The following checklist applies to both Cyber Essentials and Cyber Essentials Plus requirements, the difference being that with the latter a technical expert conducts a vulnerability scan and remote audit of your IT systems, including a representative set of user devices, all Internet gateways and all servers with services accessible to unauthenticated Internet users.
The questions that will need to be answered include:
- Ensure all your operating systems are still being supported by the manufacturer (including mobile phones, servers, tablets etc.)
- Apply all operating systems’ security patches within the 14-day time period.
- If you are using the Office suite, it must be on a supported version with all the security patches applied.
- Ensure the anti-malware agent is up to date and functional.
- Update the web browser to the latest version, or at least apply the latest version with a patch for a high-risk or critical vulnerability.
- Disable auto-run and ensure you have a process for new starters and leavers and providing role-based access control.
- Ensuring administrator accounts are not used for non-administrative tasks.
- Ensure all default passwords are changed on the firewall, on the systems and ensure they are changed to a secure password.
- Ensure all unnecessary applications are removed. This can either be achieved with a ‘gold image’ or manual removal of relevant software.
- Ensure all the software you are running is supported and up to date.

Cyber Security Case Study: The Human and Organisational Cost of a Breach
URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.
URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.
URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.
URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.

