What tests are carried out in the Cyber Essentials Plus process?

There are 4 stages involved in achieving CE+ certification.

The first stage involves an external vulnerability scan which is conducted remotely and aims to detect any potential vulnerabilities present on external-facing devices (firewalls, routers, servers etc.).

As an added-value service, URM will often run the external scan ahead of the assessment date and provide feedback to its clients to ensure there will be no unforeseen outcomes during the assessment and enable any remediations to be made.

The second stage, which can also be carried out remotely, is the internal vulnerability scan. Here, a vulnerability scanner is connected to the internal network and searches for potential vulnerabilities in the system on sampled devices.

A ‘Malware delivered over email’ test represents the third stage. This test involves URM (or another assessor) sending 3 emails to the audited organisation that go through the same filter as everyday emails would.

The first email is an email with a link, the second email is an email with a notepad document. The goal here is to confirm that your organisation can receive attachments. The third email contains an EICAR file and is designed to test the response of computer antivirus (AV) programs.

The file has malicious signatures, but the file itself is not malicious. As such, it should get picked up by anti-malware without causing any damage to machines. This test is again conducted on the sampled devices.

The fourth and final stage is a ‘Malware delivered over web’ test. This test uses the link from the previous stage (first email) to open a page with multiple links and there is an attempt to try and download malicious files, macros and run remote scripts.

All of these attempts should get blocked either by the operating system or the anti-malware software. Again, this test is carried out on the sampled devices.

I just wanted to write to you to express my sincere appreciation for the outstanding work from URM’s assessor during the audit process. He demonstrated a fantastic level of knowledge and understanding, truly going above and beyond with the work that he performed, providing guidance in a communicative and enjoyable manner. It was a delight to work with him and I would be very excited to do the same again next year in our Cyber Essentials audit.
Children's charity
Apply for Cyber Essentials certificationApply for Cyber Essentials Plus

Cyber Essentials Questions Answered: Technical Requirements, BYOD Compliance and the Future of the Scheme

Published on
3 Sep
2025

URM’s blog answers key questions about CE, focusing specifically on its technical requirements, use of BYOD, and how the scheme may change in the future.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
29/8/2025
Cyber Essentials: Improving Your Cyber Security as an SME

URM’s blog discusses the significant cyber security risks faced by small & medium-sized enterprises (SMEs), and how Cyber Essentials certification can help.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
29/8/2025
Supplementing Cyber Essentials

URM’s blog outlines the practical measures you can take following Cyber Essentials certification to further enhance your information & cyber security posture.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
22/8/2025
Understanding Defence Cyber Certification (DCC)

URM’s blog explains what DCC is, how compliance with the scheme and the process to certification work, and the benefits to obtaining certification.

Read more
"
We highly recommend URM to any business looking to achieve Cyber Essentials or Cyber Essentials Plus certification—their expertise and customer service are second to none!
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.