How do you achieve Cyber Essentials certification?

In order to achieve Cyber Essentials certification, you will need to complete a self-assessment questionnaire. Certification bodies, such as URM Consulting, can provide you with access to a portal where you are required to answer a number of questions about your IT infrastructure.

If you have any queries, URM can provide you with advice on what is intended by the different questions. Once you have submitted your completed questionnaire, you will be notified through the portal whether you have passed or not.

A number of certification bodies quote that it can take up to 3 working days from the time you submit your assessment to find out whether you have passed.

However, URM strives to assess all applications within 24 hours of it being submitted and if you have a very tight deadline, there is an option for your assessment to be fast-tracked.

The guidance and support we’ve received from URM during the process for both certifications have been exceptional, putting us at ease and providing clear and concise explanations and advice to ensure we met all the necessary requirements. We would not hesitate to recommend them.
Brand distributor
Apply for Cyber Essentials certificate

Deconstructing the EU Cyber Resilience Act

Published on
18 Dec
2025

URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
18/12/2025
Cyber Essentials Requirements Update

URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
21/11/2025
Cyber Security Case Study: The Human and Organisational Cost of a Breach

URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
6/11/2025
Building Cyber Security Resilience Against Phishing

URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.

Read more
"
URM's penetration testing services have been super efficient and effective. We have always found the outputs of the penetration test to be easily actionable.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.