Cyber Essentials Certification: What It Is & How to Get Certified
In an era where cyber threats pose significant risks to businesses of all sizes, demonstrating robust cyber security practices has become essential. For UK organisations, Cyber Essentials certification has emerged as the definitive standard for baseline cyber security—and increasingly, a prerequisite for winning government contracts and building client trust.
This comprehensive guide explains everything you need to know about Cyber Essentials, from understanding the five key controls to navigating the certification process and leveraging it for business growth.
What Is Cyber Essentials?
Cyber Essentials is a UK government-backed cyber security certification scheme designed to help organisations protect themselves against the most common cyber threats. Launched in 2014 by the National Cyber Security Centre (NCSC), it provides a clear framework for implementing fundamental security controls.
The scheme addresses approximately 80% of common cyber attacks through five technical controls. It's specifically designed to be accessible for businesses of all sizes, with particular emphasis on making cyber essentials for small business both achievable and affordable.
There are two levels of certification available:
- Cyber Essentials – A self-assessment questionnaire verified by an external certifying body
- Cyber Essentials Plus – Includes the questionnaire plus a hands-on technical verification through external testing
Why Cyber Essentials Matters for UK Businesses
The cyber essentials benefits extend far beyond simply ticking a compliance box. Here's why this certification has become increasingly important:
Government Contract Requirements
Since October 2014, Cyber Essentials certification has been mandatory for organisations bidding on central government contracts involving handling personal information or providing certain ICT products and services. This requirement aligns with government cyber security standards and demonstrates a commitment to protecting sensitive data.
Competitive Advantage
Even when not mandated, many private sector organisations now require their suppliers to hold Cyber Essentials certification. It signals to potential clients that you take cyber security seriously and have implemented fundamental protections.
Insurance Benefits
Some cyber insurance providers offer premium discounts or improved terms for businesses holding valid Cyber Essentials certification, as it demonstrates proactive risk management.
Protection Against Common Threats
The certification process ensures you've implemented defences against the most prevalent attack vectors, including phishing, malware, and brute-force attacks that account for the majority of successful breaches.
Staff Awareness
Achieving certification requires organisation-wide engagement with cyber security practices, naturally raising awareness among employees about potential threats.
The Five Cyber Essentials Controls
The cyber essentials requirements centre around five technical control themes. Understanding these is crucial for preparation:
1. Firewalls and Internet Gateways
Firewalls act as gatekeepers between your network and the internet, controlling incoming and outgoing traffic. Requirements include:
- Boundary firewalls in place and properly configured
- Default-deny policies for inbound connections
- Rules regularly reviewed and documented
- Host-based firewalls enabled on all devices
2. Secure Configuration
This control ensures devices and software are configured to reduce vulnerabilities:
- Removal of unnecessary accounts, software, and functionality
- Changing default passwords on all systems
- Disabling auto-run features for removable media
- Implementing application allow-listing where appropriate
- Limiting administrative privileges
3. User Access Control
Proper management of user accounts and permissions prevents unauthorised access:
- Unique user accounts for each individual
- Strong password policies (minimum length, complexity)
- Multi-factor authentication (MFA) for remote access and privileged accounts
- Timely removal of access when staff leave or change roles
- Limitation of administrative privileges to only those who require them
4. Malware Protection
Defence against malicious software across all devices:
- Anti-malware software on all devices capable of supporting it
- Regular automatic updates of malware definitions
- Scheduled scanning of devices
- Only using software from trusted sources
5. Security Update Management
Keeping systems patched against known vulnerabilities:
- Automatic updates enabled where possible
- Regular application of security patches (within 14 days for high-risk vulnerabilities)
- Updates applied to all software, including operating systems, applications, and firmware
- Unsupported software replaced or isolated from the network
Cyber Essentials vs Cyber Essentials Plus
Understanding the difference between these two levels helps you choose the right certification for your organisation:
| Feature | Cyber Essentials | Cyber Essentials Plus |
|---|---|---|
| Assessment Method | Self-assessment questionnaire | Self-assessment + external technical verification |
| Testing | No hands-on testing | Vulnerability scans and configuration checks |
| Typical Cost | £300 - £500 | £1,500 - £3,000 |
| Time to Complete | 1-2 weeks | 3-6 weeks |
| Government Contracts | Required for some contracts | Required for higher-security contracts |
| Assurance Level | Good | Excellent |
| Certificate Validity | 12 months | 12 months |
Cyber Essentials Plus provides higher assurance through independent verification that your security controls are not only documented but properly implemented. This level is often requested by organisations handling more sensitive information or seeking suppliers for critical systems.
