Cyber Essentials and Cyber Essentials Plus

Are you ready to enhance your organisations security,
prevent potential cyber attacks and win new customers?

Based in South Wales, Excellence IT can can help your business achieve Cyber Essentials Success!

Why should your organisation be Cyber Essentials certified?


  • Reassure customers that you are working to secure your IT against cyber attack
  • Attract new business with the promise you have cyber security measures in place
  • You have a clear picture of your organisation’s cyber security level
  • Some Government contracts require Cyber Essentials certification

What is Cyber Essentials?

  • A government scheme to make the UK a safer place for online business.
  • Part of the National Cyber Security Strategy and designed by the National Cyber Security Centre (NCSC).
  • Outlines Requirements for mitigating the most common Internet based threats.
  • Designed to be achievable by SME’s.
  • Gives practical controls to implement.
  • Involves a level of independent testing to give assurance of robust IT security to other parties (Cyber Essentials Plus).

What about Cyber Essentials Plus?

  • Same level of protection from the standard Cyber Essential certification are put in place

  • An extra hand-on technical verification is carried out to ensure advanced cyber security policies are compliant
  • Final re-assessment to confirm security level and meet standard requirements

Effective Cyber Security is based on 5 technical controls

Our experience as a Managed service Provider, ensures we have the experience and
knowledge to effectively protect your business

Patch Management

Software running on computers and network devices should be kept up-to-date and have the latest security patches installed.

Malware Protection

Devices that can access the internet should be protected against malware infection through the use of suitable malware protection software. ​

Secure Configuration

Computers and network devices should be configured to reduce the level of inherent vulnerabilities and provide only the services required to fulfil their role.

Boundary Firewalls and Internet Gateways

Information, applications and computers within the organisation’s internal networks should be protected against unauthorised access and disclosure from the internet, using boundary firewalls, internet gateways or equivalent network devices.

User Access Control and Permitted Authorisation

User accounts, particularly those with special access privileges (e.g. administrative accounts) should be assigned only to authorised individuals, managed effectively and provide the minimum level of access to applications, computers and networks.

Ready to get your organisation Cyber Essentials certified? Get in touch today for your free quotation