Cyber Essentials: A Guide to CE and its Benefits • Blisstech Solutions

Many people have heard of Cyber Essentials (CE), but do you know what it is and what benefits it can bring to your business? This article will discuss what cyber essentials is and how it can help your business and the role that a Cyber Essentials assessor plays in achieving certification.

Cyber Essentials is a UK cyber security certification that was created by the UK National Cyber Security Centre (NCSC) to help businesses protect themselves from cyber threats. It’s based on five principles, which are explained below. The CE assessor plays an important role in the process of getting Cyber Essentials certified because they can provide you with all of the information and resources necessary for developing your CE strategy.

Cyber Essentials Logo

Two Types of Certification

There are two types of Cyber Essentials (CE) certification:

Cyber Essentials (Self-assessed)

In a self-assessed certification, you complete the application yourself and submit it to a certification body.  If your application is deemed acceptable you will receive the certification.  Unless you have cyber security skills in house, it is recommended that you work with a professional who understands the standard so they can help you with the application and close any of the gaps that are found.  The standard CE certification costs £300.

Cyber Essentials + (Audited)

Once you achieve the standard CE certification you have 90 days to achieve the CE+ certification.  The CE+ certification is the same as the standard except there is an independent audit of your environment against your application and also a vulnerability scan is performed.  The cost of CE+ varies based on the size and complexity of your organisation.

A woman on a laptop with a shield and lock on the screen

Cyber Essentials Core Controls

There are five core controls in Cyber Essentials that apply to all ‘in scope’ systems.  Essentially, a device is considered to be ‘in scope’ if it is used for business and is connected to the Internet.  From 24th January 2022, this will include Bring Your Own Device (BYOD) devices, home-working and cloud services.

The five core areas of cyber essentials are:

Firewalls

Protecting your network perimeter is essential in preventing cyber attacks from happening. You can do this by using firewalls and other security measures to restrict access to your network and internet-connected devices.

Security Update Management

It’s important to protect all internet-connected systems from cyber threats by ensuring that they’re always up to date so known vulnerabilities are fixed.

Secure Configuration

Computers and devices are not always at their most secure straight out of the box.  Things like default passwords and insecure configurations mean that hackers can easily compromise your systems if you do not take steps to secure your systems.

Access Control & Identity Management

You must know who has access to what data on your network, as well as how they’re accessing it. This can be done by using access control and identity management measures to ensure that you grant people and services just enough access they need to complete their roles.

Malware Protection

One of the most common ways cybercriminals gain access to networks is through malware. You can protect your business from malware by using anti-virus and anti-malware software and ensuring it is up to date.

Four people putting the pieces of a jigsaw together

Benefits of Cyber Essentials

Being CE certified can bring a number of benefits to your business, including:

Protection from cyber attacks

The CE certification body will help you to protect your business from cyber threats by implementing the five principles.

Improved cyber security posture

By being CE certified, you’ll be demonstrating that you take cyber security seriously and are doing everything possible to protect your business and your client and employee data from cybercriminals.

Reduced cyber security costs

The CE certification body will help you to reduce your cyber security costs by providing you with resources that will help you to protect your business from cyber threats.  Every self-assessed Cyber Essentials certification comes with free cyber security insurance!

Improved compliance posture

Cyber Essentials is an accepted standard for cyber security and compliance, so being CE certified can improve your compliance posture.  This will help you win more businesses from organisations that recognise or even require Cyber Essentials certification.

Man with magnifying glass

Assessors and Certification Bodies

Assessors and Cyber Essentials Certification Bodies will help you to understand and implement these five principles in order to protect your business from cyber threats. They can provide you with resources such as templates, checklists, and training courses that will help you to achieve CE certification.

If you’re thinking about CE certification for your business, you’ll need to decide whether or not it’s the right cyber security solution for you.  Get in touch with us if you want a free advice call about achieving CE certification.

 

More Content

Microsoft hints at some exciting Windows 12 developments

Windows 11 still feels like a new toy, yet we’ve already heard speculation about Windows 12 arriving as soon as next year. It’s all we can think about!

Ransomware Attacks Grow for Small Businesses

Two organisations have recently released reports on the state of ransomware and cybersecurity incidents affecting small businesses. Datto's State of the Channel Ransomware Report Datto has recently released their "State of the Channel Ransomware Report"  for 2019...

Everything you need to know about password managers for your business

If you’re confused about password managers, you’re not alone. A password manager is software that generates safe passwords, remembers them, and auto-fills logins for you. That saves time. But means your business can quickly lock out staff when they leave. Some people...
Templates and Slide Masters in PowerPoint title

Tech Tip: How to use Templates and Slide Masters in PowerPoint

This Tech Tip will show you how to use templates and Slide Masters in PowerPoint to give your presentations a professional and consistent look. I've been using PowerPoint for over 25 years and have created a lot of presentations. Previously, I would work from a...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business.
Why?
Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system.
Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business.
A compromised password can lead to big issues, such as:
• Data breaches
• Financial losses
• Identity theft
• Reputation damage
But how do you create strong passwords without driving yourself (and your team) mad?
Think of your password like a secret recipe, where only you should know the ingredients. It should:
• Be at least 14 characters long (the longer, the better)
• Include a mix of uppercase and lowercase letters
• Contain a few numbers and symbols (like @, $, %, or &)
• Not contain any common words or easily guessable information (like birthdays, names, or the word “password”)
Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember.
You should also steer clear of these common mistakes:
• Using personal info (your name, birthday, business name, etc.)
• Reusing the same passwords across multiple accounts
• Using simple sequences (“123456” or “abcdef”)
• Storing passwords in an easily accessible place (like a sticky note on your desk)
If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you.
With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches.
Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app.
If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include:
• Unique passwords for each system and account
• Regular security training on password best practices
• Business-wide use of MFA for critical systems
• Scanning for compromised passwords regularly
By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business.
And if you need help making your business more secure, get in touch.

Start it on your phone… finish it on your PC?

Start it on your phone… finish it on your PC with “Hand Off”

If you work on your phone while you’re on the move, it can be a hassle to find the right file once you’re back at your PC. Here we tell you about a cool new feature coming to Windows 11 that will help.

Uh oh! You’re at greater risk of malware than ever before

Uh oh! You’re at greater risk of malware than ever before

Small and medium-sized businesses are at more risk of a malware attack than ever. It’s time to take action to protect your business. Here we tell you how.

Are you using Teams to share sensitive data?

Microsoft Teams has fast become one of THE most useful business tools for the way we work today. No matter where your people work from, they can communicate and collaborate quickly and reliably. But this remote way of working can also open the door to some MAJOR security issues. New research shows that nearly HALF of employees frequently share confidential …

Tech Tip: How to create private Teams and channels

Welcome to a new Tuesday tech tip video. This one shows you how to create private Teams and channels in Microsoft Teams. Microsoft Teams is a powerful tool for collaboration, but how do you limit access to what people can see? The answer: Private Teams and private...

Getting Started With Microsoft Teams

Microsoft Teams is a powerful collaboration tool and is included with all business versions of Microsoft 365.  If you have Microsoft 365, and are not using Teams, or you don't yet have Microsoft 365 and want to know what Teams can do, this video is a quick...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05