Skip to main content

Cyber Essentials

Small Business Security Cyber Essentials Cyber Security GDPR Cyber Security Fundamentals Ransomware Small Business Threat Intelligence SMB Security SOC in a Box Development Diary Phishing UK Cyber Security Data Breach NCSC Compliance Managed SOC Supply Chain Data Protection AI Security Sector Analysis DSPT UK Compliance Podcast Supply Chain Security Cyber Threats CQC NHS Data Security ICO Risk Management Email Security Access Control Third-Party Risk Patch Management IoT Security UK Business Manufacturing Cyber Defence Passwords Qilin SOC Threat Detection SOC as a Service MFA Accountancy Cyber Security ICAEW Dental Cyber Security Engineering Cyber Security GP Surgery Cyber Security IFA Cyber Security Law Firm Cyber Security SRA Retail Cyber Security PCI DSS School Cyber Security Veterinary Cyber Security Healthcare Security Governance Cloud Security Business Continuity Inside the Box Business Email Compromise UK Small Business IPInsights Threat Landscape Malware Clop Cyber Essentials Plus Certification Deception Technology Security Operations Centre Network Security Social Engineering Defence Supply Chain AML Consulting Cyber Security Wealth Manager Security Operational Resilience E-commerce Security GDPR Retail MAT Cyber Security GDPR Schools Safeguarding RCVS Security Operations Board Reporting Data Loss Prevention Incident Response Managed Security Cyber Insurance Cyber Risk Getting Started Customer Data Travel Industry Adobe Vulnerability Online Safety UK Regulation AI Abuse SaaS Risk Fleet Management Kill Chain Fortinet APT28 Payment Fraud Invoice Fraud Browser Security Data Privacy BrowserGate Small Business Cyber Security OT Security Industrial Control Systems Critical Infrastructure PLC Security Website Security Domain Hijacking WordPress Security Router Security DNS Hijacking Smart Devices Financial Impact Weekly Roundup AI Threats Banking Security Cyber Essentials Certification Q1 2026 Dragonforce Security Engineering Threat Monitoring Honeypots AI & SOC AI SOC Analyst Job Description SOC Analyst AI Security Careers Cyber Security Jobs Digital Sovereignty Payments Made in Britain Supply Chain Risk Password Safety Signal WhatsApp Business Communications Messaging Security Supply Chain Attack Docker Kubernetes Credential Theft Open Source Security DevOps Security Practice Security Financial Data Protection Government Procurement DCPP HMRC Agent Security IP Protection NHS Security FCA Conveyancing Fraud DfE Standards DfE Cyber Standards Safeguarding Data Ofsted FCA Compliance SM&CR GDPR Financial Services ACCA Practice Compliance FCA Cyber Security Financial Services Security Card Payment Security Academy Cyber Security Education Sector Security Legal Compliance UK Certification Card Payment Compliance Legal Sector Security Cyber Attacks AI Driven Threat Analyst Threat Hunting Cyber Threat Intelligence AI Security Operations Analyst AI SOC AI SOC Analyst Cyber Security Automation Cyber Essentials Cambridge Cambridge Cyber Security Silicon Fen Cyber Essentials Certification UK Cyber Essentials Cost Cyber Essentials Pricing SOC for SMB Microsoft 365 BEC Fraud Financial Fraud OSINT Reconnaissance Attack Surface Construction Sector DLP Cyber Attack Crisis Management Insider Threats User Behaviour Multi-Factor Authentication Holiday Period Attacks Dark Web 2025 Annual Report Global Cyber Security RaaS Cyber Security Policy Security Costs SOC as a Saving MDR Antivirus Cyber Security Basics Lessons Learned Deployment Onboarding Confidence Score Analyst Model Service Design DecoyPulse EmilyAI SOC365 Detection Engineering Hardware Product Design Platform Update Security Checklist Risk Assessment Remote Working Hybrid Working VPN Security Awareness Staff Training Least Privilege User Management Physical Security Clean Desk Mobile Security BYOD MDM Web Security Safe Browsing DNS Filtering DMARC Wi-Fi Security Firewalls Software Updates Vulnerabilities Backups Ransomware Recovery Password Manager Asset Management
Podcast 10 April 2026 18 min listen

Inside the Kill Chain: How One Phish Led to Full Network Compromise — Ep.2

Episode 2 of Inside the Box: a real pen test mapped to the Kill Chain, Fortinet zero-days, LiteLLM supply chain attack, APT28 router hijacking and more.

