top of page

Cyber Essentials Made Simple: A Practical Guide for UK Businesses

  • GK
  • Jan 21
  • 4 min read
Cyber Essentials

Cyber attacks no longer target just large enterprises. In fact, UK SMEs are one of the most common targets because attackers know many lack basic security controls.

This is exactly why Cyber Essentials exists.


Cyber Essentials is a UK government-backed certification designed to help organisations protect themselves against the most common cyber threats — and to prove it to customers, partners, and regulators.

7.7M cyber crimes were experienced by businesses over the past year. That’s around half of all businesses in the UK. Don’t be next.

In this guide, we’ll explain:

  • What Cyber Essentials is

  • Why it matters

  • What’s actually assessed

  • And provide a practical Cyber Essentials checklist you can use today



What Is Cyber Essentials?


It focuses on five core security control areas that protect against the majority of common cyber attacks:

  1. Firewalls and internet gateways

  2. Secure configuration

  3. User access control

  4. Malware protection

  5. Patch management


There are two levels:

  • Cyber Essentials – self-assessment verified by an accredited body

  • Cyber Essentials Plus – includes hands-on technical testing


Certification is valid for 12 months and often required for:

  • Government contracts

  • Supply chain assurance

  • Customer security requirements


Why Cyber Essentials Matters

Cyber Essentials isn’t just about compliance.


Done properly, it helps organisations:

  • Reduce the risk of ransomware and malware

  • Improve basic cyber hygiene

  • Demonstrate security maturity to customers

  • Create a foundation for ISO 27001 or advanced security controls


What Cyber Essentials Actually Assesses

A common misconception is that Cyber Essentials is just a questionnaire. In reality, it examines how well your organisation protects itself across people, process, and technology.


✅ Cyber Essentials Practical Checklist

Use this as a readiness check before certification.


This free tool will help you look at your organisation’s cyber security. The Cyber Essentials Readiness Tool can help you gauge your current level of cyber security in relation to where you need to be to achieve Cyber Essentials certification.



1️⃣ Scope & Asset Inventory

You cannot secure what you don’t know exists.

  • All devices accessing company data are identified

  • Cloud services (Microsoft 365, Google Workspace, etc.) are included

  • Users (employees, contractors, admins) are documented

  • Networks and remote access methods are defined

  • Scope is clearly documented


2️⃣ Firewalls & Internet Gateways

Prevent unauthorised access from the internet.

  • Firewall enabled on network boundary

  • Default passwords changed

  • Firewall firmware kept up to date

  • Admin access restricted

  • Unused ports and services disabled

  • Cloud environments protected with conditional access or equivalent controls


Cyber Essentials Check List

3️⃣ Secure Configuration

Remove unnecessary risk from default system settings.

  • Default accounts removed or secured

  • Unnecessary software removed

  • Auto-run features disabled

  • Devices lock automatically after inactivity

  • Admin privileges:

  • Limited to those who need them

  • Separate admin accounts used where possible


4️⃣ User Access Control

Ensure the right users have the right access.

  • Every user has a unique account

  • Strong password policy enforced


MFA enabled for:

  • Admin accounts

  • Cloud services

  • Remote access


  • Leavers’ access removed promptly

  • Access follows the principle of least privilege


5️⃣ Malware Protection

Defend against malicious software.

  • Anti-malware installed on all devices

  • Real-time protection enabled

  • Malware definitions kept up to date

  • Email filtering in place

  • Users cannot disable protection


6️⃣ Patch Management

Keep systems protected against known vulnerabilities.

  • Operating systems are supported and not end-of-life

  • Automatic updates enabled

  • Critical security patches applied within 14 days

  • Third-party software kept up to date

  • Unsupported systems are removed or isolated


7️⃣ Mobile & Remote Working

Secure modern working practices.

  • Devices encrypted (BitLocker, FileVault, etc.)

  • Screen lock enabled

  • MFA enforced for remote access

  • VPN or secure access in use

  • BYOD policies defined and enforced


8️⃣ Logging & Monitoring (Basic Requirements)

  • Admin and login activity logged

  • Cloud audit logs enabled

  • Logs retained for investigation


9️⃣ Policies & Evidence

Cyber Essentials requires evidence, not assumptions.

  • Password policy

  • Patch management policy

  • Acceptable use policy

  • Joiner/leaver process

  • Incident response process

  • Evidence available (screenshots, configs, policies)


🔟 Final Validation Before Submission

  • Scope reviewed

  • Answers validated

  • Evidence gathered

  • Exceptions documented

  • Senior approval obtained

Common Reasons Companies Fail Cyber Essentials

  • No MFA on admin accounts

  • Unsupported operating systems

  • Poor asset inventory

  • Shared admin credentials

  • Cloud services excluded from scope

  • “Yes” answers without evidence


Cyber Essentials: A Starting Point, Not the Finish Line

Cyber Essentials is not a silver bullet, but it does stop the majority of common attacks.

When done properly, it:

  • Improves security posture

  • Reduces incident likelihood

  • Builds trust with customers

  • Creates a foundation for Cyber Essentials Plus, ISO 27001, and threat detection

Need Help With Cyber Essentials?

Many organisations fail not because they’re insecure — but because they don’t know how to evidence their controls.


👉 If you’d like help preparing for Cyber Essentials, get in touch.


Assistance via qualified assessors:

Our “Cyber Essentials Ready” package is aimed at companies who are starting out on their Cyber Essentials journey and require support, advice and guidance on achieving the first level of certification. Our team of qualified assessors will take you through all the steps required to achieve certification, that includes all the support required to complete the Cyber Essentials questionnaire. The CSA team will advise on the evidence that is required and then check that all required documentation is in place to gain the initial certification.


Comments


bottom of page