Cyber Essentials and Cyber Essentials+
Guard your organisation against the most common cyber threats and demonstrate your commitment to cyber security
Cyber Essentials is an effective, Government backed scheme which helps organisations to protect themselves against a range of the most common cyber-attacks. Cyber-attacks come in many forms, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. By having basic cyber security controls in place, it will help your organisations cyber defences against common cyber attacks.
Cyberfort is a verified certification partner who can help your organisation to prepare for its Cyber Essentials and undertake Cyber Essentials + certifications. We work with your IT teams and employees to understand the technical requirements, are prepared for the assessment and make sure your organisation is ready to be certified for Cyber Essentials or for Cyberfort to certify your Cyber Essentials +.
Key Challenges
With organisations increasingly under cyber attacks, Cyber Essentials and Cyber Essentials + reviews 5 key areas of your cyber security posture. These 5 areas are Firewalls, Secure Configuration, User Access Control, Malware Protection and Security Update Management.
How Cyberfort can help
Cyber Essentials represents the UK Government’s minimum baseline standard for cyber security for organisations of all sizes in the UK. The annually renewable certification scheme is aligned to five technical controls designed to prevent the most common internet-based cyber security threats. Cyber Essentials + certification demonstrates that an organisation is protecting itself by implementing the most important cyber security controls.
How Cyberfort helps
Firewalls
We can work with your organisation to review the firewalls and configurations you have in place and test them for their readiness against DDoS Attacks, Cyber Attacks such as Ransomware, Outdated Firewall Software, Failure to Activate Controls, Documentation, Basic Inspection Protocols and Configurations that do not align to best practise.
Secure Configuration
We work with IT teams to review network components, operating systems, and application configurations to identify any unauthorised changes from baseline settings. By identifying any deviations from the norm we highlight where vulnerabilities may be and alert IT teams to the potential possibilities of attack. We can also provide remediation plans to help secure your IT environment.
User Access Control
We identify where security challenges may exist in terms of a distributed IT environment, cloud computing, hybrid working patterns and different devices, password management and governance procedures. Then we put in place an action plan to patch, manage and maintain your organisations IT environment so it is secure and compliant.
Malware Protection
Malicious software in digital services has increased the probability of corrupting data, stealing information, or other cyber crimes by malware attacks. We work with IT teams to configure your defences against malicious software and recommend the right security controls to contain and eradicate malware before it spreads across the organisation.
Security Update Management
We work with IT teams to build effective update frameworks, put in place automation and provide guidance on where legacy devices create risk, ensuring that if these devices are operationally required, they are updated, and/or risks are minimised with alternative controls.
Our Expertise
Cyber Essentials
Starting from £650 + VAT
Up to 6 Hours Consultancy Support (within 30 days of commencement)
CE Certificate
Free Cyber Insurance up to £25,000
Cyber Essentials +
Starting from £1900 + VAT
One free re-submission within 30 days
CE/CE+ Certificate
Free Cyber Insurance up to £25,000
External vulnerability scan
Assessment and Internal Vulnerability Scan
10 Hours Consultancy Support (within 30 days of commencement)
Reviewing your IT environment ready for certification
Before assessment takes place we review:
Firewalls
Security Update Management
Secure Configuration
User Access Control
Malware Protection
Post certification actions and analysis
Following certification we work with your organisation to review where any gaps may potentially exist and provide roadmaps for future improvements to your cyber security environment.