{"id":3200,"date":"2024-12-03T14:28:12","date_gmt":"2024-12-03T14:28:12","guid":{"rendered":"https:\/\/client-acora.s.nomatter.dev\/one\/?p=3200"},"modified":"2024-12-03T14:28:12","modified_gmt":"2024-12-03T14:28:12","slug":"cyber-essentials-requirements","status":"publish","type":"post","link":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/","title":{"rendered":"Cyber Essentials Requirements"},"content":{"rendered":"<p>According to the\u00a0<a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/975732\/20-046099-01_CSBS_2021_micro_and_small_trends_infographic_310321.pdf\">Cyber Security Breaches Survey 2021<\/a>, the average annual cost for micro and small businesses that lost data or assets after\u00a0<a href=\"https:\/\/acora.one\/cyber-security\">cyber security<\/a>\u00a0breaches in the UK was\u00a0\u00a38,170.\u00a0In 2020, this figure was\u00a0\u00a32,340. An increase of\u00a0249%.<\/p>\n<p>An alarming change!\u00a0So, what can you do to protect your business from these attacks?<\/p>\n<p>Today, we\u2019re going to take a look at Cyber Essentials.<\/p>\n<h3><strong>What is Cyber Essentials?<\/strong><\/h3>\n<p>Cyber Essentials\u00a0is a scheme to help companies and organisations protect themselves against cybercrime. It includes a set of basic technical tools and techniques that you can use to guard against the most common cyber-attacks. Businesses who meet the Cyber Essentials standard can gain a certificate to prove their compliance.<\/p>\n<p>Cyber Essentials\u00a0<u>isn\u2019t<\/u> just for big business, or those with lots of resources.\u00a0Any business, of any size, can get certified and realise its benefits.\u00a0Cyber Essentials was created by the UK Government in\u00a02014.\u00a0\u00a0It\u2019s operated by the\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/cyberessentials\/overview\">National Cyber Security Centre (NCSC)<\/a>\u00a0and supported by industry bodies including:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.fsb.org.uk\/\">Federation of Small Businesses (FSB)<\/a><\/li>\n<li><a href=\"https:\/\/www.cbi.org.uk\/\">Confederation of British Industry (CBI)<\/a><\/li>\n<li>A number of insurance organisations<\/li>\n<\/ul>\n<p>They usually offer incentives to businesses to get\u00a0Cyber Essentials certified.\u00a0Even though Cyber Essentials is a UK government scheme, companies outside the UK can still gain a certification.<\/p>\n<h3><strong>What does Cyber Essentials cover?<\/strong><\/h3>\n<p>The main areas covered by\u00a0Cyber Essentials\u00a0are:<\/p>\n<ul>\n<li>Guarding against\u00a0phishing and ransomware attacks by training staff in how to spot scams, choosing good passwords and keeping software updated<\/li>\n<li>Combating\u00a0malware and viruses by installing and configuring anti-malware and anti-virus applications, and making sure you only use applications you can trust<\/li>\n<li>Fending off network attacks from outside by setting up and configuring\u00a0firewalls and routerscorrectly<\/li>\n<li>Controlling access to your data with properly configured accounts, so people only access servers and files they genuinely need to use.<\/li>\n<\/ul>\n<p>The idea behind Cyber Essentials is that most cyber-attacks are\u00a0blunt instruments, rather than\u00a0sophisticated hacks.\u00a0The certification defines a\u00a0focused set of controls\u00a0with clear guidance on basic cyber security for companies of all sizes.<\/p>\n<p>It offers a sound foundation of cyber security measures that can be implemented with a relatively low cost.\u00a0Criminals with fairly\u00a0basic equipment\u00a0and\u00a0skills can launch simple attacks against a lot of businesses.\u00a0They are opportunistic in the\u00a0<u>hope<\/u>\u00a0that some of them will get through.<\/p>\n<p>As an example:\u00a0It\u2019s a bit like walking down the street and trying every front door in case it\u2019s unlocked.\u00a0Don\u2019t be that\u00a0low-hanging fruit.\u00a0Take what precautions you can, to keep safe.<\/p>\n<h3><strong>So, what do existing certified companies think of the Cyber Essentials certification?<\/strong><\/h3>\n<p>According to the\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/information\/setting-baseline-ce-prior-to-iasme\">NCSC<\/a>,\u00a093% of certified companies surveyed say they are confident they are protected against common, internet-based cyber attacks.