Homepage hero image

Get Accredited with Chess

Cyber Essentials
Showing You're Serious About Cyber

How can you demonstrate to your customers and your prospects that their financial, personal and company data is safe in your hands? With recent government figures revealing that breaches or attacks have been identified in almost a third of UK businesses in the last year, customer concerns about the security of their data has never been higher.

A UK Government Cyber Essentials accreditation provides reassurance that you are taking proactive steps to combat cybercrime. It gives you a clear indication of how well armed you are against cyber threat — and it’s increasingly a mandatory requirement when tendering for new contracts.

Chess — Your Cybersecurity Partner

Chess are acknowledged experts in the assessment of threat and vulnerabilities in IT estates. As a Certification Body for the Cyber Essentials scheme, we’re able to offer the same level of expertise to businesses of all sizes and sectors.  

IASME & CREST Accreditation

We provide Cyber Essentials and Cyber Essentials Plus under the IASME consortium, the official government partner.

We’re also certified by CREST which demands stringent standards, including appropriate levels of quality assurance processes; security controls; security assessment methodologies meeting CREST’s additional qualification criteria; signing of an enforceable Code of Conduct and proven access to technically competent, qualified staff.

Percentage of businesses identifying breach or attack in 2018
Average increase in cost of a cyber attack year on year
A UK small business is successfully hacked every 19 seconds
Certification Explained

Cyber Essentials

Around 80% of the most common cyber attacks can be prevented through the implementation of straightforward, affordable measurements that form the Cyber Essentials Scheme. The self assessment process provides a framework for ensuring the five key technical controls are correctly in place. Chess will audit the assessment, provide an external vulnerability scan and can also, if required, provide additional consultancy to drive a successful outcome.

Cyber Essentials Plus

Businesses are required to achieve Cyber Essentials before moving on to Cyber Essentials Plus. Due to the enhanced controls that are required for CE+, additional consultancy can be arranged including a pre-audit gap analysis to enable you to assess and implement any measures identified as key to a successful accreditation process.

Cyber Essentials Plus verification in carried out both on-site and remotely by Chess CyberSecurity specialists. 

Cyber Checklist
How Cyber Savvy Are You? Our 25 Cyber Must Knows.

Download this government checklist to reveal how ready you are to fight off a cybercrime attack.

Download Now
The Five Cyber Essentials Technical Controls

Secure Your Internet Connection

Creating a buffer between your IT network and other external networks, a firewall protects your internet connection, analysing incoming traffic to identify whether access should be allowed to your network.

Cyber Essential Certification Requirement

A firewall must be configured and used on all devices, particularly those connected to public or untrusted Wi-Fi networks.

Secure Configuration

Default configurations of new software and devices are set to be as easy as possible to connect and use, which creates vulnerabilities if left unchanged. Settings should be checked, disabling and removing unneccessary fucntions and services, while default passwords should be updated before deployment. 2FA (Two-factor authentication) should be used for the most data sensitive accounts.

Cyber Essential Certification Requirement

Only necessary software, accounts and applications are used.

User Access Control

In allowing access to those — and only those — accounts (software, settings, services and functions) that your people need in their specific job role, the risk of potential damage can be minimised.

Cyber Essential Certification Requirement

Access to your data must be controlled through user accounts, with controlled administration level privileges given only to your people who specifically need them.

Malware Protection

Malware — including ransomware and viruses — comes from a range of sources, including infected email attachments or USB memory sticks. Anti-malware measures are included within the most popular operating systems. Malware can be introduced to a network when a rogue application is downloaded, so white listing, giving users the ability to install and run only applications authorised by the administrator, offers good protection. Sandboxing, running an application in an environment with restricted access to the rest of your devices and network, helps keep your data beyond the reach of malware.

Cyber Essential Certification Requirement

At least one approach, anti-malware measures, whitelisting or sandboxing must be implemented.

Keep Your Devices and Software Up To Date

Operating systems and applications become vulnerable if they are not up kept to date. In order for patches, whether new features or fixes to security vulnerabilities, to be applied, your operating systems, programmes, phones and apps should be set to "automatically update" where possible. When no longer supported, systems and applications should be considered for replacement.

Cyber Essential Certification Requirement

Devices, software and apps must be kept up to date.

Cyber Essentials Datasheet
Showing You're Serious About Cyber

Chess: Your Cybersecurity partner

Download Datasheet


Cyber Essentials Knowledge

Trusted cloud security suppliers we're proud to work with.
Solutions that help keep your cloud secure.
NMN chess 29 sept 2016_6815.jpg
Enhance the security of your applications, devices and systems with Two-Factor authentication. 2FA enables users to confirm their identity by presenting evidence to an authentication mechanism.
Cloud Apps
Most of your employees have adopted the cloud. Cloud-based apps like Office 365, Dropbox and Salesforce need protection to prevent account-centric threats, meet compliance requirements and protect critical data.
Cloud Infrastructure
Deliver enterprise-level hosting services with a 100% uptime guaranteed SLA to businesses of all sizes including public sector - our data centre is located in the UK.
For Public Sector
Data Sharing
CESG certified on-demand security for organisations wishing to share confidential information electronically.
NMN chess 19 sep 2016_43.jpg
DDoS Protection
Denial-of-service attacks are on the rise since they've become a commodity on the Darknet and IoT allowing for easier botnet creation. DDoS mitigation solutions and attack prevention has never been more important.
Virtual Private Networks are now a necessity in today's modern workplace. Chess can help you find the right VPN technology to help your business grow and yet remain as secure as ever. Select from a full range of VPN technologies for secure site-to-site and remote access.