What Cyber Essentials Plus scope can I choose?

The scope of the Cyber Essentials Plus must be the same as the Cyber Essentials scope.

It is up to you how you want to segregate your infrastructure and which divisions you would like to exclude. The excluded or included parts of the infrastructure must be segregated by some means, e.g. a firewall or a physical boundary.

URM’s in-depth knowledge of cybersecurity best practices and the Cyber Essentials framework helped us strengthen both ours and our client’s security posture while ensuring full compliance. Their consultants were professional, approachable, and incredibly thorough, offering practical advice tailored to the specific needs. The Cyber Essentials Plus assessment was conducted with great efficiency, and URM’s supportive approach meant we felt well-prepared at every stage. Thanks to their expertise, we successfully achieved certification for us and our clients, giving us (and our clients) greater confidence in our cybersecurity resilience.
IT support company
Apply for Cyber Essentials certificationApply for Cyber Essentials Plus

Deconstructing the EU Cyber Resilience Act

Published on
18 Dec
2025

URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
18/12/2025
Cyber Essentials Requirements Update

URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
21/11/2025
Cyber Security Case Study: The Human and Organisational Cost of a Breach

URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
6/11/2025
Building Cyber Security Resilience Against Phishing

URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.

Read more
"
Our URM assessor’s dedication and expertise are truly commendable and he made the entire audit process a positive and productive experience. He is a real asset to your team.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.