ao link
Business Reporter
Business Reporter
Business Reporter
Search Business Report
My Account
Remember Login
My Account
Remember Login

Cyber Essentials has changed; now the real work begins

Richard Ford at Integrity360 describes how the UK’s basic cyber-security certification has changed, why the rules are tightening now, and what companies need to fix urgently to avoid being caught out

Linked InXFacebook

From today, Cyber Essentials is tougher. The requirements are clearer, the expectations higher, and the scrutiny stronger. On paper, that’s progress. But the real story isn’t the framework. It’s what the changes reveal about how organisations actually operate.

 

Cyber Essentials was always designed as a baseline. A way to establish basic security hygiene across UK organisations. That still holds. What has changed is the environment it sits within.

 

The threat landscape Cyber Essentials was built for no longer exists

 

Organisations now operate across cloud platforms, with identity as the primary control layer and attackers focused on exploiting access rather than breaking through defences. Ransomware has shifted from opportunistic crime to a structured, disruptive threat that can impact operations within hours.

 

The April 2026 update reflects this shift. Mandatory multi-factor authentication across all cloud services, faster patching timelines, tighter scoping, and a stronger focus on backup integrity are all aimed at closing the gaps attackers routinely exploit.

 

These are not new ideas. They are controls most organisations already recognise as important. The difference is that they are now being enforced more rigorously. And that is where the challenge begins.

 

Most organisations do not fail because they lack controls. They fail because those controls are not applied consistently. A policy exists, but enforcement varies. A system is patched, but another is missed. Access is restricted in one area, but left open in another.

 

Cyber Essentials does not remove that problem; it exposes it

 

Take patching as an example. The new requirement to address critical vulnerabilities within 14 days reflects how quickly attackers now move. In many cases, exploitation begins within hours of a vulnerability becoming public.

 

But patching at that speed requires more than awareness. It requires clear visibility of assets, ownership of systems, and processes that can operate without delay. Many organisations are still working with incomplete inventories and fragmented responsibility. They cannot fix what they cannot see.

 

The same applies to identity. Extending multi-factor authentication across all cloud services is a logical step, given the rise in credential-based attacks. But for many organisations, this raises an immediate question. How many services are actually in use, and who has access to them?

 

Without a clear answer, enforcement becomes inconsistent. And inconsistency is where risk sits. This is why the latest update matters. It moves Cyber Essentials away from a documentation exercise and towards a test of operational discipline.

 

Stronger moderation will reduce variation in how the standard is applied. Clearer scoping rules will limit the ability to exclude critical systems from assessment. More rigorous testing in Cyber Essentials Plus will make it harder to rely on short-term fixes or partial implementation.

 

Together, these changes increase confidence in the scheme. They also increase pressure on organisations. Certification is no longer just about demonstrating intent. It is about proving that controls are working, consistently, across the environment. That is a higher bar than many expect.

 

For organisations that already hold Cyber Essentials, this is not about starting again. It is about validating what is already in place and addressing gaps that may have gone unnoticed. For those approaching certification for the first time, the expectation is clearer, but also more demanding.

 

What remains consistent is the role Cyber Essentials plays. It is not, and has never been, a complete security strategy, but rather a foundation. So, the risk therefore comes when that foundation is mistaken for the finished structure.

 

Too often, certification is treated as a destination. A badge that signals security has been addressed. In reality, it is the starting point for building resilience.

 

The organisations that benefit most from Cyber Essentials are those that use it to drive behaviour. They use it to establish ownership, enforce consistency, and create visibility across systems and users. They treat it as a mechanism for improving how security operates day to day.

 

Those that approach it as a compliance exercise tend to focus on passing the assessment, rather than strengthening the environment. The result is a gap between what is documented and what actually happens in practice. That gap is where incidents occur.

 

A missed patch, an exposed account, or an untested backup does not remain isolated. It becomes the entry point for wider compromise. In the case of ransomware, that can mean disruption to services, loss of data, and significant financial and reputational impact.

 

This is the reality the updated Cyber Essentials framework is trying to address. It raises the standard, but it does not remove the need for execution. For most organisations, meeting the new requirements will not depend on deploying new technology. The controls are already familiar. The challenge is applying them consistently, at scale, and under pressure.

 

That requires discipline, ownership, and a clear understanding of the environment. It also requires a shift in mindset. Security is no longer about having the right controls in place. It is about how reliably they operate when tested. Certification can support that, but it cannot replace it.

 

The April 2026 update is a step forward. It brings Cyber Essentials closer to the realities organisations face and strengthens its value as a baseline. But it also sharpens the question every organisation should be asking. Not whether they meet the standard, but whether their controls would hold up under real-world conditions, because that is the measure that ultimately matters.

 


 

Richard Ford is CTO of Integrity360

 

Main image courtesy of iStockPhoto.com and Alexander Sikov

Linked InXFacebook
Business Reporter

Winston House, 3rd Floor, Units 306-309, 2-4 Dollis Park, London, N3 1HF

23-29 Hendon Lane, London, N3 1RT

020 8349 4363

© 2025, Lyonsdown Limited. Business Reporter® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543