Understanding Cyber Essentials Cost
The cyber essentials cost varies depending on several factors, including your organisation size, existing security posture, and which level of certification you pursue.
Direct Certification Costs
- Cyber Essentials: £300 - £500 for organisations with fewer than 10 devices; £400 - £600 for larger organisations
- Cyber Essentials Plus: £1,500 - £3,000 depending on organisation complexity and certifying body
Preparation and Remediation Costs
Beyond certification fees, consider these potential expenses:
- IT consultancy to assess readiness and implement controls: £500 - £5,000
- Software licences (anti-malware, patch management tools): £200 - £2,000 annually
- Hardware upgrades if existing equipment doesn't meet requirements: variable
- Staff time for questionnaire completion and preparation: typically 10-40 hours
Grant Funding and Support
Several schemes exist to help small businesses offset cyber essentials cost:
- Local Enterprise Partnerships (LEPs) sometimes offer voucher schemes
- Some industry bodies provide subsidised certification for members
- The cost is tax-deductible as a business expense
How to Get Cyber Essentials Certification
Understanding how to get cyber essentials certified involves following a structured process. Here's a step-by-step guide:
Step 1: Choose Your Certification Body
Select an NCSC-accredited certification body from the official list. Consider factors such as:
- Price and package offerings
- Industry expertise and reputation
- Support provided during the process
- Turnaround time for assessment
Step 2: Conduct an Internal Assessment
Before beginning the formal process, evaluate your current security posture against the five controls:
- Document all devices that connect to your network
- Review firewall configurations and rules
- Audit user accounts and access permissions
- Verify anti-malware solutions are in place and updated
- Check patch management processes
Step 3: Implement Necessary Controls
Address any gaps identified in your assessment:
- Install missing security software
- Configure settings to meet requirements
- Remove unnecessary software and accounts
- Establish processes for ongoing compliance
- Document your configurations and policies
Step 4: Complete the Self-Assessment Questionnaire
The questionnaire covers your IT estate and how you've implemented the five controls. Be thorough and accurate—the certifying body will review your answers for consistency and completeness.
Step 5: Submit for Assessment
Your certifying body will review your questionnaire and may request clarifications or evidence. For Cyber Essentials Plus, they'll schedule the external technical verification.
Step 6: Address Any Non-Conformities
If the assessor identifies areas where you don't meet the requirements, you'll need to remediate these issues and provide evidence before certification is granted.
Step 7: Receive Your Certificate
Once you've successfully demonstrated compliance, you'll receive your certificate, valid for 12 months. You can then use the Cyber Essentials badge in your marketing materials and tender responses.
Preparing for Cyber Essentials: Practical Tips
Success with cyber security certification UK schemes requires proper preparation. Here are practical recommendations:
Create an Asset Inventory
Document all devices that connect to your network, including:
- Laptops and desktop computers
- Servers (physical and virtual)
- Mobile devices (smartphones and tablets)
- Network equipment (routers, switches)
- Any IoT devices
Standardise Configurations
Where possible, standardise device configurations using:
- System images for new devices
- Group policies for Windows environments
- Mobile device management (MDM) for smartphones and tablets
- Configuration management tools for servers
Implement Strong Password Policies
Ensure passwords meet these minimum standards:
- At least 8 characters for user-generated passwords
- At least 6 characters if enforcing account lockout
- Multi-factor authentication for remote access
- Password managers to help staff manage complex passwords
Address Unsupported Software
Unsupported software (e.g., Windows 7, older versions of applications) cannot be certified. You must either:
- Upgrade to supported versions
- Replace with alternative software
- Isolate systems running unsupported software from your network
Document Your Processes
While Cyber Essentials doesn't require extensive documentation, maintaining records helps with:
- Completing the questionnaire accurately
- Demonstrating compliance during Plus assessments
- Maintaining compliance year-round
- Preparing for annual recertification
Common Challenges and How to Overcome Them
Organisations frequently encounter these obstacles when pursuing certification:
Personal Devices (BYOD)
Challenge: Ensuring personal devices meet security standards without overreaching into personal use.