\u00a0They found that certified companies are\u00a0more likely\u00a0than their non-certified counterparts to be:<\/p>\n<ul>\n<li>Aware of the risks posed by cyber-attacks (including at a senior level)<\/li>\n<li>Confident that they are protected from these attacks<\/li>\n<li>Implementing cyber security controls, including taking steps beyond the technical controls required to become certified<\/li>\n<li>Positive about the scheme, particularly its impact on customer and investor confidence<\/li>\n<\/ul>\n<h3><strong>What&#8217;s the difference between Cyber Essentials and Cyber Essentials Plus?<\/strong><\/h3>\n<p>Cyber Essentials includes two levels:<\/p>\n<ul>\n<li><a href=\"https:\/\/acora.one\/news\/article\/cyber-essentials-requirements#cyber-essentials\">Cyber Essentials<\/a><\/li>\n<li><a href=\"https:\/\/acora.one\/news\/article\/cyber-essentials-requirements#cyber-essentials-plus\">Cyber Essentials Plus<\/a><\/li>\n<\/ul>\n<h3><strong>Cyber Essentials<\/strong><\/h3>\n<p>Cyber Essentials allows you to\u00a0<strong>assess your own security<\/strong>\u00a0against cyber threats and\u00a0<strong>learn<\/strong> what you can do to prevent them.\u00a0To gain the certification, you complete a Self-Assessment Questionnaire (SAQ) that\u00a0<strong>covers the following\u00a0<\/strong>areas:<\/p>\n<ul>\n<li>Your Company<\/li>\n<li>Scope of Assessment<\/li>\n<li>Insurance<\/li>\n<li>Office Firewalls &amp; Internet Gateways<\/li>\n<li>Secure Configuration<\/li>\n<li>Security Update Management<\/li>\n<li>User Accounts<\/li>\n<li>Administrative Accounts<\/li>\n<li>Malware Protection<\/li>\n<\/ul>\n<p>A member of your board\u00a0<u>must<\/u> sign the SAQ to affirm that it\u2019s accurate and complete.\u00a0Even though you submit the Cyber Essentials questionnaire yourself, we recommend you get expert third-party input to make sure you\u2019ve got everything right.<\/p>\n<p>Some of the questions can be complex, particularly if you manage your own IT and don\u2019t have a technical background.<\/p>\n<h3><strong>Cyber Essentials Plus<\/strong><\/h3>\n<p>Cyber Essentials Plus is very similar, but includes a higher level of validation.\u00a0It includes a\u00a0technical audit\u00a0of the systems involved as well as the\u00a0SAQ.<\/p>\n<p>You can re-use an SAQ you completed for Cyber Essentials for Cyber Essentials Plus.\u00a0You\u2019ll need to apply\u00a0within three months\u00a0of completing the SAQ.\u00a0Your Cyber Essentials Plus audit will be carried out by a qualified organisation known as a\u00a0Certification Partner.\u00a0The\u00a0audit will include\u00a0looking for:<\/p>\n<ul>\n<li>External vulnerabilities<\/li>\n<li>An internal scan<\/li>\n<li>An on-site assessment, for which they\u2019ll have to visit your premises.<\/li>\n<\/ul>\n<p>During the on-site visit, the auditor will look at a representative sample of your devices to make sure they\u2019re being managed in the right way.\u00a0If you pass your audit, your certification body will give you a\u00a0Cyber Essentials Plus certificate, providing independent confirmation that you meet the standard.<\/p>\n<p>If you fail, you\u2019ll need to fix the outstanding issues before you re-apply.<\/p>\n<h3><strong>Is Cyber Essentials certification worth it?<\/strong><\/h3>\n<p>In short, yes.<\/p>\n<p>Basic Cyber Essentials is a good option if you just want to demonstrate that you have essential controls in place.\u00a0If your business is based at a single location, and your network is only accessed by team members when they physically come into work,\u00a0then\u00a0basic Cyber Essentials\u00a0is probably enough for you.<\/p>\n<p>The more access points\u00a0there are to your network, the more likely you\u2019ll need\u00a0Cyber Essentials Plus.\u00a0For example:<\/p>\n<p>If you have multiple networked sites, people working remotely, or third parties who visit your premises or access your network, Cyber Essentials Plus will give you the reassurance that your data is still safe.<\/p>\n<h3><strong>Why become Cyber Essentials certified?<\/strong><\/h3>\n<p>The main reason to gain Cyber Essentials certification is to get a clear picture of the cyber threats you\u2019re facing, and protect your business against them.\u00a0Cybercrime is a real and growing danger.<\/p>\n<p>According to the UK government, four in ten businesses (39%) and a quarter of charities (26%) report having\u00a0cyber security\u00a0breaches or attacks in the last\u00a012 months.