How CyberLab Executed Targeted Attack Simulations in Financial Services
Simulating Real‑World Attacks to Strengthen Financial Services Security
Financial services organisations operate in one of the most heavily targeted sectors globally. As threat actors continue to evolve their tactics, techniques and procedures, traditional security testing alone is no longer enough to provide confidence.
This case study explores how a leading UK financial services organisation partnered with CyberLab to validate its cyber defences through Red Teaming and targeted attack simulations, providing real‑world assurance that security controls, people and processes could withstand modern attack techniques.
Why Financial Services Are Prime Targets
Banks, lenders, building societies and financial services providers remain highly attractive to cyber criminals and advanced threat actors due to:
- High‑value financial data and assets
- Complex, interconnected digital environments
- Strict regulatory and compliance requirements
- Heavy reliance on customer‑facing digital services
Attackers increasingly combine technical exploitation with social engineering, targeting both systems and people. This makes realistic attack simulation a critical component of modern Cyber Security strategy.
About the Organisation
The organisation is a leading UK financial services provider, serving thousands of customers and members nationwide. Operating within a highly regulated environment, it has built a strong reputation based on trust, service excellence and regulatory compliance.
As part of an ongoing digital transformation programme, the organisation recognised that maintaining a resilient Cyber Security posture was essential to protecting customer data, financial assets and brand reputation.
To gain independent assurance of its security maturity, the organisation engaged CyberLab to conduct advanced offensive security testing aligned to real‑world attack scenarios.
How Are Cloud Services Treated Under the Updated Cyber Essentials Requirements?
The Business Challenge Financial services organisations face a dual challenge: enabling digital innovation while ensuring robust protection against increasingly sophisticated threats.
This organisation operated several business‑critical systems, including:
- Customer‑facing web and mobile banking platforms.
- Internal systems supporting lending and mortgage processes.
- Externally exposed infrastructure supporting digital services.
Any compromise could have resulted in:
- Unauthorised access to sensitive customer data.
- Operational disruption.
- Regulatory scrutiny and financial penalties.
- Long‑term reputational damage.
The organisation needed confidence that its preventative, detective and responsive controls would perform effectively under real attack conditions.
Why Red Teaming Matters in Financial Services
Unlike traditional penetration testing, Red Team exercises simulate the behaviour of genuine threat actors over an extended period.
For financial services organisations, Red Teaming helps to:
- Validate security controls across people, process and technology
- Test detection and response capabilities, not just prevention
- Identify gaps that only emerge during multi‑stage attacks
- Provide evidence of security maturity to regulators and stakeholders
This approach supports regulatory expectations around resilience, continuous improvement and proactive assurance.
The CyberLab Approach
CyberLab delivered a multi‑layered offensive security engagement, tailored to the organisation’s threat profile and risk priorities.
Red Team Exercise >
A multi‑week Red Team exercise simulated advanced attack techniques commonly used against financial institutions.
This included:
- Open‑source intelligence gathering
- Targeted spear‑phishing campaigns
- Assessment of user awareness and susceptibility to social engineering
- Attempts to gain initial access and escalate privileges
The objective was to mirror real‑world attacker behaviour and assess how effectively the organisation could prevent, detect and respond to an active threat.
External Infrastructure Testing >
CyberLab specialists conducted penetration testing across the organisation’s externally exposed infrastructure, assessing:
- Network‑level weaknesses
- Misconfigurations Vulnerabilities that could be exploited for unauthorised access
This testing helped identify technical gaps that attackers could leverage as entry points into the environment.
Web and Mobile Application Testing >
In‑depth testing of customer‑facing web and mobile applications was performed, aligned to the OWASP Top 10 where applicable.
Testing focused on:
- Authentication and authorisation controls
- Application logic flaws
- Data handling and exposure risks
Both automated and manual techniques were used to uncover issues that could impact customer trust and service availability.
The Outcome
The targeted attack simulation provided the organisation with clear, independent validation of its Cyber Security controls and overall resilience.
Key Outcomes
Validation of Cyber Security Controls
The organisation gained assurance that existing controls could defend against realistic attack scenarios.
Identification of Vulnerabilities
Technical and human‑centric weaknesses were identified, including areas susceptible to social engineering and control gaps that required attention.
Enhanced Security Posture
Actionable findings enabled targeted improvements to defensive controls, monitoring and incident response capabilities.
Clear Remediation Guidance
Comprehensive reporting provided prioritised recommendations, allowing efficient and effective remediation aligned to risk.
