Welcome to this practical help guide on achieving Cyber Essentials self-assessment certification.
Cyber Essentials is a simple yet effective UK government-backed scheme to protect your organization against common cyber threats. Whether you’re a small business, charity, or larger entity handling sensitive data, this certification shows you’re taking basic cyber security seriously. For more details, visit the official NCSC Cyber Essentials page.
This guide expands on the essentials, providing clear steps, tips, and resources to make the process straightforward. We’ve written the content for easy reading—using short paragraphs, bullet points, and plain language. Plus, we’ve added sections to cover preparation, troubleshooting, and next steps. We’ve also incorporated hyperlinks to key resources for quick access.
If you’re new to this, start at the beginning. Ready to dive in? Let’s get you certified.
What is Cyber Essentials?
Cyber Essentials is a verified self-assessment scheme run by the UK’s National Cyber Security Centre (NCSC), with oversight from IASME (Information Assurance for Small and Medium Enterprises). It checks your organization’s security in five core areas to guard against everyday cyber risks like hacking and malware. Learn more on the IASME Cyber Essentials site.
Key Facts:
- Who it’s for: Any UK-based organization handling personal or sensitive data (e.g., emails, customer details, or financial info).
- Two levels: Basic self-assessment (this guide focuses here) or Cyber Essentials Plus (with independent testing—covered later).
- Why it matters: It’s a “must-have” benchmark. Many government contracts require it, and it builds trust with clients.
Pro Tip: Download the free self-assessment questionnaire from the IASME download page or the NCSC resources hub.
Why Get Cyber Essentials Certified? (The Benefits)
Certification isn’t just a badge—it’s a smart investment. Here’s why organizations choose it:
- Protects your data: Blocks up to 80% of common cyber attacks.
- Saves money: Reduces the risk of costly breaches (average UK data breach costs £3.4 million).
- Boosts credibility: Required for public sector suppliers; impresses private clients.
- Meets legal needs: Aligns with UK GDPR requirements for basic data protection.
- Quick win: Self-assessment takes 4–8 weeks if prepared.
Real-World Example: A small charity avoided a phishing scam after implementing these controls, saving hours of recovery time.
Are You Eligible? (Scope and Requirements)
Most organizations qualify if they’re UK-based and committed to basic security. No size limits—it’s scalable.
Eligibility Checklist:
- You handle any digital data (e.g., emails, files, or online payments).
- You’re willing to self-assess and fix gaps.
- Exclusions: Very high-risk sectors (e.g., defense) may need advanced schemes.
Out of Scope: Personal devices or non-business IT—focus on your organization’s core systems.
If unsure, use the NCSC’s free Cyber Essentials Readiness Tool for a quick assessment.
The Five Key Security Controls: A Breakdown
The self-assessment revolves around five controls. Review your setup against each. We’ve simplified the originals for clarity. Use the checklists below to mark your progress—aim for completion before submission. For detailed requirements, download the Cyber Essentials standard PDF.
4.1 Secure Configuration

Remove unnecessary software and default settings that hackers exploit.
- What to do: Delete unused apps, change default passwords (e.g., “admin”), and disable auto-run features.
- Checklist:
- Inventory all devices (laptops, servers, mobiles).
- Harden OS settings (e.g., Windows Firewall enabled).
- Common Gap: Forgotten guest Wi-Fi networks—secure them now.
4.2 Boundary Firewalls and Internet Gateways

Block unauthorized access from the internet.
- What to do: Use firewalls on routers and endpoints to filter traffic.
- Checklist:
- Enable built-in firewalls (e.g., on your router).
- Block risky ports (e.g., 23 for Telnet).
- Test with free tools like ShieldsUP!.
- Tip: Review logs weekly for suspicious activity.
4.3 Access Control and Administrative Privileges

Limit who can access what—only give “admin” rights to trusted staff.
- What to do: Use multi-factor authentication (MFA) and role-based access.
- Checklist:
- Enforce strong passwords (12+ characters, no reuse).
- Lock screens after 10 minutes idle.
- Revoke access for ex-employees immediately.
- Warning: Shared admin accounts are a big no—no exceptions.
4.4 Patch Management
Keep software up-to-date to fix known vulnerabilities.
- What to do: Automate updates where possible.
- Checklist:
- Scan for missing patches monthly.
- Prioritize critical ones (e.g., via tools like WSUS for Windows).
- Test updates on non-critical systems first.
- Pro Tip: Set calendar reminders—outdated software is hackers’ favorite target.
4.5 Malware Protection

