The 5 key controls

What is Cyber Essentials

The Cyber Essentials scheme is a set of baseline technical controls produced by the UK Government and industry to help organisations, large and small, public and private, improve their defences and demonstrate publicly their commitment to cyber security.

The Cyber Essentials scheme addresses the most common internet-based attacks that use widely available tools and that need very little skill for the attacker to use.

The scheme helps organisations to protect the confidentiality, integrity and availability of data stored on devices which connect to the internet.

There are two certifications available for the Cyber Essentials Scheme.

Cyber Essentials, is a self assessment questionnaire that is submitted to us for assessment.

Download self assessment questionnaire here

Cyber Essentials Plus, is a assessment that is audited by a certification body like ID Cyber Solutions.

Note: For both certifications you must meet the same Cyber Essentials requirements. 

Download Cyber Essentials requirements Document here

Cyber Essentials for your organisation starts here

Five controls that you can put in place today.

The Cyber Essentials Scheme requires all devices that are connected to the internet are to be protected with a firewall. This effectively creates a ‘buffer zone’ between your IT network or device and other, external networks. In the simplest case, this means between your computer (or computers) and ‘the Internet’.

Read More

Most manufacturers supply their hardware and software with a default configuration that makes it quick and easy to start using the product. Leaving the settings this way  makes it easier for cyber attackers to gain access to your data.

Read More

To reduce the possibility of an attacker infecting your devices , user accounts should only have access to software, settings to perform the role intended. Admin permissions should only be given to those who need them.

Read More

All devices including laptops, PC's, phones and tablets, unless protected are open to attacks using malware. Viruses and malware like the ones used in the wannaCry attack in 2017, can infect devices and software and can quickly infect any other devices or software that is connected to it.

Read More

It is important that all phones, tablets, laptops or computers are kept up to date at all times. This is true for both Operating Systems and installed apps or software. Manufacturers and developers release regular updates which not only add new features, but also fix any security vulnerabilities that have been discovered.

Read More

What are the advantages of certification


  • Reassure customers that you are working to secure your IT and their data against cyber attack
  • Attract new business with the promise you take cyber security seriously
  • Build a relationship with a trusted IT supplier
  • Certain local & national government contracts require Cyber Essentials certification