Key Takeaways for Financial Services Leaders
- Red Teaming provides insight that traditional testing cannot
- People remain a critical attack vector alongside technology
- Regulators increasingly expect evidence of realistic testing
- Continuous offensive testing supports long‑term resilience
Conclusion
Through an ongoing partnership with CyberLab, this financial services organisation continues to take a proactive approach to Cyber Security.
Regular Red Teaming and offensive testing enable the organisation to adapt to an evolving threat landscape, strengthen defences year on year and maintain the trust of customers and stakeholders.
By combining deep financial services expertise with real‑world attack simulation, CyberLab helps organisations protect what matters most: their people, their data and their reputation.
Ready to Explore Red Teaming?
If you want to understand how Red Teaming or targeted attack simulations could strengthen your organisation’s Cyber Security posture: Speak to a CyberLab expert today.
Cyber Essentials May 2026 Update: What Businesses Need to Do to Pass Danzell
What the Cyber Essentials Requirements for IT Infrastructure v3.3 and the Danzell Standard Mean for Your Business
Cyber Essentials continues to evolve to reflect the realities of modern Cyber Security. From 27 April 2026, all new Cyber Essentials assessments are being assessed against Danzell (The new IASME standard based on Requirements for Infrastructure v3.3), introducing more rigorous expectations around cloud security, authentication and patching.
This update is more than a routine refresh. It reflects how organisations now operate, with cloud first services, remote working and increasingly sophisticated commodity threats firmly in scope. For businesses planning certification or renewal after May 2026, understanding these changes early is essential.
This guide breaks down what has changed and, more importantly, what practical steps organisations should take to remain compliant and resilient.
We’ve awarded over 1,500 Cyber Essentials and Cyber Essentials Plus accreditations
Why is Multi Factor Authentication now an automatic failure requirement under Cyber Essentials Danzell?
One of the most significant changes in the Danzell standard is the automatic failure of Multi Factor Authentication when not enabled if available.
Where MFA is supported, whether it is free, bundled or paid for, it must be enabled for all users. Failure to do so will now result in an automatic fail.
What this means in practice
Organisations must:
- Audit all user accounts across email, cloud platforms and administrative portals
- Enable MFA consistently, including for privileged and administrative users (where separate accounts should be in place)
- Remove legacy authentication methods that bypass MFA
This change improves accountability and dramatically reduces the risk of credential based attacks, which remain one of the most common causes of breaches.
How are Cloud Services treated under the updated Cyber Essentials requirements?
Under Danzell a new definition has been added ‘any cloud service that stores or processes organisational data is now in scope’. This removes previous ambiguity around excluding Software as a Service platforms.
Practical considerations for business
You should now:
- Ensure a complete inventory of cloud services in use and maintained in accordance with the updated definition
- Apply Cyber Essentials controls consistently against the updated inventory
- Ensure access controls, MFA, firewalls, malware protection and patching responsibilities are clearly defined with suppliers.
This change reflects how critical cloud services have become to day to day operations and ensures security controls keep pace.
What do the new Cyber Essentials scoping rules mean for devices and services?
The previous concepts of “untrusted” or “user initiated” devices have been removed.
The new rule is straightforward: If a device or service owned by the organisation connects to the internet, or manages internet connected data, it is in scope.
Why this matters
This clarity reduces misinterpretation during assessments and ensures organisations take a more holistic view of their environment. Laptops, mobile devices, servers and cloud platforms should all be considered equally when applying controls. BYOD devices should also not be forgotten when accessing organisational data or services.
All legal entities applying must be listed on your Cyber Essentials application.
Can I exclude systems?
Excluded networks must be clearly detailed in new Danzell scoping statements for any partial scope assessments.
How have Application Development requirements changed in Cyber Essentials v3.3?
The scope formerly referred to as “Web Applications” has now evolved into Application Development.
This aligns Cyber Essentials with the UK Government’s Software Security Code of Practice, increasing focus on:
- Secure coding principles
- Timely patching of applications and frameworks
- Managing vulnerabilities throughout the development lifecycle
Guidance for development teams
Organisations involved in application development should:
- Document secure development practices
- Keep third party libraries up to date
- Demonstrate how vulnerabilities are identified and remediated
- This change reinforces that security must be built in, not bolted on
Why is Passwordless Authentication being encouraged by Cyber Essentials?
While not yet mandatory, the Danzell standard actively promotes passwordless authentication such as passkeys and FIDO2 authenticators.
