The vulnerability scan is utilised on two steps of the Cyber Essentials Plus certification process (scans are not used as part of the Cyber Essentials certification process, which relies on a self-assessment questionnaire).
Initially, vulnerability scans are used to assess all the external-facing devices used in the infrastructure (firewalls, routers, servers, services etc.) and then later on the internal vulnerability scan to assess the sampled endpoints.

Cyber Security Case Study: The Human and Organisational Cost of a Breach
URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.
URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.
URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.
URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.

