Cyber & Data Security

Defining the Scope for Cyber Essentials

This article was updated on:
Oct 3rd, 2018

Defining the Scope for Cyber Essentials

Cyber Security is essential in today’s increasingly complex threat environment, so well done for prioritising your business’s safety and looking to get your business Cyber Essentials certified! Getting started is the most difficult step in most cases, and figuring out your Cyber Essentials scope and what you need to do can seem complicated initially, so we’ve put together a short overview and Q&A on everything you need to successfully get your certification. Let’s get started!

What is Cyber Essentials?

Cyber Essentials is a government-backed scheme to help you protect your business against cyber attacks. It provides a clear overview of your current cyber security level and gives you the tools you need to increase your protection and fortify your defences against the most common threats. Having your Cyber Essentials certification shows your clients, partners and prospects that you prioritise your cyber security and take measures to protect their data.

What is my Cyber Essentials scope?

It’s by no means exhaustive, and for the vast majority of small and medium-sized businesses, the scope of your assessment will include your whole organisation. But what about the remote team members, third parties with access to your system, and even your IT provider, you may wonder? We have put together a short Q&A answering the most common questions we get regarding your Cyber Essentials Scope.

Cyber Essentials Scope Q&A

Q. Does the “scope” need to be my whole company?

A. The scope should cover your whole organisation and doing so makes it much easier to answer the questions

However, we recognise that some organisations are complex and so you can describe a scope that relates to a particular subsidiary or business area of an organisation if necessary.

It’s important that it is an entity that is logically separate from the wider organisation. It must also be technically isolated from the wider organisation, normally by using a firewall which blocks access to the excluded segment of the business. If you choose a scope that is not the whole organisation, and you self certify, it is up to you to provide a clear scope description that is acceptable to the assessor. The Cyber Essentials scope description will appear on the certificate you receive.

Q. Are home / remote workers in my Cyber Essentials scope?

A. Home workers includes anyone who works 50% or more of their time at home and accesses company data (email on a home PC, tablet or mobile phone). Home workers and their home internet router are typically always in scope if they access any kind of company data unless they use a VPN on their computer, in which case only the computer accessing the data is in scope and not the internet router.

Q. Are Third Party workers, such as bookkeepers or accountants, included?

A. If they access your network or company data and use a VPN then only the computer accessing the data is in scope. If they use RDP or access company data hosted on G-Suite, Office 365, Dropbox and the like then their computer and internet router is in scope.

Q. Are all my employee’s personal mobile phones in the Cyber Essentials scope?

A. If they access the internet using your main office WiFi connection then yes. The way round this is to install a guest WiFi system which prevents devices from accessing your own internal network. Even if they were to use guest WiFi in the office, if they have company data on them (I.e. email), then they are always in scope.

Q: Are cloud providers in scope, such as Microsoft 365, GSuite, Dropbox, Azure, AWS etc?

A: The Cyber Essentials scope typically relates to the location where you are accessing data from rather than specific cloud hosted services.

If there is a VPN which connects your office network to the cloud provider, then yes, they are in scope.oud providers in scope, such as Microsoft 365, GSuite, Dropbox, Azure, AWS etc?

Get your Cyber Essentials Certification with Southern IT

At Southern IT, we deliver comprehensive cyber security services, and we’re more than happy to help you get your Cyber Essentials certification. If you have any questions or concerns regarding your Cyber Essentials scope, assessment, or anything else surrounding your certification, reach out to our friendly experts or click below to learn more about our cyber security services.

Keen to learn more? Explore our other related resources below:
December 13, 2025
Password ‘Sextortion’ and Ransomware
Cyber & Data Security
July 1, 2025
How Might Hackers Exploit My Cyber Security? 7 Tricks Small Business Owners Need-To-Know!
Cyber & Data Security
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
April 1, 2025
Why Digital Offboarding Needs to Be on Your Radar!
Cyber & Data Security
February 12, 2025
Upgrading to Windows 11: It’s ESSENTIAL, Let us explain why!
Cyber & Data Security
February 1, 2025
11 Simple Steps to Keep Your Microsoft 365 Data Safe
Cyber & Data Security
Microsoft 365
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
May 12, 2021
Cyber Essentials Toolkit
Cyber & Data Security
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 4, 2021
Is Microsoft 365 Secure? Our 5 Essential Tips to Stay Safe
Microsoft 365
Cyber & Data Security
February 1, 2021
Free Cyber Security Awareness Training!
Cyber & Data Security
December 20, 2020
Why Do Businesses Only Care About Cyber Security Once They Get Hacked?
Cyber & Data Security
October 17, 2019
Ransomware – Should You Be Worried? 
Cyber & Data Security
August 12, 2019
Identity Fraud - Easier Than Ever
Cyber & Data Security
March 28, 2019
Invoice Diversion Scenario
Cyber & Data Security
March 26, 2019
Phishing/Ransom Attack Scenario, What Would You Do?
Cyber & Data Security
March 13, 2019
The difference between Cyber Essentials and Cyber Essentials PLUS
Cyber & Data Security
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
November 28, 2018
How Secure is My Password?
Cyber & Data Security
November 2, 2018
How much help do I need to get Cyber Essentials Certified?
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
October 1, 2018
Is it time to switch your IT partner?
Cyber & Data Security
October 1, 2018
The Facebook Breach: This is What You Need to do NOW...
Cyber & Data Security
September 20, 2018
Email Spoofing Scenario
IT Management, Policies & Certifications
Cyber & Data Security
August 24, 2018
What is OneDrive and why should my business be using it? 
Telecoms & Connectivity
Cyber & Data Security
August 20, 2018
What is GDPR?
Cyber & Data Security
August 15, 2018
Server VS Cloud - Which is best for your business?
Telecoms & Connectivity
Cyber & Data Security
August 14, 2018
Why Should I get my business Cyber Essentials certified?
Cyber & Data Security
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
May 1, 2018
The Difference between NCSC Small Business Guide & Cyber Essentials
Cyber & Data Security
December 2, 2017
Cyber Essentials Certification: Everything You Need to Know
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications