Microsoft 365 Data Safe
Cyber & Data Security
Microsoft 365
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
May 12, 2021
Cyber Essentials Toolkit
Cyber & Data Security
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 4, 2021
Is Microsoft 365 Secure? Our 5 Essential Tips to Stay Safe
Microsoft 365
Cyber & Data Security
February 1, 2021
Free Cyber Security Awareness Training!
Cyber & Data Security
December 20, 2020
Why Do Businesses Only Care About Cyber Security Once They Get Hacked?
Cyber & Data Security
October 17, 2019
Ransomware – Should You Be Worried? 
Cyber & Data Security
August 12, 2019
Identity Fraud - Easier Than Ever
Cyber & Data Security
March 28, 2019
Invoice Diversion Scenario
Cyber & Data Security
March 26, 2019
Phishing/Ransom Attack Scenario, What Would You Do?
Cyber & Data Security
March 13, 2019
The difference between Cyber Essentials and Cyber Essentials PLUS
Cyber & Data Security
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
November 28, 2018
How Secure is My Password?
Cyber & Data Security
November 2, 2018
How much help do I need to get Cyber Essentials Certified?
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
October 3, 2018
Defining the Scope for Cyber Essentials
Cyber & Data Security
October 1, 2018
Is it time to switch your IT partner?
Cyber & Data Security
October 1, 2018
The Facebook Breach: This is What You Need to do NOW...
Cyber & Data Security
September 20, 2018
Email Spoofing Scenario
IT Management, Policies & Certifications
Cyber & Data Security
August 24, 2018
What is OneDrive and why should my business be using it? 
Telecoms & Connectivity
Cyber & Data Security
August 20, 2018
What is GDPR?
Cyber & Data Security
August 15, 2018
Server VS Cloud - Which is best for your business?
Telecoms & Connectivity
Cyber & Data Security
August 14, 2018
Why Should I get my business Cyber Essentials certified?
Cyber & Data Security
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
May 1, 2018
The Difference between NCSC Small Business Guide & Cyber Essentials
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications