Cyber Essentials

Cyber Essentials assessment service
You are here:

The minimum standard for all business’

Building Blocks

“Organisations validated against Cyber Essentials Basic, either with 1 Cyber Valley or another certification body, are eligible for progression to Cyber Essentials Plus certification.”

Although Cyber Essentials is a scheme developed by UK industry and backed by the UK Government, it is not reserved for use exclusively in the UK as organisations from Hong Kong, Poland, Trinidad and the US have been assessed for Cyber Essentials. Cyber Essentials defines a focused set of core controls which provide cost-effective, straightforward cyber security for your business. Its five control topics (Boundary Firewalls and Internet Gateways; Secure Configuration; Access Control; Malware Protection; Patch Management) align with many aspects of other information security standards and compliance obligations, such as the Payment Card Industry Data Security Standard (PCI DSS) or ISO 27001. Cyber Essentials therefore provides the perfect cyber security foundation from which to build your information security operational, technical and management capabilities.

1 Cyber Valley’s Cyber Essentials assessment service includes:

  • Provision of the 1 Cyber Valley Cyber Essentials Self-Assessment Questionnaire for your compliance assessement
  • Review of your completed Self-Assessment-Questionnaire
  • OPTIONAL Internal / External Vulnerability Scan(s)
  • Independent assessment and certification against the Cyber Essentials framework

Our Cyber Essentials assessment services offer your organisation:

To support your achievement and maintenance of Cyber Essentials certification, Our 1 Cyber Valley information security professionals can be engaged to work with you as your independent trusted advisor guiding and supporting you as needed, for example with security awareness/training, security controls implementation or remediation, and our Testing Services team are available to perform periodic vulnerability scanning or penetration testing to identify vulnerabilities and exploitable weaknesses in your systems and controls.