Protecting Digital Assets,
and Business Reputations.

Data is the lifeblood of any organisation, big and small.

Assess, Report, Improve & Certify... to Power Growth

Cyber Essentials Program - Maturity Level 1

Protecting your business from cyber attacks is more important than ever, but it can be hard to know where to start. 

According to a study by IBM, 60% of businesses that suffer a cyber attack are out of business within six months.

Our Cyber Essentials Program is modelled on the ACSC’s Essential 8, and provides a comprehensive first step in protecting your business from cyber attacks. This program provides the tools and knowledge base to identify, protect, detect, respond and recover from a cyber breach.

How it Works

ALL PROGRAMS include access to a digital library of amazing tools & resources

This Program Includes

  • 8 Components
  • FREE Smart Self Assessment
  • FREE Risk Report: High-Med-Low
  • Action Management Module
  • Digital Library of Resources
  • 24/7 Access: Mobile & TV

Optional: Program Review & Certificate of Assessment​

Program Modules

1. Application control​

Managing and monitoring the software that is allowed to run on your computers and networks. It involves setting rules to ensure only safe and authorised applications are used. This helps prevent harmful or unauthorised software, like malware, from being installed and run, which could lead to data breaches or other security issues.

2. Patch Applications

Regularly updating your software with the latest patches. Patches are like small fixes released by software companies to repair security holes or bugs in their programs. By applying these patches, you can protect your systems from being exploited by hackers who take advantage of these vulnerabilities.

3. Configure MS Office Macros

Setting up rules and restrictions for using macros in Microsoft Office applications like Word, Excel, and PowerPoint. Macros are automated sequences that can perform tasks in these programs, but they can also be used maliciously to spread viruses or malware. By configuring macros correctly, businesses can prevent unauthorised or harmful macros from running, reducing the risk of cyber threats that exploit these features.

4. Application Hardening​​

Making software more secure by changing settings and disabling unnecessary features. It's about strengthening applications against attacks by removing or limiting functions that could be exploited by hackers, like web browser plugins or certain script executions. This process reduces the number of ways a cyber attacker can break into the system through these applications.

5. Administration Privileges

Carefully controlling who has the power to make significant changes to your computer systems. This includes managing who can install software, access sensitive data, or change system settings. The idea is to limit these special privileges to only a few trusted employees and to use them only when necessary. This reduces the risk of accidental or malicious changes that could harm the system or expose sensitive information.

6. Patch Operating Systems​

Regularly updating the core software that runs your computers and servers. Operating systems, like Windows or MacOS, often release updates or 'patches' that fix security holes and bugs. Keeping these systems up-to-date is crucial because many cyber attacks target outdated operating systems.

7. Multi Factor Authentication​

Using more than one way to verify a person's identity before giving them access to computer systems or online accounts. Instead of just a password, MFA might ask for a code sent to a phone, a fingerprint, or a face scan. This makes it much harder for someone who isn't supposed to have access, like a hacker, to get in, even if they know the password.

8. Regular Backups

Consistently copying and storing important data and files in a separate location. This can be done on different physical devices or in the cloud. The idea is that if something goes wrong, like a cyber attack, system failure, or data corruption, you can restore its information from these backups.

Download the eBook

Disclaimer 🤚

We’ve put our heart and soul into building something to help millions of Startups & SMEs around the world.

We’ve done a lot right and made mistakes along the way, cause no one ever said #RegTech or startup risk management was easy.
Rest assured we are leveraging the brightest minds, deepest resources, connected partnerships and hunger for growth to develop a better product every day for you.

With that being said… In no event shall CertifiedBy, its affiliates, partners, or licensors be liable for any direct, indirect, incidental, special, consequential, or punitive damages, including but not limited to, lost profits, lost data, business interruption, or other losses arising out of or in connection with the use of, or inability to use, the CertifiedBy platform or any content, advice, or recommendations generated by the platform.