\u00a0What\u2019s more, these aren\u2019t one-offs or occasional hiccups \u2013 out of the businesses who were targeted,\u00a027% experienced some sort of attack at least once a week.\u00a0With\u00a0phishing attacks\u00a0(83%) by far the most common.<\/p>\n<p>Just by having\u00a0Cyber Essentials, you make yourself a less attractive target for cyber criminals.\u00a0Think about it:<\/p>\n<p>The group\u00a0without\u00a0protection is a much easier target than the one\u00a0with.\u00a0If you aren\u2019t certified, you mark yourself out as potentially vulnerable.\u00a0This could\u00a0act as encouragement\u00a0for hackers to try more subtle and powerful attacks.<\/p>\n<p>Cyber Essentials also shows customers, suppliers and partners that you take digital security seriously.\u00a0It shows that they can trust you with their confidential data.\u00a0Every certified business is listed on the NCSC\u2019s website.\u00a0You can\u00a0<a href=\"https:\/\/iasme.co.uk\/cyber-essentials\/ncsc-certificate-search\/\">search for a certified company<\/a>\u00a0on the IASME website.<\/p>\n<p>If you\u2019re bidding for a government contract that involves handling certain sensitive and personal information, you\u2019ll need Cyber Essentials certification.<\/p>\n<h3><strong>How do I get Cyber Essentials certified?<\/strong><\/h3>\n<p>Well, let\u2019s take a look at the process below:<\/p>\n<p><em><strong>1. Sign Up<\/strong><\/em><\/p>\n<p>The first stage is to sign up for Cyber Essentials.\u00a0We recommend you get advice from a certified body to guide you through the whole process of gaining your Cyber Essentials aCyber Essentials Plus certification.<\/p>\n<p>Before you start, you\u2019ll need to:<\/p>\n<ul>\n<li>Define the scopeof the project<\/li>\n<li>Establish an idea of\u00a0costs\u00a0andtimescales<\/li>\n<\/ul>\n<p>As a rough guide, the more users, sites and network access points you have, the more complex the project is likely to be.<\/p>\n<p><em><strong>2. SAQ<\/strong><\/em><\/p>\n<p>The next step is to complete the Self-Assessment Questionnaire (SAQ).\u00a0Even though you submit the SAQ yourself, we recommend you get expert input prior to submission.\u00a0This is to ensure it meets the scheme\u2019s requirements.<\/p>\n<p><em><strong>3. Cyber Essentials Certification<\/strong><\/em><\/p>\n<p>If your application is successful, you will be issued your Cyber Essentials certificate. Well done!<\/p>\n<p><em><strong>4. Onsite Assessment<\/strong><\/em><\/p>\n<p>If you are planning to obtain the\u00a0Cyber Essentials Plus certification, you will need to go through a technical audit.\u00a0This includes a collection of\u00a0internal vulnerability scans\u00a0and\u00a0tests.<\/p>\n<p>You\u2019ll need to prepare for your\u00a0audit\u00a0by reviewing the security arrangements you currently have and with suggested improvements.\u00a0If you need help with the technical side, you may need an IT engineer to help you make the necessary changes.\u00a0A lot of this type of support can be delivered remotely, particularly if your data is hosted on external servers.<\/p>\n<p>If you don\u2019t have a\u00a0Cyber Essentials SAQ\u00a0from the last\u00a030 days, you\u2019ll need to complete one.\u00a0An IT engineer will need to visit you to make a\u00a0series of checks on your network and some of your work machines.\u00a0They\u2019ll also make sure that all the answers you put in your SAQ are correct and complete.<\/p>\n<p><em><strong>5. External Scan<\/strong><\/em><\/p>\n<p>For the final step, you will need to have an\u00a0external vulnerability scan.\u00a0This is a scan of your Internet-facing networks and applications.\u00a0It is used to verify that there are no\u00a0obvious vulnerabilities.<\/p>\n<p>As the tests are external, they are performed off-site.\u00a0With help, you are very unlikely to fail the audit.\u00a0However, if you do, you can get feedback on what you need to change.\u00a0Then you can decide whether you want to re-apply.<\/p>\n<p><em><strong>6. Cyber Essentials Plus Certification<\/strong><\/em><\/p>\n<p>If your application is successful, you will be issued your Cyber Essentials Plus certificate.\u00a0Once you have acquired either Cyber Essentials or Cyber Essentials Plus, you can then display it at your premises or on your website.<\/p>\n<h3><strong>What\u2019s the cost of Cyber Essentials?<\/strong><\/h3>\n<p>In terms of cost, expert guidance on basic Cyber Essentials certification is usually covered by a flat fee for scoping work.\u00a0Any remedial work\u00a0would be an\u00a0additional cost.