{"id":4245,"date":"2017-07-12T14:31:24","date_gmt":"2017-07-12T13:31:24","guid":{"rendered":"https:\/\/cybersmart.com\/?p=4245"},"modified":"2020-11-10T16:18:44","modified_gmt":"2020-11-10T16:18:44","slug":"what-is-cyber-essentials","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/","title":{"rendered":"What is Cyber Essentials?"},"content":{"rendered":"

The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement of the basic controls all organisations should implement to mitigate the risk from common internet based threats, within the context of the Government\u2019s 10 Steps to Cyber Security. And through the Assurance Framework it offers a mechanism for organisations to demonstrate to customers, investors, insurers and others that they have taken these essential precautions.<\/p>\n

Cyber Essentials<\/a> offers a sound foundation of basic hygiene measures that all types of organisations can implement and potentially build upon. Government believes that implementing these measures can significantly reduce an organisation’s vulnerability.However, it does not offer a silver bullet to remove all cyber security risk; for example, it is not designed to address more advanced, targeted attacks and hence organisations facing these threats will need to implement additional measures as part of their security strategy.What Cyber Essentials does do is define a focused set of controls which will provide cost effective, basic cyber security for organisations of all sizes.<\/p>\n

The Assurance Framework, leading to the awarding of Cyber Essentials and CyberEssentials Plus certificates for organisations, has been designed in consultation with SMEs to be light-touch and achievable at low cost. The two options give organisations a choice over the level of assurance they wish to gain and the cost of doing so. It is important to recognise that certification only provides a snapshot of the cyber security practices of the organisation at the time of assessment, while maintaining a robust cyber security stance requires additional measures such as a sound risk management approach, as well as on-going updates to the Cyber Essentials control themes, such as patching. But we believe this scheme offers the right balance between providing additional assurance of an organisation\u2019s commitment to implementing cyber security to third parties while retaining a simple and low-cost mechanism for doing so.<\/p>\n

Protecting your data and organisation is hard work \u2014 let us help you make it easier.<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The Cyber Essentials scheme has been developed by Government and industry to fulfil two functions. It provides a clear statement of the basic controls all organisations should implement to mitigate…<\/p>\n","protected":false},"author":4,"featured_media":6529,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[8,9,10,34,35],"yoast_head":"\nWhat is Cyber Essentials? - CyberSmart<\/title>\n<meta name=\"description\" content=\"Basic controls all organisations should implement to mitigate the risk from common internet based threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cyber Essentials? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"Basic controls all organisations should implement to mitigate the risk from common internet based threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-12T13:31:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-10T16:18:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\"},\"author\":{\"name\":\"Franklin\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\"},\"headline\":\"What is Cyber Essentials?\",\"datePublished\":\"2017-07-12T13:31:24+00:00\",\"dateModified\":\"2020-11-10T16:18:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\"},\"wordCount\":339,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg\",\"keywords\":[\"Cyber\",\"Cyber Essentials\",\"Cyber Security\",\"Cyber smart\",\"IT Security\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\",\"name\":\"What is Cyber Essentials? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg\",\"datePublished\":\"2017-07-12T13:31:24+00:00\",\"dateModified\":\"2020-11-10T16:18:44+00:00\",\"description\":\"Basic controls all organisations should implement to mitigate the risk from common internet based threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cyber Essentials?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\",\"name\":\"Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"caption\":\"Franklin\"},\"url\":\"https:\/\/cybersmart.com\/author\/franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cyber Essentials? - CyberSmart","description":"Basic controls all organisations should implement to mitigate the risk from common internet based threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/","og_locale":"en_US","og_type":"article","og_title":"What is Cyber Essentials? - CyberSmart","og_description":"Basic controls all organisations should implement to mitigate the risk from common internet based threats.","og_url":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2017-07-12T13:31:24+00:00","article_modified_time":"2020-11-10T16:18:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg","type":"image\/jpeg"}],"author":"Franklin","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Franklin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/"},"author":{"name":"Franklin","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13"},"headline":"What is Cyber Essentials?","datePublished":"2017-07-12T13:31:24+00:00","dateModified":"2020-11-10T16:18:44+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/"},"wordCount":339,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg","keywords":["Cyber","Cyber Essentials","Cyber Security","Cyber smart","IT Security"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/","url":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/","name":"What is Cyber Essentials? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg","datePublished":"2017-07-12T13:31:24+00:00","dateModified":"2020-11-10T16:18:44+00:00","description":"Basic controls all organisations should implement to mitigate the risk from common internet based threats.","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/4.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyber-essentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"What is Cyber Essentials?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13","name":"Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","caption":"Franklin"},"url":"https:\/\/cybersmart.com\/author\/franklin\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/4245"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=4245"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/4245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6529"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=4245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=4245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=4245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}