When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.
This quick guide provides an overview of the Cyber Essentials scheme and outlines the key stages for certification.
Use the free resources links below to find out more information and guidance on the scheme. We have provided downloadable guides, sample documents and a variety of blogs to make compliance even easier.
Free Cyber Essentials Resources Links:
Cyber Essentials is a UK government scheme designed to protect companies and organisations, whatever their size, against a range of the most common cyber attacks. Most of these attacks are basic and carried out by relatively unskilled people. They have been described as the digital equivalent of a thief trying a home’s front door to see if it is unlocked. The certification scheme was launched in 2014 by the UK Department for Business, Innovation and Skills and is operated by the National Cyber Security Centre (NCSC).
The scheme can benefit your business in a number of ways:
1. Preventing cyber attacks: If you fail to protect your computer systems, you’re at more risk of a cyber attack. An attack could result in your organisation losing vital data, disrupting cash flow and damaging your reputation.
2. Government contracts: Organisations bidding for some contracts with the British Government will need Cyber Essentials certification.
3. Customer trust: Becoming certified shows your customers that you take cyber security seriously and are taking the necessary steps to keep the data you hold about them safe. Displaying your credentials on your website, emails and other marketing materials shows your customers – and perspective ones – that you’re serious about cyber security.
There are five technical controls (a “control” is simply a way to address a risk) you will need to put in place, which are:
Guidance from the UK National Cyber Security Centre breaks these down into finer details. These controls have been chosen as the highest priority ones from other, more detailed guidance such as the ISO27001 standard for information security, the Standard of Good Practice (from the Information Security Forum) and the IASME Cyber Assurance standard. Although, Cyber Essentials has a narrower focus, emphasising technical controls rather than more general governance and risk assessment.
Cyber Essentials is also useful for those with an eye on the GDPR – the EU’s General Data Protection Regulation – which came into effect in May 2018. The GDPR is a far-reaching regulation, intended to protect the privacy of individuals and their personal data within the European Union. The regulation specifies that “controllers” must determine their own cyber security approaches based on the personal information they hold and process. Since Brexit, the UK now has its own data protection regime, heavily based on the GDPR.
While Cyber Essentials can help with this, it is not a complete solution for all GDPR obligations. But the Information Commissioner’s Office (ICO), whose job it is to uphold data protection law in the UK, recommends Cyber Essentials as “a good starting point” for the cyber security of the IT systems and networks you rely on to hold and process personal data.
Not everyone has the time or money needed to develop a comprehensive cyber security system, so the scheme has been designed to fit in with whatever level of commitment you are able to sustain. There are three main levels of engagement:
The self-assessment option (not going for certification) still gives you protection against a wide variety of the most common cyber attacks, so we’d encourage you to do this as a minimum. This is important because vulnerability to simple attacks can mark you out as a target for more in-depth unwanted attention from cyber criminals and others.
Certification gives you increased peace of mind that your defences will protect against the majority of common cyber attacks simply because these attacks are looking for “soft” targets which do not have the technical controls in place. If you would like to bid for central government contracts which involve handling sensitive and personal information, or the provision of certain technical products and services, you may need to have certification, at either the basic or Plus level.
The process of obtaining basic certification is relatively simple and generally costs between £300 and £500 plus VAT, depending on the size of your organisation. The scheme shows you how to address the basics and prevent the most common attacks. So far about 80% of companies and organisations with Cyber Essentials certification have chosen the basic version. It is often larger organisations that choose Cyber Essentials Plus due to the additional cost, which can be several thousand pounds (although this varies – shop around for the most appropriate deal for you).
Certification involves three simple steps:
Certification is conducted by IASME Consortium for both types of certification. You will need to choose an IASME accredited certification body to perform your evaluation and award your Cyber Essentials certificate.
Cyber Essentials defines a set of requirements in the five control areas and you will need to make sure your systems and software meet these before you move on to the next stage of certification. You may be required to supply various forms of evidence before your chosen certification body can award certification at the level you seek, so it’s best to have this available in case it’s asked for.
You will also need to define the scope of your intended certification. This determines what is certified and, in the case of Cyber Essentials Plus, what is tested. Generally, the scope will be defined by a physical location, such as your main office, remote offices or cloud services.
Having understood the requirements on the installation, configuration and maintenance of your IT, you are ready to complete the certification questionnaire and submit this to your certification body. The actual questionnaire you complete will be supplied by your certification body, or is available via the IASME website.
The certification body may come back to you with some clarification questions and, once you have answered these, a decision will be reached about whether or not your answers meet the requirements for certification.
Once the certification body says you’ve passed, you will be awarded your Cyber Essentials certificate and may use the logo on your website and marketing materials. Your certificate remains valid for one year, after which you will need to re-certify if you want to stay on the list of certified organisations on the NCSC website.
The CertiKit Cyber Essentials Toolkit is designed to help implement the five key controls of Cyber Essentials quickly and effectively with much less effort than doing it all yourself. Our high-quality template documents and checklists come complete with email support and lifetime updates. Using the toolkit is the first step to securing your IT systems and will prepare your business for certification.