Podcast Inside the Box Kill Chain
Listen now
Article 9 April 2026 9 min read

Your Factory Floor PLC Might Be Internet-Exposed — And You Don't Even Know It

Iran-linked hackers are targeting internet-exposed PLCs in factories and utilities. Learn why your operational technology might be at risk and how to protect it.

OT Security Industrial Control Systems Cyber Essentials
Read article
Article 6 April 2026 25 min read

The True Cost of Cyber Essentials

The True Cost of Cyber Essentials. From £320, right? Wrong. We take a real 10-person UK business through certification and the cost is actually £13k to £30k.

Cyber Essentials Cyber Security Small Business
Read article
Article 1 April 2026 8 min read

The Mercor AI Breach: What Every Small Business Owner Needs to Learn

The Mercor AI breach exposed 4TB of sensitive data. We break down what went wrong and how UK small businesses can avoid the same fate using Cyber Essentials.

Cyber Essentials Data Breach Supply Chain Security
Read article
Article 31 March 2026 10 min read

Cyber Essentials Certification: What It Is & How to Get Certified

Cyber Essentials Certification explained for UK small businesses. Learn the five controls, costs from £320, the 2026 changes, and how to get certified step by step.

Cyber Essentials Cyber Essentials Certification Small Business Security
Read article
Article 29 March 2026 9 min read

Cyber Essentials: What It Is, Why It Matters, and How We'll Get You There

Peter Bassill explains Cyber Essentials and Cyber Essentials Plus — and walks you through exactly what our Security Engineering team does to get your business certified.

Cyber Essentials Cyber Essentials Plus Certification
Read article
Article 25 March 2026 5 min read

Even HackerOne Gets Caught Out by Supply Chain Risk

HackerOne's staff data was exposed via a supplier BOLA flaw for weeks before anyone was told. The lesson isn't about them — it's about you.

Supply Chain Risk Data Breach Third-Party Risk
Read article
Article 25 March 2026 10 min read

Practical Cyber Security for Small Businesses: A No-Jargon Guide for UK Business Owners

A plain-English guide to practical cyber security for UK small businesses. Real threats, real costs, and the straightforward steps every SMB owner can take today.

Cyber Security Small Business UK Business
Read article
Article 23 March 2026 9 min read

Cyber Essentials April 2026: Every Change You Need to Know Before 26 April

The Cyber Essentials scheme changes on 26 April 2026. New auto-fail rules for MFA and patching, tighter CE+ testing, revised scope requirements, and the Danzell question set. Here is exactly what changes and what you need to do.

Cyber Essentials Cyber Essentials Plus NCSC
Read article
Article 22 March 2026 8 min read

Cyber Essentials, Defence Supply Chain and Procurement: What Engineering Firms Need to Know

Cyber Essentials is required for UK government and defence supply chain contracts. This guide covers what engineering firms must know.

Engineering Cyber Security Cyber Essentials Defence Supply Chain
Read article
Article 22 March 2026 10 min read

Cyber Security for Accountancy Practices: The Complete Guide

The complete cyber security guide for UK accountancy practices. Covers HMRC credentials, payroll protection, AML security and backups.

Accountancy Cyber Security ICAEW GDPR
Read article
Article 22 March 2026 10 min read

Cyber Security for Dental Practices: The Complete Guide

The complete cyber security guide for UK dental practices. Covers practice management systems, NHS DSPT, imaging and patient data protection.

Dental Cyber Security Small Business Security DSPT
Read article