The vulnerability scan is utilised on two steps of the Cyber Essentials Plus certification process (scans are not used as part of the Cyber Essentials certification process, which relies on a self-assessment questionnaire).
Initially, vulnerability scans are used to assess all the external-facing devices used in the infrastructure (firewalls, routers, servers, services etc.) and then later on the internal vulnerability scan to assess the sampled endpoints.

Supplementing Cyber Essentials
URM’s blog outlines the practical measures you can take following Cyber Essentials certification to further enhance your information & cyber security posture.

URM’s blog explores how Cyber Essentials can help your legal practice enhance its security posture and achieve/maintain its SQM or Lexcel accreditation.

URM’s blog answers key questions about CE, focusing specifically on its technical requirements, use of BYOD, and how the scheme may change in the future.

URM explains each control law firms must include in an information management and security policy that complies with the Lexcel Practice Management Standard.