Why organisations should take notice
Passwordless authentication:
- Reduces reliance on weak or reused passwords
- Improves user experience without sacrificing security
- Aligns with the long‑term direction of secure identity management
Adopting passwordless methods now can simplify future compliance and strengthen overall security posture. For further information IASME guidance should be consulted.
What are the changes for Cyber Essentials Plus under Danzell?
No selective remediation:
Sample 1: If high or critical vulnerabilities are detected by the approved scanning tool in the first sample – a mandatory retest (scanning) with new sampled devices is required (Sample 2).
Sample 2: Random sample of devices which had detected vulnerabilities (high or critical) older than 14 days. If the same vulnerabilities are detected as those from Sample 1 a CE+ fail report is issued and CE certificate revoked by IASME.
- If new or different high or critical vulnerabilities (older than 14 days) are detected this will result in an advisory being noted on the CE+ report and a CE+ Pass awarded.
Assessment rules:
Point in time assessment: All version and system information must be supported and meeting the criteria on the certificate issue date.
- Systems must be supported on certificate issue date, not just submission date.
- Version information should be within the 14-day window for patching if build numbers are provided.
Director declaration: now includes ongoing compliance responsibility.
What are the new Backup and Recovery expectations under Cyber Essentials v3.3?
Whilst not required, backup and recovery have received increased emphasis but are highly recommended by IASME.
Organisations should ensure that backups are:
- Robust and documented
- Protected from unauthorised access
- Regularly tested to ensure recovery is achievable
- If automatic backups are available, you should consider turning them on.
Practical steps to take:
Businesses should review:
- Backup frequency and retention policies
- Offline or immutable backup options
- Evidence of routine restore testing
This ensures organisations are better prepared to recover from ransomware or other disruptive incidents.
When does the Cyber Essentials Danzell standard come into effect and what is the deadline?
There is a critical timing consideration for organisations planning certification.
- Assessments set up before 27 April 2026 will follow the previous Willow standard
- Assessments initiated on or after this date must comply with Danzell Standard
For some organisations, this presents a short‑term opportunity. For most, however, preparing for the new requirements is the more sustainable approach.
How can organisations prepare for Cyber Essentials certification after May 2026?
The Danzell update raises the bar, but it also brings clarity. Organisations that take a proactive approach will find that these changes not only support compliance but meaningfully improve resilience.
Key preparation steps include:
- Reviewing MFA and account separation coverage across all systems
- Bringing all cloud services into scope
- Rigorous system wide patching in line with 14-day requirements, implementation of patching tools
- Updating asset inventories and scoping assumptions
- Strengthening backup and recovery processes
- Aligning development practices with secure coding standards
- Mobile device management for both organisation owned devices and BYODs is strongly advised.
How can CyberLab support your Cyber Essentials journey post-May 2026?
Navigating updated Cyber Essentials requirements can be complex, particularly for organisations with growing cloud environments.
CyberLab supports businesses through:
- Cyber Essentials readiness assessments
- Practical remediation guidance
- Ongoing Cyber Security strategy aligned to evolving standards
If you are planning Cyber Essentials certification or renewal after May 2026, now is the right time to act.
Get Cyber Essentials Certified
Show your commitment to cyber security and reduce risk by gaining Cyber Essentials certification – the UK government-backed standard for defending against common threats.
As an IASME-approved assessor for Cyber Essentials and Cyber Essentials Plus, we make the process simple with tailored options to suit your technical capability and business needs.
Join over 120,000 organisations already certified and take the first step towards stronger security today.
Cyber Essentials Willow Update 2025: Everything You Need To Know
What You Need to Know
The latest Cyber Essentials update, ‘Willow’, was released in May 2025, marking a significant evolution in the UK government’s flagship cyber security certification scheme. Replacing the ‘Montpellier’ question set, Willow reflects updated guidance from the National Cyber Security Centre (NCSC) and responds to emerging threats that businesses face today.
Whether you’re renewing your certification or applying for the first time, here’s a clear breakdown of what’s changed – and what your business needs to do next.
Key Changes in the 2025 Willow Update
The Willow update builds on the previous Montpellier release, revising definitions, terminology, and processes to keep Cyber Essentials aligned with current cyber security best practice.
Some of the headline changes include:
1. Expanded Scope: Firmware is Now In-Scope
The term ‘software’ now explicitly includes firmware, such as that found on firewalls and routers. This means organisations must ensure these critical systems are updated regularly — and are no longer exempt from compliance checks.
Why it matters: Unpatched firmware is increasingly targeted by attackers and often overlooked in patch management strategies.
