Show you’re serious about cyber security and prevent security incidents by achieving Cyber Essentials with CyberLab.
Cyber Essentials is a government-backed initiative to help businesses just like yours to protect against the most common cyber threats.
Originally launched in 2014, over 120,000 certificates have since been awarded to businesses of all sizes across the country.
As an IASME approved assessor for the Cyber Essentials and Cyber Essentials Plus, we offer a range of options depending on your requirements and technical ability.
Get Cyber Essentials Certified
Formalise Your Security
Our process gives you and your team a clear picture of your current cyber security standard and ensures that key processes and policies are formally documented in case the worst should happen.
Win More Business
Public contracts involving personal data have required Cyber Essentials since 2014. The MOD implemented this policy in 2016, with many businesses following suit. Certification can make the difference when it comes to winning big contracts.
Cyber Liability Insurance
Upon achieving certification, any UK organisation with turnover below £20m automatically qualifies for AXA Cyber Liability Insurance, including a 24-hour helpline, crisis support, and incident response up to £25,000.
Set Yourself Apart
A Cyber Essentials accreditation is a great selling point for your business. No matter who your clients are - from SMEs to FTSE 100 companies - they need to know you are taking their data security seriously.
The certification process builds cyber security awareness within your organisation, educates your people on essential security practices, and equips them to respond to potential threats.
Peace of Mind
You can sleep soundly at night knowing that your systems and applications are secured against 80% of cyber attacks, allowing you to focus on what matters most – your business objectives.
How Much Does a Cyber Essentials Certification Cost?
Prices for Cyber Essentials certifications start from just £300.
Prices can vary depending on the size of your organisation, and the level of support that you would like from us.
We can offer the certification by itself, alongside a pre-assessment check, or with additional remote support from our team of experts.
We are transparent about our pricing, which we keep in-line with the NCSC recommendations.
The Process: Five Technical Controls
The Cyber Essentials scheme addresses five key controls that, when implemented correctly, can prevent around 80% of cyber attacks:
Creating a buffer between your network and external networks, a firewall protects your network by analysing incoming traffic to identify whether access to your network should be granted.
Cyber Essentials requirement – A firewall must be configured and used on all devices, particularly those connected to public or untrusted Wi-Fi networks.
Default configurations often make it as easy as possible to connect and use, which can create vulnerabilities if left unchanged. Settings should be checked, disabling, or removing unnecessary functions, while default passwords should be updated before deployment. Two-factor authentication should be used for data sensitive accounts.
Cyber Essentials requirement – Only necessary software, accounts and applications are used.
In allowing access to those — and only those — accounts (software, settings, services, and functions) that your people need in their specific job role, the risk of potential damage can be minimised.
Cyber Essentials requirement – Access to your data must be controlled through user accounts, with controlled administration level privileges given only to your people who specifically need them.
Malware — including ransomware and viruses — can come from a range of sources, including infected email attachments or USB memory sticks. Anti-malware measures are included within most operating systems. Malware can be introduced to a network when a rogue application is downloaded, so whitelisting – only giving users the ability to run applications authorised by the administrator – offers good protection. Sandboxing – running an application in an environment with restricted access to the rest of your devices and network – helps to keep your data beyond the reach of malware.
Cyber Essentials requirement – At least one approach, anti-malware measures, whitelisting or sandboxing must be implemented.
Operating systems and applications become vulnerable if they are not up kept to date. To keep patches up to date, your systems and applications should be set to “automatically update” where possible. When no longer supported, systems and applications should be replaced.
Cyber Essentials requirement – Devices, software and apps must be kept up to date.
Download Cyber Essentials Checklist
We’ve put together a checklist to get you through the Cyber Essentials certification.
How Do We Achieve Accreditation?
As an IASME approved assessor, CyberLab is not only authorised to assess against the scheme, but also able to support your organisation to achieve certification.
Not only are we authorised Cyber Essentials assessors, we are also able to provide bespoke consultancy services to assist your team in meeting and maintaining the high standard of security required.
With our expert advice, you’ll pass first time.
Frequently Asked Questions
• Protects your organisation from approximately 80% of cyber-attacks, according to the UK government.
• Demonstrates your commitment to security and data protection to customers and stakeholders.
• Boosts your reputation and increases your chance of securing new business by showing you have cyber-security measures in place.
• Cyber Essentials permits you to work with the UK government, Cyber Essentials Plus makes you eligible to work with the MoD.
• Lets you focus on your business objectives, knowing you are secure.
Insurance terms and conditions can be found here.
The Cabinet Office’s note to Procurement Officers is available here – this specifies where the Cyber Essentials certification is mandated
It is noted that an increasing number of government and commercial organizations are requiring this certification of their suppliers, even though they are not mandated to do this through the Procurement Policy Notice.
Any company using unsupported or out-of-date software in the scope of the assessment, such as Microsoft 7, will probably fail to achieve Cyber Essentials certification.
The questionnaire requires answers to all questions – most of these questions will require brief notes to enable us to understand your company and the information security controls that you have in place. By providing full details in the questionnaire you will reduce the time required for certification as we will have all the information we need up front.
For Cyber Essentials, once you have completed the self-assessment questions on the online portal we aim to turnaround all assessments within 24 hours.
For Cyber Essentials Plus, this must be carried out within three months of achieving the Cyber Essentials accreditation. Cyber Essentials Plus requires an on-site audit which can be scheduled as soon as a signed order is request and a Cyber Essentials pass is in place.
We will get in touch ahead of your expiry date outlining the steps involved in order to work through your renewal.
You need to get nearly all the questions right (compliant) to pass the Cyber Essentials assessment. You need to be controlling all these aspects of your system to be certified.
This very strict pass criteria is set by the UK Government.
If you are not compliant in some of the questions we suggest you try and change your processes to meet the requirement and add notes to explain why you are not compliant in this aspect, and how you control that risk.
Speak With an Expert
Enter your details and one of our specialists will be in touch.
Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.
Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.
We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.