<\/p>\n<p>Cyber Essentials Plus is more complex and depends on the size of your company.\u00a0You\u2019ll need to contact your provider to get a\u00a0tailored quote.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the\u00a0Cyber Security Breaches Survey 2021, the average annual cost for micro and small businesses that lost data or assets after\u00a0cyber security\u00a0breaches in the UK was\u00a0\u00a38,170.\u00a0In 2020, this figure was\u00a0\u00a32,340. An increase of\u00a0249%. An alarming change!\u00a0So, what can you&#8230;<\/p>\n","protected":false},"author":16,"featured_media":3204,"comment_status":"open","ping_status":"open","sticky":false,"template":"full-width-single-post.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[18,47,48,49],"class_list":["post-3200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","tag-cyber-security","tag-cyber-essentials-requirements","tag-cyber-essentials","tag-cyber-essentials-certification"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Essentials Requirements - Acora ONE<\/title>\n<meta name=\"description\" content=\"Discover the key Cyber Essentials requirements to help safeguard your business against cyber threats with guidance from Acora One.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Essentials Requirements\" \/>\n<meta property=\"og:description\" content=\"Discover the key Cyber Essentials requirements to help safeguard your business against cyber threats with guidance from Acora One.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora ONE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AcoraOne\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-03T14:28:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/client-acora.s.nomatter.dev\/app\/uploads\/sites\/2\/2024\/10\/Cyber-Essentials-Requirements-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Acora Press Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@acora_one\" \/>\n<meta name=\"twitter:site\" content=\"@acora_one\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Acora Press Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/\"},\"author\":{\"name\":\"The Acora Press Team\",\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/#\\\/schema\\\/person\\\/ba1b40b0753d233f1dc7053f63dd61cc\"},\"headline\":\"Cyber Essentials Requirements\",\"datePublished\":\"2024-12-03T14:28:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/\"},\"wordCount\":1645,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.acora.com\\\/app\\\/uploads\\\/sites\\\/2\\\/2024\\\/10\\\/Cyber-Essentials-Requirements.png\",\"keywords\":[\"cyber security\",\"Cyber Essentials Requirements\",\"cyber essentials\",\"cyber essentials certification\"],\"articleSection\":[\"Article\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/\",\"url\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/\",\"name\":\"Cyber Essentials Requirements - Acora ONE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.acora.com\\\/app\\\/uploads\\\/sites\\\/2\\\/2024\\\/10\\\/Cyber-Essentials-Requirements.png\",\"datePublished\":\"2024-12-03T14:28:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/#\\\/schema\\\/person\\\/ba1b40b0753d233f1dc7053f63dd61cc\"},\"description\":\"Discover the key Cyber Essentials requirements to help safeguard your business against cyber threats with guidance from Acora One.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#primaryimage\",\"url\":\"https:\\\/\\\/static.acora.com\\\/app\\\/uploads\\\/sites\\\/2\\\/2024\\\/10\\\/Cyber-Essentials-Requirements.png\",\"contentUrl\":\"https:\\\/\\\/static.acora.com\\\/app\\\/uploads\\\/sites\\\/2\\\/2024\\\/10\\\/Cyber-Essentials-Requirements.png\",\"width\":2240,\"height\":1260,\"caption\":\"Cyber Essentials Requirements hero image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/news\\\/article\\\/cyber-essentials-requirements\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.com\\\/one\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Essentials Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/#website\",\"url\":\"https:\\\/\\\/acora.com\\\/one\\\/\",\"name\":\"Acora ONE\",\"description\":\"We offer IT Support, Cloud Services, Telecoms, Cyber Security and Software Development throughout Norfolk, Suffolk and nationwide. Call us on 01603 431200.