2. Mandatory Asset Management Practices
Organisations must now maintain an accurate, up-to-date inventory of all devices and software within scope. This includes:
-
Company-issued and personal (BYOD) devices
-
Cloud services
-
Networking equipment
-
Installed applications
Why it matters: Asset visibility is a fundamental control for identifying vulnerabilities and reducing risk.
3. Tighter Controls for BYOD (Bring Your Own Device)
“Plugins” have been replaced with “frameworks and extensions,” a change that aligns terminology with modern software development and deployment.
4. Cloud Services: MFA Now Mandatory
The update introduces stricter rules for personal devices used for work, referencing the latest NCSC guidance. Organisations must:
-
Define clear BYOD policies
-
Enforce controls like device encryption and screen locks
-
Ensure staff understand their responsibilities
Why it matters: Personal devices are often a weak link, especially in remote or hybrid environments.
What’s Changed in Cyber Essentials?
1. Vulnerability Fixes
The term “high and critical patches” has been replaced with “vulnerability fixes.” This now includes a broader range of remediation actions such as scripts, registry edits, or vendor-prescribed methods. Any vulnerability with a CVSS score of 7.0 or higher (based on CVSS v3.1) must now be addressed.
2. Remote Working Terminology
“Home Workers” has been updated to “Home working and remote working” to better reflect the variety of modern work arrangements.
3. Supported Software
The term “plugins” has been replaced with “frameworks and extensions” to align with current software structures.
4. Passwordless Authentication
Now permitted in specific scenarios, including access to firewall configurations, externally hosted services, and internal infrastructure. Accepted methods include biometrics, physical devices, one-time codes, QR codes, and push notifications.
What’s Changed in Cyber Essentials Plus?
1. Technical Scope Verification
Auditors must now technically verify the scope of in-scope assets, including servers, end-user devices, mobile devices, and networks. Any excluded networks must also be verified.
2. Asset Sampling Notification
Applicants will be notified of the sampled assets three working days before the audit – but not earlier. This ensures a fair and unbiased selection process.
3. Admin Device Sampling
If applicable, an admin user’s device must be included in the audit sample.
What Your Business Needs to Do
Whether you’re looking to achieve certification for the first time or renew under Willow, you’ll need to ensure that your policies, tools, and documentation reflect these new expectations.
Here’s how to stay compliant:
✅ Review the full Willow requirements on the NCSC website.
✅ Audit and update your asset management processes.
✅ Apply firmware patching to all in-scope devices.
✅ Enforce MFA across all cloud platforms, for all users.
✅ Review and formalise your BYOD policies and training.
Need Help Navigating the Willow Update?
As an IASME-approved certification body, CyberLab has already helped hundreds of organisations achieve Cyber Essentials and Cyber Essentials Plus — and we’re ready to guide you through the Willow update too.
Whether it’s a full audit or a quick compliance health check, we can support you every step of the way.
Contact us today to get started with Willow.
Cyber Essentials Funded Programme: Government Support for UK SME's
Helping UK SMEs Strengthen Cyber Defences with Government Support
In today’s digital-first world, cyber threats are no longer a distant concern – they’re a daily reality. The UK government’s Cyber Essentials scheme offers a practical, affordable way for organisations to defend against the most common attacks.
Whether you’re a small business or a growing tech innovator, this funded programme helps you build a strong security foundation, earn customer trust, and unlock new opportunities – including eligibility for government contracts. And with CyberLab’s expert guidance, getting certified is simpler than ever.
What is Cyber Essentials?
Cyber Essentials is a government-backed initiative to help businesses protect against the most common cyber threats. Originally launched in 2014, over 120,000 certificates have since been awarded to businesses of all sizes across the country.
According to the UK government, obtaining Cyber Essentials certification protects your organisation from approximately 80% of cyber-attacks, demonstrating a strong commitment to cyber security and data protection to customers and stakeholders. This certification enhances your organisation’s reputation, increases the likelihood of securing new business, and enables you to bid for and win UK government contracts. By ensuring that robust cyber security measures are in place, Cyber Essentials provides the peace of mind needed to focus on your core business objectives.
Cyber Essentials Plus
Cyber Essentials Plus is the next step in your cyber security journey – an advanced government-backed initiative for businesses looking to take extra measures to protect against common cyber threats.
Around a quarter of businesses who take the Cyber Essentials certification go on to achieve Cyber Essentials Plus.
What is the funded Cyber Essentials Programme?
Every business today faces the risk of a cyber attack, but some organisations are particularly vulnerable. This could be because they handle sensitive information about the people they work with or are seen as easier targets by cyber criminals.