Defend against viruses, ransomware, and trojans.
- What to do: Install anti-malware on all devices and scan regularly.
- Checklist:
- Use reputable tools (e.g., Windows Defender or equivalent).
- Block email attachments from unknowns.
- Educate staff: “Think before you click.”
- Quick Win: Run a full scan today.
Step-by-Step Guide to Self-Assessment
Follow these steps to complete and submit successfully. Aim for “first-time pass” by gathering evidence early. Check off as you go!
Main Assessment Checklist:
- Prepare (1–2 weeks): Assemble your IT team. Download the questionnaire from NCSC.gov.uk. Read the full scheme requirements.
- Assess (2–4 weeks): Answer the 30+ questions honestly. For each “Yes,” collect proof (e.g., screenshots, policies). Use the five controls above as your map.
- Fix Gaps: If you score low, implement changes. Re-test after fixes.
- Document Everything: Create a folder with:
- Policies (e.g., password rules).
- Screenshots of settings.
- Update logs.
- Submit to an Assessor: Choose an IASME-accredited body (e.g., WeSeeNow). Upload your questionnaire and evidence. They review within 2–4 weeks.
- Get Certified: If approved, receive your certificate (valid 12 months). Renew annually.
Time Estimate: 20–40 hours total, spread out.
Preparing Your Documentation: Tips for Success
Evidence is key—assessors need proof, not promises. For sample policies, check free templates like those from SANS Institute or Amtivo’s Cyber Security Policy Guide.
Essential Docs Checklist:
- IT asset register (list of devices).
- Security policies (one page each for access, updates, etc.).
- Training records (e.g., staff cyber awareness sessions).
- Audit logs (e.g., firewall reports).
Tools to Help:
- Free: NCSC’s Cyber Essentials Toolkit.
- Paid: Compliance software like CyberComply.
New Tip: Use templates from the questionnaire to standardize your answers.
Common Challenges and How to Overcome Them
Self-assessment can trip you up—here’s how to avoid pitfalls.
- Challenge: Overwhelmed by Tech Jargon. Fix: Use our glossary (Section 13) and NCSC videos.
- Challenge: Remote Workers. Fix: Extend controls to home setups (e.g., VPN for access).
- Challenge: Legacy Systems. Fix: Isolate old kit or upgrade—budget £500–£2,000.
- Challenge: Time Crunch. Fix: Break into weekly tasks; seek consultancy if stuck.
Stats to Motivate: 95% of applicants pass on first try with proper prep.
Cyber Essentials Plus: Upgrading Your Protection
Once certified, consider Plus for deeper assurance. It’s the same five controls, but with hands-on testing. Download the Plus Test Specification.
What’s Different?
- Independent assessor simulates attacks (penetration testing and phishing drills).
- Answers three big questions:
- How hard is it for malware to sneak in?
- Will you detect it if it does?
- How much damage could it cause?
When to Choose It: If you handle high-value data or supply to government.
Linking Cyber Essentials to UK GDPR Compliance
UK GDPR (retained from EU rules since 2018) demands strong data protection. Fines for breaches? Up to 4% of global turnover. For guidance, see the ICO’s UK GDPR resources.
How Cyber Essentials Helps:
- Covers “appropriate technical measures” for data security.
- Builds a foundation for full GDPR audits (e.g., via IASME Cyber Assurance).
- Proves due diligence to regulators.
Quick GDPR Tie-In Checklist:
- Map your personal data flows.
- Add privacy notices to your Cyber Essentials policies.
Advice: Pair with staff training—it’s the weakest link in 74% of breaches.
Resources and Downloads
Empower your team with these free tools:
- Official Questionnaire: IASME Download.
- Guidance PDFs: Full controls explained on the NCSC resources page.
- Videos: 5-minute intros on YouTube (NCSC playlist) or search “NCSC Cyber Essentials”.
- Templates: Policy starters from IASME help resources.
For consultancy, WeSeeNow offers tailored support as an IASME-accredited body.
Frequently Asked Questions (FAQs)
Q: How much does self-assessment cost?
A: £300–£600 for assessor review (varies by size). Prep is mostly free.
Q: What if I fail?
A: No penalty—just resubmit after fixes (extra fee).
Q: Can I do it alone?
A: Yes, but 60% use help for speed.
Q: Renewing?
A: Annual re-assessment; changes like new staff trigger reviews.
More FAQs: Check NCSC’s site.
Getting Help and Next Steps
Stuck? Don’t go it alone.
- Free Support: NCSC helpline (0300 123 1057) or visit the NCSC contact page; online forums also available.
- Paid Help: WeSeeNow provides consultancy, audits, and full certification services. Contact us or visit WeSeeNow Cyber Services.
- Communities: Join LinkedIn groups like “Cyber Essentials UK.”
Your Action Plan Checklist:
- Download the questionnaire today.
- Schedule a team kickoff.
- Aim to submit by [insert date, e.g., end of quarter].
Congratulations on starting your cyber journey—secure systems lead to secure growth!
Glossary of Terms
- Firewall: A security barrier that monitors internet traffic.
- MFA: Multi-Factor Authentication—extra login steps (e.g., app code).
- Patch: A software update fixing security holes.
- Penetration Testing: Ethical hacking to find weaknesses.
- UK GDPR: UK version of data protection laws.
For a full glossary of terms, click here.
Share this guide: Help a colleague get certified too!