The following checklist applies to both Cyber Essentials and Cyber Essentials Plus requirements, the difference being that with the latter a technical expert conducts a vulnerability scan and remote audit of your IT systems, including a representative set of user devices, all Internet gateways and all servers with services accessible to unauthenticated Internet users.
The questions that will need to be answered include:
- Are all of your operating systems supported including phones, tablets, servers, workstations etc…?
- Have all the security patches been applied to the operating systems?
- Is your Office suite up to date? Is your anti-malware up to date?
- Are your browsers up to date with security patches?
- Have you disabled auto-run?
- Have you disabled remote scripts from being run?
- Are all of your applications up to date with security patches?
- Are all the applications used in the organisation supported?

Cyber Security and the Board: A Sign of What’s to Come
URM’s blog explains recent amendments to the Cyber Security and Resilience Bill, how they align with broader regulatory shifts, & practical steps to prepare.
URM’s blog explains the recent open letter to suppliers issued by the NHS, what it means, why it matters, and the practical steps you can take to prepare.
URM’s blog explores the importance of cyber resilience & the steps organisations can take to prepare for and mitigate the impact of a cyber incident.
URM’s blog explores common weaknesses in organisations’ security programmes, & outlines practical, cost-effective measures to reduce the likelihood of a breach

