Effective preparation for Cyber Essentials or Cyber Essentials Plus goes beyond simply understanding the scheme’s mandatory requirements – knowing what makes for a smooth and successful assessment, one that sets you up for straightforward ongoing compliance, is also critical.

In this short video, we share our top practical tips for achieving seamless certification to the scheme, as well as common self-assessment questionnaire (SAQ) mistakes that frequently trip up organisations.  We also offer guidance on preparing for Cyber Essentials Plus, highlighting pitfalls our assessors often see during the hands‑on technical assessment and how to avoid them.

This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.

To achieve Cyber Essentials certification, one of the first steps is gaining a solid understanding of the scheme’s requirements and how your organisation will meet them.

In this video, we explain Cyber Essentials’ five technical control areas (firewalls, secure configuration, security update management, user access control, malware protection), breaking down what you need to have in place for each control area.  We also explore some common obstacles to meeting requirements and how these can be overcome.  This guide gives you a clear introduction to the measures you’ll need to implement if you decide to certify.

This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.

For organisations deciding whether Cyber Essentials or Cyber Essentials Plus is right for them, having a clear understanding of what each certification involves is essential.

In this short video, we break down how CE and CE Plus differ, outline the key steps involved in a CE Plus assessment, and explain what is and is not in scope for the audit. We also cover how CE Plus works in businesses with fully remote teams and cloud‑based infrastructure, offering clear guidance on what assessments look like for these modern setups. This quick overview gives you practical advice on what to expect from both types of assessment under the Cyber Essentials scheme.  

This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.

As cyber threats intensify, understanding the fundamentals has never been more important.

This short video provides an overview of the UK government-backed Cyber Essentials scheme.  We break down what the scheme is and how it works, the steps to certification, as well as sharing some key facts and statistics that explain its growing popularity and relevance in the current cyber landscape.  This quick guide gives you a fast, accessible introduction to one of the UK’s most widely adopted cyber security standards.

This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.

Think your organisation would spot a cyber breach before it’s too late? This short video reveals why so many businesses still fall victim to attacks. Our experts break down the most common threats, the human errors and weak processes that help attackers succeed, and the simple steps that can make your business more secure.  This overview gives you a clear picture of today’s cyber risk landscape and what you can do to stay ahead.

This clip is taken from URM’s webinar on Building Cyber Resilience – Practical Steps for Reducing the Likelihood and Impact of a Cyber Breach.

Data Protection
Published on
5/3/2026
Data Protection Interpretation Affirmed by the Court of Appeal in DSG Retail Case

URM’s blog unpacks the DSG vs. ICO case, how it reached the Court of Appeal, & the Court’s decision on the status of pseudonymised data in the hands of attacker

Information Security
Published on
20/2/2026
Information Security Risk Assessment and Treatment: Understanding Relevant Risks

URM’s blog explains the building blocks of information security risk, outlining how risks can be valued and prioritised, the role of rise appetite, and more.

Data Protection
Published on
16/2/2026
Managing DSARs and Other Data Subject Rights

URM’s blog explores how DSARs can be used to drive improvements, and share our insights on managing other data subject rights efficiently and effectively.

Cyber Security
Published on
12/2/2026
NHS Cyber Security Open Letter: What Does it Mean for Suppliers?

URM’s blog explains the recent open letter to suppliers issued by the NHS, what it means, why it matters, and the practical steps you can take to prepare.

Cyber Security
Published on
4/2/2026
The Core Functions of NIST CSF: Identify

URM’s blog unpacks the Identify Function of the NIST CSF, providing a detailed breakdown of its requirements and what you need to do to meet them.

Data Protection
Published on
26/1/2026
Analysis of Enforcement Action by the ICO in 2025 – Actions Way Down, Security Data Breach Fines Way Up

URM’s blog analyses the ICO’s enforcement action in 2025, highlighting surprising trends in its approach to enforcing compliance with data protection law.

Data Protection
Published on
16/1/2026
Ten Top Tips for Achieving GDPR Compliance

URM provide ten actionable top tips that will allow you to take significant steps forward in your compliance journey.

Cyber Security
Published on
16/1/2026
Minimising the Impact When a Breach Occurs

URM’s blog explores the importance of cyber resilience & the steps organisations can take to prepare for and mitigate the impact of a cyber incident.

Cyber Security
Published on
8/1/2026
Strengthening Your Cyber Defences: Practical Steps for Every Business

URM’s blog explores common weaknesses in organisations’ security programmes, & outlines practical, cost-effective measures to reduce the likelihood of a breach

Information Security
Published on
16/12/2025
ISO 27001 Control 8.17: Why Clock Synchronisation Is Critical for Security and Conformance

Read URM’s blog, where we explore the importance of clock synchronisation for cyber security and resilience, and how to meet the requirements of Control 8.17.

Data Protection
Published on
5/12/2025
Are Business Emails in Scope of Employee DSARs?

URM’s blog explores the ICO’s guidance on business emails in DSARs & examine the implications of a recent ruling on the subject by the French Court of Cassation

Other Standards
Published on
24/11/2025
ISO 13485 and Beyond: Key Updates Shaping the Medical Device Regulatory Landscape

URM’s blog explores key updates to medical device standards, regulations & guidance documents, helping manufacturers understand what’s coming & how to prepare.

Should it be required, we can also manage your full ISO 27001 internal audit process and would welcome the opportunity to discuss your requirements with you.
Find out more
"
We engaged URM to help us complete our annual Cyber Essentials Plus certification. They have a great infrastructure and skillset to support the Cyber Essentials program and made the whole process painless for us. It’s a great way for businesses to give themselves a good security health check and in doing so spot any weak points in their IT infrastructure. URM are then perfectly placed to advise on how to fill those gaps for a robust IT / IS policy structure. In summary it’s a great way to show your customers your commitment to cyber security and ultimately keeping their data safe.
Sales engagement platform
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.