To help those most at risk, the NCSC is rolling out a Funded Cyber Essentials Programme. This programme is aimed at supporting vulnerable organisations by helping them implement basic security measures to protect against the most common types of cyber attacks.
How Does it Work?
The programme offers practical support from an Advisor to help your organisation achieve Cyber Essentials Plus, at no cost to the organisation. However, if the Advisor recommends any extra software or hardware, those costs won’t be covered.
If you qualify, you’ll get around 20 hours of remote support with an Advisor. They’ll spend this time working with you to identify and implement improvements that suit your organisation’s size and needs, guiding you through the five Cyber Essentials technical controls. After that, there will be a hands-on technical check to make sure everything is in place.
If it turns out that achieving Cyber Essentials Plus isn’t possible, the Advisor will help you implement as many of the controls as you can and provide a clear list of what else needs to be done to get compliant. This scheme is designed to walk you through the technical controls required for Cyber Essentials certification, leading up to the Cyber Essentials Plus audit. No previous cybersecurity certification or experience is needed.
Who is Eligible for Support?
To qualify for this scheme, companies must be a micro or small business (1 to 49 employees) registered in the UK and working on:
- The development of fundamental Artificial Intelligence (AI) technologies, OR the innovative application of Artificial Intelligence technologies in the following sectors: Public safety and health, Defence and security.
- The development of novel Quantum technologies.
- The design, development or manufacturing of semiconductors / semiconductor IP blocks.
- The development of Engineering Biology or Synthetic Biology.
AND meet the following criteria:
- Has not previously participated in the NCSC Funded Cyber Essentials Programme
- Does not currently hold Cyber Essentials Plus (CE+) certification, has not been awarded CE+ certification since January 2023 and is not currently in the process of applying for CE+ certification
How CyberLab Can Help
As an IASME approved assessor, CyberLab is not only authorised to assess against the scheme, but also able to support your organisation to achieve certification.
Not only are we authorised Cyber Essentials assessors, we are also able to provide bespoke consultancy services to assist your team in meeting and maintaining the high standard of security required.
With our expert advice, you’ll pass first time.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.
Why Windows 10’s End of Life Matters for Cyber Essentials Plus
Navigating Compliance After Microsoft Ends Support for Windows 10
Microsoft officially ended support for Windows 10 on 14 October 2025, marking a major shift for organisations working toward Cyber Essentials Plus (CE+) certification. Without free security updates or patches, Windows 10 devices now pose a compliance risk – unless covered by Microsoft’s Extended Security Updates (ESU) programme.
For CE+ applicants, this change is more than a technical footnote. It directly affects your certification status. Devices running Windows 10 are no longer considered secure by default. To remain compliant, organisations must upgrade to Windows 11 version 23H2 or newer (ideally 24H2 or 25H2).
If your CE+ audit is scheduled within the 90-day window following your Cyber Essentials certification, any Windows 10 devices must be upgraded or removed from scope before submitting your asset list to the auditor.
“With Windows 10 now out of support, organisations pursuing Cyber Essentials Plus must act quickly. Upgrading to Windows 11 isn’t just best practice – it’s essential for compliance. At CyberLab, we’re here to make that transition smooth, secure, and audit-ready.”
– Ryan Bradbury, CTO at CyberLab
Why It Matters
Auditors will now perform technical verification during CE+ assessments.
If Windows 10 devices are detected:
- They must be excluded from scope.
- Failure to do so could result in audit failure or the need to restart both Cyber Essentials and CE+ assessments.
What You Need to Do Now
To stay secure and compliant, here are your next steps:
- Audit your device inventory: Identify any machines still running Windows 10.
- Upgrade to Windows 11: Preferably version 24H2 or 25H2. Note that 23H2 reaches end of life on 11 November 2025, so plan accordingly.
- Consider ESU: If upgrading isn’t feasible, explore Microsoft’s Extended Security Updates programme.
- Communicate with your auditor: Be transparent about your upgrade plans and ensure your asset list reflects only compliant devices.
This transition is a critical moment for organisations aiming to maintain Cyber Essentials Plus certification. By acting now, you’ll avoid last-minute surprises and ensure your systems meet the latest security standards.
Need help navigating the upgrade or preparing for your CE+ audit? CyberLab’s team is here to support you.
Free Posture Assessment
Understand your security risks and how to fix them.
Take the first step to improving your cyber security posture, looking at ten key areas you and your organisation should focus on, backed by NCSC guidance.
Claim your free 30-minute guided posture assessment with a CyberLab expert.




