Get in touch

Get in touch

  • This field is for validation purposes and should be left unchanged.

Privacy Notice


When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.

Reveal Menu

What is Cyber Essentials?

Cyber Essentials is a UK government scheme designed to protect companies and organisations, whatever their size, against a range of the most common cyber attacks. Most of these attacks are basic and carried out by relatively unskilled people. They have been described as the digital equivalent of a thief trying a home’s front door to see if it is unlocked. The certification scheme was launched in 2014 by the UK Department for Business, Innovation and Skills and is operated by the National Cyber Security Centre (NCSC).

How can Cyber Essentials benefit your business?

The scheme can benefit your business in a number of ways:

1. Preventing cyber attacks:  If you fail to protect your computer systems, you’re at more risk of a cyber attack. An attack could result in your organisation losing vital data, disrupting cash flow and damaging your reputation.

2. Government contracts:  Organisations bidding for some contracts with the British Government will need Cyber Essentials certification.

3. Customer trust:  Becoming certified shows your customers that you take cyber security seriously and are taking the necessary steps to keep the data you hold about them safe. Displaying your credentials on your website, emails and other marketing materials shows your customers – and perspective ones – that you’re serious about cyber security.

The five controls

There are five technical controls (a “control” is simply a way to address a risk) you will need to put in place, which are:

  1. Office Firewalls and Internet Gateways: Secure your internet connection with boundary and host-based firewalls.
  2. Secure Configuration: Settings, passwords and two-factor authentication.
  3. User and Administrative Accounts: Protecting administrators and limiting access to data and services.
  4. Malware Protection: Viruses, white-listing and sand-boxing.
  5. Software Patching: Keep your devices and software up to date.

Guidance from the UK National Cyber Security Centre breaks these down into finer details (although there is no definitive Cyber Essentials standard document, as there would be with an ISO standard or a law). These controls have been chosen as the highest priority ones from other, more detailed guidance such as the ISO27001 standard for information security, the Standard of Good Practice (from the Information Security Forum) and the IASME Governance standard. Although, Cyber Essentials has a narrower focus, emphasising technical controls rather than more general governance and risk assessment.

Cyber Essentials and the GDPR

Cyber Essentials is also useful for those with an eye on the GDPR – the EU’s General Data Protection Regulation – which came into effect in May 2018. The GDPR is a far-reaching regulation, intended to protect the privacy of individuals and their personal data within the European Union. The regulation specifies that “controllers” must determine their own cyber security approaches based on the personal information they hold and process.

While Cyber Essentials can help with this, it is not a complete solution for all GDPR obligations. But the Information Commissioner’s Office (ICO), whose job it is to uphold data protection law in the UK, recommends Cyber Essentials as “a good starting point” for the cyber security of the IT systems and networks you rely on to hold and process personal data.

Standard or Plus Certification?

Not everyone has the time or money needed to develop a comprehensive cyber security system, so Cyber Essentials has been designed to fit in with whatever level of commitment you are able to sustain. There are three main levels of engagement:

  1. The simplest is to familiarise yourself with cyber security terminology, gaining enough knowledge to begin securing your IT systems, without becoming certified.
  2. If you need more certainty in your cyber security (or you want to show others that you’re taking it seriously), you can apply for basic certification. Certification will include a remote vulnerability scan of equipment connected to the web.
  3. For those who want to take cyber security a bit further, Cyber Essentials Plus certification is also available. The five controls are the same as for the basic level, but Plus also includes a more detailed vulnerability scan from inside your network (tested onsite), to check your devices are configured correctly.

The self-assessment option (not going for certification) still gives you protection against a wide variety of the most common cyber attacks, so we’d encourage you to do this as a minimum. This is important because vulnerability to simple attacks can mark you out as a target for more in-depth unwanted attention from cyber criminals and others.

Certification gives you increased peace of mind that your defences will protect against the majority of common cyber attacks simply because these attacks are looking for “soft” targets which do not have the technical controls in place. If you would like to bid for central government contracts which involve handling sensitive and personal information, or the provision of certain technical products and services, you may need to have Cyber Essentials certification, at either the basic or Plus level.

Cost of becoming certified

The process of obtaining basic Cyber Essentials certification is relatively simple and generally costs between £300 and £600 plus VAT. The scheme shows you how to address the basics and prevent the most common attacks. So far about 80% of companies and organisations with Cyber Essentials certification have chosen the basic version. It is often larger organisations that choose Cyber Essentials Plus due to the additional cost, which can be several thousand pounds (although this varies – shop around for the most appropriate deal for you).

Steps to certification

Certification involves three simple steps:

  1. Verify your computer systems that are in scope are suitably secure and meet the standards set by Cyber Essentials.
  2. Book an audit with a IASME accredited certification body
  3. Complete and submit the questionnaire if you’re doing Cyber Essential Basic– your certification body will provide this and verify your answers. For Cyber Essentials Plus, you will arrange an on-site audit.

1. Choosing a certification body

Certification is conducted by IASME Consortium for both type of certification. You will need to choose an IASME accredited certification body to perform your evaluation and award your Cyber Essentials certificate.

2. Defining your scope and implementing the controls

Cyber Essentials defines a set of requirements in the five control areas and you will need to make sure your systems and software meet these before you move on to the next stage of certification. You may be required to supply various forms of evidence before your chosen certification body can award certification at the level you seek, so it’s best to have this available in case it’s asked for.

You will also need to define the scope of your intended certification. This determines what is certified and, in the case of Cyber Essentials Plus, what is tested. Generally, the scope will be defined by a physical location, such as your main office, remote offices or cloud services.

3. The Cyber Essentials questionnaire

Having understood the requirements on the installation, configuration and maintenance of your IT, you are ready to complete the certification questionnaire and submit this to your certification body. The actual questionnaire you complete will be supplied by your certification body.

The certification body may come back to you with some clarification questions and, once you have answered these, a decision will be reached about whether or not your answers meet the requirements for certification.


Once the certification body says you’ve passed, you will be awarded your Cyber Essentials certificate and may use the logo on your website and marketing materials. Your certificate remains valid for one year, after which you will need to re-certify if you want to stay on the list of certified organisations on the NCSC website.

How can CertiKit help?

The CertiKit Cyber Essentials Toolkit is designed to help implement the five key controls of Cyber Essentials quickly and effectively with much less effort than doing it all yourself. Our high-quality template documents and checklists come complete with 12 months of updates and support. Using the toolkit is the first step to securing your IT systems and will prepare your business for certification.

Download our Cyber Essentials Implementation Guide:

Learn more about implementing the five controls of Cyber Essentials with our free implementation guide:

  • Privacy Policy


    When you request to download our free implementation guide, we use your name, company name (which is optional), country and your email address to email you a link to download the requested document. We may also email you after your download in order to follow up on your interest in our products and services. We will do this based on our legitimate interest in marketing to prospects for our products and services. Your name and email address are stored on our website which is hosted with Digital Ocean. Your personal data is stored for one year after you requested your download, after which it is deleted.

We’ve helped more than 4000 businesses with their compliance


Compared to competing toolkits, your ISO27001 document structure was very good. The provided "Introduction" of each was useful (I have moved those out of the core documents and into a more comprehensive manual) for the general audience vs security staff. The inclusion of references to 27017 and 27018 were appreciated. You provided more "ISMS-C" oriented artefacts than competitors.

Trusted By Design Inc.

View all Testimonials