Solution: Either exclude personal devices from your certified network entirely (requiring them to use guest WiFi without access to business systems), or implement MDM solutions with clear policies separating work and personal data.
Legacy Systems
Challenge: Unsupported operating systems or applications still in use.
Solution: Develop a migration plan to replace legacy systems, or implement network segmentation to isolate them from devices in scope for certification.
Distributed Workforce
Challenge: Remote workers accessing systems from various locations and networks.
Solution: Implement VPN access with multi-factor authentication, ensure remote devices have host-based firewalls enabled, and use cloud-based management tools for visibility and control.
Shadow IT
Challenge: Unauthorised devices or software connecting to your network.
Solution: Conduct thorough discovery using network scanning tools, implement network access control (NAC), and establish clear policies about authorised devices and software.
Third-Party Access
Challenge: Contractors or partners requiring access to your systems.
Solution: Create separate accounts with appropriate restrictions, implement time-limited access, and require third parties to use company-approved devices or secure remote access methods.
Maintaining Certification and Annual Renewal
Cyber Essentials certification is valid for 12 months, after which you must recertify. Maintaining compliance throughout the year is both easier and more valuable than treating it as an annual exercise.
Continuous Compliance Practices
- Maintain your asset inventory as devices are added or removed
- Apply security updates promptly when released
- Review user accounts monthly, removing those no longer needed
- Conduct quarterly internal audits against the five controls
- Keep documentation current as configurations change
Managing Change
Significant IT changes may affect your certification status:
- Implementing new systems or infrastructure
- Migrating to cloud services
- Acquisitions or organisational restructuring
- Changes to internet service or network architecture
Evaluate each change against the Cyber Essentials requirements and update your documentation accordingly. For major changes, consult with your certifying body about whether recertification is advisable.
Beyond Cyber Essentials: Building on Your Foundation
While Cyber Essentials provides an excellent baseline, mature organisations often progress to more comprehensive frameworks:
ISO 27001
This international standard for information security management systems (ISMS) provides a more comprehensive approach. Cyber Essentials can form part of your ISO 27001 controls.
Cyber Essentials Plus
If you've achieved basic Cyber Essentials, upgrading to Plus provides additional assurance through technical verification.
Industry-Specific Standards
Depending on your sector, additional certifications may be relevant:
- PCI DSS for organisations handling payment card data
- SOC 2 for technology service providers
- IASME Governance for broader cyber security governance
How Connection Technologies Can Help
Achieving and maintaining cyber essentials certification can seem daunting, particularly for small businesses without dedicated IT security resources. Connection Technologies specialises in helping UK businesses navigate the certification process efficiently.
Our services include:
- Readiness Assessments: We evaluate your current security posture against Cyber Essentials requirements and provide a clear remediation roadmap
- Implementation Support: Our technical team can implement the necessary controls, from configuring firewalls to deploying anti-malware solutions
- Questionnaire Assistance: We help you complete the self-assessment accurately, drawing on our extensive experience with the certification process
- Ongoing Compliance: Our managed IT services ensure your systems remain compliant throughout the year, making annual recertification straightforward
- Integrated Approach: We align your Cyber Essentials compliance with broader IT strategy, ensuring security enhancements deliver operational benefits
As a trusted provider of business mobile and IT services across the UK, Connection Technologies understands the unique challenges facing organisations of all sizes. We've successfully guided numerous clients through Cyber Essentials and Cyber Essentials Plus certification, helping them win contracts, satisfy client requirements, and genuinely improve their security posture.
Getting Started with Cyber Essentials
Whether you're pursuing certification to meet a contract requirement, satisfy client demands, or simply strengthen your cyber defences, the journey begins with understanding your current position and the steps needed to achieve compliance.
The investment in cyber security certification UK standards like Cyber Essentials delivers returns that extend far beyond the certificate itself. You'll implement fundamental protections that defend against the majority of cyber threats, demonstrate due diligence to stakeholders, and build a foundation for ongoing security improvement.
Don't let the process overwhelm you. With proper guidance and support, most organisations can achieve certification within 4-8 weeks, and the annual renewal becomes progressively simpler as security practices become embedded in daily operations.
Ready to begin your Cyber Essentials journey? Contact Connection Technologies today for a no-obligation consultation. Our team will assess your readiness, explain the process in detail, and provide a clear quote for supporting you through certification. Let us handle the complexity while you focus on running your business—secure in the knowledge that your cyber defences meet recognised government standards.