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.com\\\/one\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acora.com\\\/one\\\/#\\\/schema\\\/person\\\/ba1b40b0753d233f1dc7053f63dd61cc\",\"name\":\"The Acora Press Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"caption\":\"The Acora Press Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Essentials Requirements - Acora ONE","description":"Discover the key Cyber Essentials requirements to help safeguard your business against cyber threats with guidance from Acora One.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Essentials Requirements","og_description":"Discover the key Cyber Essentials requirements to help safeguard your business against cyber threats with guidance from Acora One.","og_url":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/","og_site_name":"Acora ONE","article_publisher":"https:\/\/www.facebook.com\/AcoraOne\/","article_published_time":"2024-12-03T14:28:12+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/client-acora.s.nomatter.dev\/app\/uploads\/sites\/2\/2024\/10\/Cyber-Essentials-Requirements-1024x576.png","type":"image\/png"}],"author":"The Acora Press Team","twitter_card":"summary_large_image","twitter_creator":"@acora_one","twitter_site":"@acora_one","twitter_misc":{"Written by":"The Acora Press Team","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#article","isPartOf":{"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/"},"author":{"name":"The Acora Press Team","@id":"https:\/\/acora.com\/one\/#\/schema\/person\/ba1b40b0753d233f1dc7053f63dd61cc"},"headline":"Cyber Essentials Requirements","datePublished":"2024-12-03T14:28:12+00:00","mainEntityOfPage":{"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/"},"wordCount":1645,"commentCount":0,"image":{"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2024\/10\/Cyber-Essentials-Requirements.png","keywords":["cyber security","Cyber Essentials Requirements","cyber essentials","cyber essentials certification"],"articleSection":["Article"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/","url":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/","name":"Cyber Essentials Requirements - Acora ONE","isPartOf":{"@id":"https:\/\/acora.com\/one\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#primaryimage"},"image":{"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2024\/10\/Cyber-Essentials-Requirements.png","datePublished":"2024-12-03T14:28:12+00:00","author":{"@id":"https:\/\/acora.com\/one\/#\/schema\/person\/ba1b40b0753d233f1dc7053f63dd61cc"},"description":"Discover the key Cyber Essentials requirements to help safeguard your business against cyber threats with guidance from Acora One.","breadcrumb":{"@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#primaryimage","url":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2024\/10\/Cyber-Essentials-Requirements.png","contentUrl":"https:\/\/static.acora.com\/app\/uploads\/sites\/2\/2024\/10\/Cyber-Essentials-Requirements.png","width":2240,"height":1260,"caption":"Cyber Essentials Requirements hero image"},{"@type":"BreadcrumbList","@id":"https:\/\/acora.com\/one\/news\/article\/cyber-essentials-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.com\/one\/"},{"@type":"ListItem","position":2,"name":"Cyber Essentials Requirements"}]},{"@type":"WebSite","@id":"https:\/\/acora.com\/one\/#website","url":"https:\/\/acora.com\/one\/","name":"Acora ONE","description":"We offer IT Support, Cloud Services, Telecoms, Cyber Security and Software Development throughout Norfolk, Suffolk and nationwide. Call us on 01603 431200.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.com\/one\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/acora.com\/one\/#\/schema\/person\/ba1b40b0753d233f1dc7053f63dd61cc","name":"The Acora Press Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","caption":"The Acora Press Team"}}]}},"_links":{"self":[{"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/posts\/3200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/comments?post=3200"}],"version-history":[{"count":0,"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/posts\/3200\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/media\/3204"}],"wp:attachment":[{"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/media?parent=3200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/categories?post=3200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acora.com\/one\/wp-json\/wp\/v2\/tags?post=3200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}