View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
July 23, 2018updated 07 Jul 2022 5:32am

How to Get the Most out of Cyber Essentials

Too few UK companies are aware of the government's Cyber Essentials scheme, says Duncan Bradford, CTO Northern Europe from CA Technologies.

By CBR Staff Writer

The Cyber Security Breaches Survey 2018 showed once again that awareness of the Government’s cybersecurity resources is lacking. Four years after it was first launched, just nine per cent of businesses are aware of the Cyber Essentials scheme.

Why is awareness of this scheme so poor? The report found that organisations did not seek it out, as they had not expected the Government to provide information on cybersecurity, while others thought that Government information would not be tailored or not detailed enough for their needs.

CA Technologies just achieved the Cyber Essentials certification and, as we worked through its criteria, the programme surpassed my expectations as an effective cybersecurity resource. When applied strategically, Cyber Essentials is certainly more than another box to tick or badge to show suppliers.

So, how can organisations get the most out of the Cyber Essentials scheme?

Harnessing the Country’s Best Technical Expertise

Since launch four years ago, the Cyber Essentials scheme has continuously evolved to secure its relevance for organisations today. The National Cyber Security Centre has now taken a leadership role in providing the technical expertise for the programme, which ensures that it encompasses the county’s best technical insight and experience.

Having this expertise plugged in guarantees the continued relevance of the scheme. As a result, even organisations that already take cyber security and data protection seriously, can learn from and improve using the Cyber Essentials scheme.

Cyber Essentials: Take it Global

Many adopters of the Cyber Essentials scheme have missed a trick in purely achieving compliance in the UK. When assessing the Cyber Essentials process, CA made a strategic decision to seek certification for protection of our global customer base, rather than only for our UK-based customers.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Why? Firstly, cyber threats don’t recognise borders. The same threats facing our UK-based customers are faced by the rest of our global customer base too.

In addition, many of our customers are multinational corporations. And when you’re working to a benchmark maintained by some of the best cybersecurity experts in the country to secure local data, it makes sense to apply these security controls consistently to protect all of their sensitive data.

cyber essentialsSpeak the Same Security Language

Securing your own assets isn’t enough to secure your customers’ data. Cyber Essentials provides a great opportunity for companies to assure the security of the suppliers that either handle their data or have access to their network. In fact, eight per cent of businesses already require their suppliers to adhere to the Cyber Essentials scheme. And using this common framework provides a foundation for a common understanding with suppliers; supporting clear expectations of what the other must deliver.

Cyber Essentials also provides a useful framework for communicating a company’s security approach with their customers and regulators – both in the UK and globally. The security controls within Cyber Essentials can be clearly understood by a range of security practitioners and administrators.

This clarity not only avoids the unnecessary complexity added when using differing terminology and practices to discuss cyber threats and defences, it can help build confidence within customer and supplier ecosystems.

Addressing the 80/20 Challenge

The types of attacks that Cyber Essentials is designed to protect against are responsible for the vast majority of recent significant data breaches.

While many of the Cyber Essentials controls represent practical, strong cyber hygiene approaches, too many organisations are falling short when it comes to applying basic protections. Too many hacks are perpetrated through unpatched applications. Too many breaches are consistently elevated because organisations fail to implement proper identity and access management controls.

If organisations could shore up these common cyber defences, the cost curve for cyber attacks would bend significantly higher for the attackers, resulting in reduced likelihood of an incident.  Further, government departments and cyber threat information sharing partnerships could focus their resources on more advanced attacks, further bending the cost curve against attackers.

Too Good to Keep Quiet

While the Cyber Security Breaches Survey found awareness to be poor, the Cyber Essentials scheme is too good not to shout about. Whatever the size of your organisations, achieving the certification can significantly improve an organisation’s security posture. But protecting the few is not enough. I encourage all organisations to consider how the Cyber Essentials certification can help them implement strong, cybersecurity hygiene practices and strengthen trust in the digital economy.

See also: Bombshell Report Warns of Huawei Risk to UK’s Critical Infrastructure Security

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU