Cyber Security Experts Release Helpful Guide on How to Prepare for Cyber Essentials as the UK Government Mandates Certification for its Supply Chain

Share Article

Security Alliance announces the release of a new guide on how to prepare for Cyber Essentials certification. Written by industry expert David Morgan, the guide cuts through the jargon and explains exactly how organisations can prepare for successful certification and fast track the process.

How to prepare for Cyber Essentials certification

A Guide to Preparing for Cyber Essentials

Whether you are supplying services to the UK Government or not, you need to be aware of the growing threat landscape. Commercial businesses are increasingly demanding to see third party validation and security assurance.

Security Alliance, is pleased to announce the release of a new guide for those who require certification under the Cyber Essentials Scheme. The guide, entitled ‘How to Prepare for Cyber Essentials’ comes at an opportune time, as the Cabinet Office has today mandated Cyber Essentials certification for suppliers to central Government for new procurement contracts.

The Cyber Essentials Scheme has been developed by the UK government to help make the UK a safer place to do business online. Through independent assessment, the scheme identifies fundamental technical security controls that a business needs to have in order to defend against Internet-borne threats. Systems that fall within its scope include Internet connected end-user devices (desktop PCs, laptops, tablets and smartphones) and Internet connected systems (e.g. email, web and application servers).

John Beale, Managing Director of Security Alliance comments, “The UK government is investing heavily in cyber security defences, as this brings direct benefit to the UK economy. Businesses that supply specified services to central UK Government departments will now need to prove that they meet the requirements of the recently launched Cyber Essentials Scheme, through certification."

He adds, "We see this as being extremely positive for UK businesses, as there is a growing need to defend effectively against online attacks. The Cyber Essentials Scheme delivers a security standard, against which businesses of all sizes can measure whether they have a defined set of fundamental security controls in place, to help defend against every-day Internet-borne threats.”

In the last year, the number of attacks aimed at organisations has increased and the general consensus is that the trend is unlikely to change. According to the PwC and BIS: 2014 SBS Survey, 81% of large organisations and 61% of small organisations suffered a data breach in 2013.

David Morgan, Technical Services Director at Security Alliance comments, “Whether you are supplying services to the UK Government or not, you need to be aware of the growing threat landscape. Commercial businesses are also increasingly demanding to see third party validation and security assurance from their supply chain, through certification. Mature organisations have recognised that, with attacks continuing to rise, they are exposed to unknown levels of risk, if they are not assessing the security controls of third party suppliers that handle their sensitive information. The Cyber Essentials Scheme effectively targets the 80% of breaches could have been prevented through implementing basic cyber security hygiene.’’

He continues: “The Cyber Essentials Scheme provides a standard against which organisations can evaluate their cyber security posture, and helps drive secure business forward. Through engaging with a CREST accredited company, such as Security Alliance, it also gives added assurances that cyber security suppliers, and their consultants, have both the skills and expertise to deliver the services required.”

“Our latest guide has been written specifically to help organisations prepare for Cyber Essentials. It details the exact measures an organisation needs to take, and supports our earlier guide on How to Certify for Cyber Essentials.”

You can download the full guide here.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Jane Frankland
since: 12/2010
Follow >
Follow us on
Visit website