
Cyber Essentials Changes in 2026 – Cyber Essentials Plus Changes Overview
We provide an overview of the changes to Cyber Essentials Plus, the scheme’s audited qualification.
Watch the video
Cyber Essentials Changes in 2026 – Major Non-compliances
We explain the new Cyber Essentials Plus rule banning major non-compliances in the VSA, how it differs from before, and the likely practical impact.
Watch the video
Cyber Essentials Changes in 2026 – Backups
We explore the importance of backups in strengthening their cyber resilience.
Watch the video
Cyber Essentials Changes in 2026 – User Access Control
We discuss the shift in focus regarding user access control and passwordless authentication options.
Watch the video
Cyber Essentials Changes in 2026 – Web Applications
We discuss the updates to the guidance for web applications, now titled ‘Application Development’.
Watch the video
Cyber Essentials Changes in 2026 – Scoping Criteria
We explain the various changes to scoping criteria and how the requirements around scoping have tightened.
Watch the video
Cyber Essentials Changes in 2026 – Automatic Failure Questions
We discuss the questions that have been reclassified as ‘automatic failure questions’ in the new Danzell Question Set.
Watch the video
Cyber Essentials Changes in 2026 – MFA
We break down the updates to Cyber Essentials requirements for multi-factor authentication (MFA).
Watch the video
Cyber Essentials Changes in 2026 – Cloud Services
We explain the new formal definition of a ‘cloud service’ that IASME has provided this year.
Watch the video
Cyber Essentials Changes in 2026 – an Overview
We provide a high-level overview of the changes to the scheme, from the new Danzell Question Set to the updated Requirements for IT Infrastructure document.
Watch the video
Critical Steps in Implementing ISO 27001
We share the key benefits of implementing ISO 27001 reported by organisations that have achieved certification to the Standard.
Watch the video
How ISO 27001 Can Benefit Your Organisation
We share the key benefits of implementing ISO 27001 reported by organisations that have achieved certification to the Standard.
Watch the video
How is ISO 27001 Structured
We break down the structure of ISO 27001, including its ‘Harmonized Structure’ used by other ISO management system standards.
Watch the video
What is ISO 27001?
We give a high-level overview of what ISO 27001 is, the background and intention of the Standard, and explain the concept of ISMS
Watch the video
How to Maintain Cyber Essentials and Cyber Essentials Plus Certification
We share the best practices that will allow you to maintain Cyber Essentials and Cyber Essentials Plus certification
Watch the video
Preparing for Cyber Essentials and Cyber Essentials Plus Certification
We outline effective ways of preparation for Cyber Essentials or Cyber Essentials Plus
Watch the video
Cyber Essentials and Cyber Essentials Plus - 5 Technical Control Areas
This overview gives you a clear picture of today’s cyber risk landscape and what you can do to stay ahead.
Watch the video
What Are the Differences Between CE and CE Plus?
This overview gives you a clear picture of today’s cyber risk landscape and what you can do to stay ahead.
Watch the video
What Are Cyber Essentials and Cyber Essentials Plus?
This overview gives you a clear picture of today’s cyber risk landscape and what you can do to stay ahead.
Watch the video
The Current Cyber Threat Landscape
This overview gives you a clear picture of today’s cyber risk landscape and what you can do to stay ahead.
Watch the videoURM’s blog breaks down ISO 27001 Clause 7.5 requirements, with practical guidance on how to achieve conformance to this Clause & what external assessors expect.
URM’s blog explores common issues and areas for improvement identified during audits of organisations that have transitioned to ISO 27001:2022
URM’s blog explores ISO 27001 Clause 9.1, what it requires and practical guidance on how to implement this Clause in full conformance with the Standard.
URM’s blog breaks down key changes to the Cyber Essentials scheme coming into force on 27 April 2026, including the new Danzell Question Set.
URM’s blog outlines how continuous compliance fits into PCI DSS, and explores practical ways to integrate requirements into business-as-usual (BAU) operations.
URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.
URM’s blog explains recent amendments to the Cyber Security and Resilience Bill, how they align with broader regulatory shifts, & practical steps to prepare.
URM’s blog unpacks the DSG vs. ICO case, how it reached the Court of Appeal, & the Court’s decision on the status of pseudonymised data in the hands of attacker
URM’s blog explains the building blocks of information security risk, outlining how risks can be valued and prioritised, the role of rise appetite, and more.
URM’s blog explores how DSARs can be used to drive improvements, and share our insights on managing other data subject rights efficiently and effectively.
URM’s blog explains the recent open letter to suppliers issued by the NHS, what it means, why it matters, and the practical steps you can take to prepare.
URM’s blog unpacks the Identify Function of the NIST CSF, providing a detailed breakdown of its requirements and what you need to do to meet them.
Join 500+ organisations that achieved ISO success with URM’s unmatched track record—zero failed certifications over two decades.
URM can offer a range of support services when applying for Cyber Essentials Certification. Check our offer!
URM can conduct penetration tests on mobile apps that are deployed to either Apple IOS or Android devices, typically against the OWASP MASVS, but also under the CREST OVS framework where required.
