What 10 steps should you follow to prepare for Cyber Essentials certification?

The following checklist applies to both Cyber Essentials and Cyber Essentials Plus requirements, the difference being that with the latter a technical expert conducts a vulnerability scan and remote audit of your IT systems, including a representative set of user devices, all Internet gateways and all servers with services accessible to unauthenticated Internet users.

The questions that will need to be answered include:

  1. Ensure all your operating systems are still being supported by the manufacturer (including mobile phones, servers, tablets etc.)
  2. Apply all operating systems’ security patches within the 14-day time period.
  3. If you are using the Office suite, it must be on a supported version with all the security patches applied.
  4. Ensure the anti-malware agent is up to date and functional.
  5. Update the web browser to the latest version, or at least apply the latest version with a patch for a high-risk or critical vulnerability.
  6. Disable auto-run and ensure you have a process for new starters and leavers and providing role-based access control.
  7. Ensuring administrator accounts are not used for non-administrative tasks.
  8. Ensure all default passwords are changed on the firewall, on the systems and ensure they are changed to a secure password.
  9. Ensure all unnecessary applications are removed. This can either be achieved with a ‘gold image’ or manual removal of relevant software.
  10. Ensure all the software you are running is supported and up to date.
Our assessor has been amazing and a pleasure to work with on the assessments. He always goes above and beyond to help, reassure, and advise, and is an asset to the company.
IT company
Apply for Cyber Essentials certificationApply for Cyber Essentials Plus

Cyber Security Case Study: The Human and Organisational Cost of a Breach

Published on
21 Nov
2025

URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
7/11/2025
Cyber Essentials Requirements Update

URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
6/11/2025
Building Cyber Security Resilience Against Phishing

URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
31/10/2025
Deconstructing the EU Cyber Resilience Act

URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.

Read more
"
I know many Cyber Essentials providers are rigid to the point of not understanding the goal of CE, but we haven’t found that with URM. We are extremely happy with the service we’ve received – our Cyber Essentials recertifications are always painless and straightforward. The different assessors we’ve had have all been great and pitch to the right level, as well as having an extremely strong knowledge of the subject matter. The account management side is also excellent. Our Account Manager checks in with us on a regular basis, and is very approachable and credible, with a comprehensive understanding of Cyber Essentials.
CISO at University of Surrey
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.