Cyber Essentials Assessments

Protect your business against cyber threats

Cyber Essentials is a new Government-backed and industry supported scheme to guide businesses in protecting themselves against cyber threats.

Digital Secures can help you achieve full Cyber Essentials Certification.

Complete your FREE online questions and download guidance notes to implement essential security controls.

Cyber Essentials

Assess how cyber secure your business is by using our quick self-assessment questionnaire

Cyber Essentials Go To Questionaire
Talk to us

Data Security

We'd love to Talk




The Cyber Essentials scheme provides businesses small and large with clarity on good basic cyber security practice. By focusing on basic cyber hygiene, your company will be better protected from the most common cyber threats.

Cyber Essentials is for all organisations, of all sizes, and in all sectors - we encourage all to adopt the requirements as appropriate to their business. This is not limited to companies in the private sector, but is also applicable to universities, charities, and public sector organisations.

Cyber Essentials is mandatory for central government contracts advertised after 1 October 2014 which involve handling personal information and providing certain ICT products and services. Find out more here.

The Cyber Essentials scheme has been developed as part of the UK’s National Cyber Security Programme and in close consultation with industry.

Cyber Security Consulting Service

Our Cyber Security Consulting Service provides regular remote audits, or on-site audit solution to protect your business systems, with a dedicated consultant who will provide managed security solutions can assist your business cyber security requirements.

Digital Secures, focuses on cyber security certification for small, medium and large companies. We are approved to preform Cyber Essentials scheme to deliver cyber security assessments to organisations. We also certify to our own governance standard, as the Cyber Essentials is developed specifically to be achievable and affordable for SMEs as an alternative to ISO27001.

Size of Business

Cyber Essentials certification as part of their risk assessment for all businesses. .

Levels of Certification - Cyber Essentials and Cyber Essentials Plus

The two levels of certification, Cyber Essentials, and Cyber Essentials Plus are: .

 

 

Level 1 - Cyber Essentials Scheme: Summary 6 Cyber Essentials certification is awarded on the basis of a verified self assessment. An organisation undertakes their own assessment of their implementation of the Cyber Essentials control themes via a questionnaire, which is approved by a senior executive such as the CEO. This questionnaire is then verified by an independent Certification Body to assess whether an appropriate standard has been achieved, and certification can be awarded. This option offers a basic level of assurance and can be achieved at low cost. .

Level 2 - Cyber Essentials Plus: offers a higher level of assurance through the external testing of the organisation’s cyber security approach. Given the more resource intensive nature of this process, we anticipate that Cyber Essentials Plus will cost more than the foundation Cyber Essentials certification. On successful completion a certificate will be awarded. Organisations who receive a certificate will be able to display the appropriate Cyber Essentials or Cyber Essentials Plus badge. .

Cyber Essentials Scheme: overview The Scheme Requirements Document focuses on Internet-originated attacks against an organisation’s IT system. Many organisations will have particular additional services, e.g. web applications, that will require additional and specific controls beyond those provided by Cyber Essentials. Cyber Essentials concentrates on five key controls. .

These are: .

1. Boundary firewalls and internet gateways - these are devices designed to prevent unauthorised access to or from private networks, but good setup of these devices either in hardware or software form is important for them to be fully effective. .

2. Secure configuration – ensuring that systems are configured in the most secure way for the needs of the organisation .

3. Access control – Ensuring only those who should have access to systems to have access and at the appropriate level. .

4. Malware protection – ensuring that virus and malware protection is installed and is it up to date .

5. Patch management – ensuring the latest supported version of applications is used and all the necessary patches supplied by the vendor been applied.

© 2013 Digital Secures Limited | Designed and built by Digital Websites Limited