Home » Cyber Essentials
Cyber Essentials Compliance
- ProtectNOW
Assessment, Remediation, Certification
Delivering achievable Cyber Essentials and Cyber Essentials Plus certification
Cyber Essentials Assessment and Compliance Services
As an established Cyber Essentials Certification Body, since the standard was introduced in 2014 by the NCSC, we provide assessment and consultancy services for the Cyber Essentials scheme.
We have also partnered with organizations required to meet additional certifications, including the NHS Data Security and Protection Toolkit (DSPT).
The 5 main technical tenants of cyber security are access controls, secure configuration, patch management, malware protection, firewalls and routers.
Cyber Essentials Verified Self Assessment

Self Assessment
Initial assessment carried out by means of a self-assessment questionnaire
External Review
Must be reviewed by an external IASME accredited Cyber Essentials Certification body
Key for Data Handling
A "must-have" benchmark for any company handling sensitive data.
Cyber Essentials Plus technical Audit

Cyber Essentials Implemention Assessment
Hands-on technical audit from a qualified assessor.
Vulnerability Testing
Vulnerability testing proactively identifies and addresses weaknesses in your systems, ensuring robust protection against evolving cyber threats.
Key to Winning Trust and Business
Secure new business by showcasing a verified commitment to top-tier cybersecurity, giving clients and partners confidence in your ability to protect sensitive data.
The Cyber Essentials Plus Vulnerability Testing
By simulating basic hacking and phishing attacks during the Cyber Essentials PLUS Vulnerability testing, we confirm that the organisation’s systems are able to respond appropriately. This testing aims to confirm the answers to three questions:
1
How easy for mailicous files to enter your network?
While accepting that it’s effectively impossible to guarantee that any system will keep out 100% of malicious files 100% of the time, a robust IT security policy should keep out most files, most of the time.
2
How do you know if your network or devices have been hacked?
Should your system be hacked, how likely is it that the hack will be detected. Many networks or devices are hacked without the knowledge of the owner.
3
What is the likely damage if there is a successful hack?
If in the worst case scenario that your data or networked is successfully hacked
The WeSeeNow Cyber Essentials Certification Process and Cost
We offer a cost-effective route to certification, customized to your preferences—whether you need only the formal assessment or a full package including an initial evaluation and follow-up remediation work.
Initial Scoping and Full Cost
Based on the number of devices and servers, as well as your requirements.
Report
A report outlining the key adjustments required to achieve your Cyber Essentials certification. This can then be passed to your IT Support team
Remediation
Remediation assists in addressing key adjustments required for certification, which may involve technical changes or documentation updates, such as implementing a password policy or similar measures.
Formal Assessment and Certification
Official evaluation and accreditation conducted by one of our trusted and experienced Cyber Essentials assessors.
Meeting The GDPR Standard - Cyber Assurance Certification

If you are a Small Business, Charity or Not-for-Profit organisation, we would recommend following the IASME Cyber Assurance standard, alongside Cyber Essentials Plus.
It protects and controls a whole lot more without being as onerous as ISO27001, and it is a fantastic stepping stone to meet that standard in the future.
Questions about Cyber Essentials and Cyber Essentials Plus
Cyber Essentials is defensive and cannot cater for targeted cyber attacks that have identified vulnerabilities that are unique to the employees and infrastructure of your organisation.
Cyber Essentials very much looks to prevent cyber attacks, it does not tackle other best practice security procedures that deal with recovery such as backing up data to multiple formats and to different locations including an offline, off site option.
Risk assessment and security posture evaluation, and incident response and disaster planning are also areas that are not covered in the scheme.
Security awareness and staff training, although considered vital for preventing common cyber attacks, do not involve technical controls and are therefore not formally evaluated in the Cyber Essentials scheme. Security monitoring, detecting and analysing are also practices that are beyond the scope of Cyber Essentials.
The avenues for attack have never been greater with mobile devices, cloud computing and the internet of things throwing up security challenges that a basic scheme like Cyber Essentials currently does not address.
Most cyber attacks are untargeted and use commodity tools to attack large amounts of devices, services and users at the same time in an indiscriminate way. Most cyber attacks are made up of repeated stages that are probing for further information or leads that can lead to a more targeted attack. These untargeted attacks exploit basic weaknesses that can be found in many organisations such as poorly configured firewalls, software that hasn’t been patched and legacy computer systems that are no longer supported.
Cyber Essentials will help an organisation defend against this type of attack. The process of putting in place the five core controls will eliminate all the common security gaps that up to 90% of cyber attacks rely on.
These are the technical controls that will protect businesses of all sizes from most cyber attacks.
Access Control
Control who uses your computer and what they’re allowed to do when they’re using it.
Learn the difference between an administrator account and a regular user account. What are the privileges that an administrator can access and who should use this kind of account and when? Every user should have their own account with its individual secure password and no guest accounts.
Secure Configuration
Set up your computer securely to minimize the ways a cyber criminal can find a way in.
Learn how to create unique strong passwords and enable two factor authentication if available. Explore the settings on your devices and on the software that you use, disable functions that you do not use and delete unused accounts.
Patch Management
Prevent cyber criminals using the mistakes they find in software as a way to get into your system. All software contains many lines of code which often contains errors. A ‘patch’ is an update released by the software manufacturer to fix these errors.
Set your operating system and other software to automatically update or apply the software patches. Check that your software is still supported by the manufacturers i.e. is continuing to receive patches.
Malware Protection
Identify and immobilise viruses or other malicious software before it has a chance to cause harm.
Install anti-virus software on all of your devices and test for viruses. Disable auto-run features and learn about whitelisting and sandboxing. Only buy apps from approved secure stores.
Firewalls and Routers
Create a security filter between the internet and your network and on your device.
Locate the firewall that comes with your operating system on your device and turn it on. Locate the firewall at the border of your network which may be in the router. Turn it on and change the default password. Check who has access to your router.
Cyber Essentials helps organisations effectively establish the five core controls that have been shown to prevent most cyber attacks.
The Benefits Of Cyber Essentials
Keep Disruption of operations at a minimum
The impact of a cyber attack can have immediate workflow impacts as well as the impact of dealing with the fallout.
Protects Data
By implementing cyber security, the business processes are streamlined and employees are provided with the correct steps to take.
Productivity Improvement
By implementing cyber security, the business processes are streamlined and employees are provided with the correct steps to take.
Clear Cost
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.