How is ISO 27001 Structured
Understanding how ISO 27001 is organised is essential for anyone looking to build a robust and conformant information security management system (ISMS). Its structure provides a clear framework designed to support consistency, alignment, and effective risk management.
In this short video, we break down the structure of ISO 27001, including its ‘Harmonized Structure’ used by other ISO management system standards, facilitating integration and alignment. We also explain the Standard’s Annex A, how it differs from the management system clauses, and the controls it contains.
This clip is taken from URM’s webinar on How to Achieve ISO 27001:2022 Certification.
What is ISO 27001?
Information security has become a critical priority for organisations seeking to manage risk and protect sensitive data. ISO 27001, the International Standard for Information Security Management Systems (ISMS’), provides a structured, globally recognised framework for achieving that goal.
In this short video, we give a high-level overview of what ISO 27001 is, the background and intention of the Standard, and explain the concept of ISMS. We also explore how the Standard relates to broader information security principles such as confidentiality, integrity and availability (CIA), and to adjacent subjects like cyber security and privacy protection.
This clip is taken from URM’s webinar on How to Achieve ISO 27001:2022 Certification.
How to Maintain Cyber Essentials and Cyber Essentials Plus Certification
When implementing a security framework such as Cyber Essentials, achieving certification is only the first step – compliance must be maintained, and the requirements made part of business-as-usual (BAU) operations.
In this brief video, we share our advice on ongoing compliance and the best practices that will allow you to maintain Cyber Essentials and Cyber Essentials Plus certification. In particular, we focus on the challenges associated with staying up to date with patching, and share the measures and processes you can put in place to ensure patch management remains consistent and compliant.
This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.
Preparing for Cyber Essentials and Cyber Essentials Plus Certification
Effective preparation for Cyber Essentials or Cyber Essentials Plus goes beyond simply understanding the scheme’s mandatory requirements – knowing what makes for a smooth and successful assessment, one that sets you up for straightforward ongoing compliance, is also critical.
In this short video, we share our top practical tips for achieving seamless certification to the scheme, as well as common self-assessment questionnaire (SAQ) mistakes that frequently trip up organisations. We also offer guidance on preparing for Cyber Essentials Plus, highlighting pitfalls our assessors often see during the hands‑on technical assessment and how to avoid them.
This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.
Cyber Essentials and Cyber Essentials Plus - 5 Technical Control Areas
To achieve Cyber Essentials certification, one of the first steps is gaining a solid understanding of the scheme’s requirements and how your organisation will meet them.
In this video, we explain Cyber Essentials’ five technical control areas (firewalls, secure configuration, security update management, user access control, malware protection), breaking down what you need to have in place for each control area. We also explore some common obstacles to meeting requirements and how these can be overcome. This guide gives you a clear introduction to the measures you’ll need to implement if you decide to certify.
This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.
What Are the Differences Between CE and CE Plus?
For organisations deciding whether Cyber Essentials or Cyber Essentials Plus is right for them, having a clear understanding of what each certification involves is essential.
In this short video, we break down how CE and CE Plus differ, outline the key steps involved in a CE Plus assessment, and explain what is and is not in scope for the audit. We also cover how CE Plus works in businesses with fully remote teams and cloud‑based infrastructure, offering clear guidance on what assessments look like for these modern setups. This quick overview gives you practical advice on what to expect from both types of assessment under the Cyber Essentials scheme.
This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.
What Are Cyber Essentials and Cyber Essentials Plus?
As cyber threats intensify, understanding the fundamentals has never been more important.
This short video provides an overview of the UK government-backed Cyber Essentials scheme. We break down what the scheme is and how it works, the steps to certification, as well as sharing some key facts and statistics that explain its growing popularity and relevance in the current cyber landscape. This quick guide gives you a fast, accessible introduction to one of the UK’s most widely adopted cyber security standards.
This clip is taken from URM’s webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.
The Current Cyber Threat Landscape
Think your organisation would spot a cyber breach before it’s too late? This short video reveals why so many businesses still fall victim to attacks. Our experts break down the most common threats, the human errors and weak processes that help attackers succeed, and the simple steps that can make your business more secure. This overview gives you a clear picture of today’s cyber risk landscape and what you can do to stay ahead.
This clip is taken from URM’s webinar on Building Cyber Resilience – Practical Steps for Reducing the Likelihood and Impact of a Cyber Breach.
URM’s blog breaks down key changes to the Cyber Essentials scheme coming into force on 27 April 2026, including the new Danzell Question Set.
URM’s blog outlines how continuous compliance fits into PCI DSS, and explores practical ways to integrate requirements into business-as-usual (BAU) operations.
URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.
URM’s blog explains recent amendments to the Cyber Security and Resilience Bill, how they align with broader regulatory shifts, & practical steps to prepare.
URM’s blog unpacks the DSG vs. ICO case, how it reached the Court of Appeal, & the Court’s decision on the status of pseudonymised data in the hands of attacker
URM’s blog explains the building blocks of information security risk, outlining how risks can be valued and prioritised, the role of rise appetite, and more.
URM’s blog explores how DSARs can be used to drive improvements, and share our insights on managing other data subject rights efficiently and effectively.
URM’s blog explains the recent open letter to suppliers issued by the NHS, what it means, why it matters, and the practical steps you can take to prepare.
URM’s blog unpacks the Identify Function of the NIST CSF, providing a detailed breakdown of its requirements and what you need to do to meet them.
URM’s blog analyses the ICO’s enforcement action in 2025, highlighting surprising trends in its approach to enforcing compliance with data protection law.
URM provide ten actionable top tips that will allow you to take significant steps forward in your compliance journey.
URM’s blog explores the importance of cyber resilience & the steps organisations can take to prepare for and mitigate the impact of a cyber incident.
URM is pleased to provide a FREE consultation on Transitioning to ISO 27001:2022 for any UK-based organisation.
Get practical guidance on how to prepare for and achieve Cyber Essentials and Cyber Essentials Plus certification, and protect your organisation against these attacks.
If uncertain, URM is able to conduct a high-level GDPR gap analysis which will assist you understand your current levels of compliance and identify gaps and vulnerabilities.
