{"id":10161,"date":"2022-04-19T14:52:41","date_gmt":"2022-04-19T14:52:41","guid":{"rendered":"https:\/\/cyber-fortified.com\/m\/?page_id=10161"},"modified":"2022-05-02T17:39:48","modified_gmt":"2022-05-02T17:39:48","slug":"cyber-essentials","status":"publish","type":"page","link":"https:\/\/cyber-fortified.com\/m\/cyber-essentials\/","title":{"rendered":"Cyber Essentials"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10161\" class=\"elementor elementor-10161\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-04810a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"04810a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7dc90fa jltma-glass-effect-no\" data-id=\"7dc90fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b58d5d9 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"b58d5d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1193\" height=\"645\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1457016287-red.jpg\" class=\"attachment-full size-full wp-image-10166\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1457016287-red.jpg 1193w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1457016287-red-300x162.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1457016287-red-1024x554.jpg 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1457016287-red-768x415.jpg 768w\" sizes=\"(max-width: 1193px) 100vw, 1193px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51fe804 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"51fe804\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-672530b jltma-glass-effect-no\" data-id=\"672530b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-731e1ab jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"731e1ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Cyber Essentials Scheme<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-424218a elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"424218a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b966735 jltma-glass-effect-no\" data-id=\"b966735\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc11110 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"bc11110\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyber Essentials: Overview<\/strong><\/p><p>Cyber Essentials is a Government-backed, industry-supported scheme to help organisations protect themselves against common online threats.<\/p><p>Cyber Essentials is suitable for all organisations, of any size, in any sector.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-99dadeb jltma-glass-effect-no\" data-id=\"99dadeb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3737873 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"3737873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"240\" height=\"210\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/cyber-essentials.png\" class=\"attachment-large size-large wp-image-10167\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3214feb elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"3214feb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67c31b0 jltma-glass-effect-no\" data-id=\"67c31b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b62b731 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b62b731\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Why should your organisation consider Cyber Essentials certification?<\/strong><\/p><p>Cyber Essentials is a great way for organisations to build a basic risk management system into their infrastructure. The scheme creates an effective and affordable opportunity for organisations to bring their systems, their workforce and their processes up to industry best standard.<\/p><p>Added to that, if your organisation regularly (or are considering) tendering for public authority or governement contracts, the Cyber Essentials scheme is often a prerequisite for those bids.<\/p><p>Lastly, having the Cyber Essentials logo on your website and all of your marketing not only enhances your organisation&#8217;s reputation but gives your clients confidence in you and your services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7103db7 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"7103db7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-34116e7 jltma-glass-effect-no\" data-id=\"34116e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f0530a jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"0f0530a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyber Essentials will&#8230;<\/strong><\/p><ul><li>Reassure customers\/clients that you are working to secure your IT against cyber attack.<\/li><li>Attract new business with the promise you have cyber security measures in place.<\/li><li>Give a clear picture of your organisation\u2019s cyber security level.<\/li><li>Grow business as some Government contracts require Cyber Essentials certification.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dc5a356 jltma-glass-effect-no\" data-id=\"dc5a356\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b1580fa jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"b1580fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/elementor\/thumbs\/enhance-new-nzqmw1hw1a48e47lyolgkmzm4vibmfpey8ljbt1f7o.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-92bef93 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"92bef93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56ce7d1 jltma-glass-effect-no\" data-id=\"56ce7d1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f95b669 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"f95b669\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How do we help you achieve Cyber Essentials certification?<\/strong><\/p><p>Cyber Fortified project manage the entire process.<\/p><p>We help organisations achieve the necessary standards, provide the appropriate evidence and assist demonstrate suitability for the Cyber Essentials scheme. Throughout the auditing process, you will have access to our entire support team, as well as our lead auditors.<\/p><p><strong>How long does the auditing process last?<\/strong><\/p><p>As with any auditing and certification process, a lot will depend on your organisation and the availability of your key staff.<\/p><p>We will normally advise a 2-4 weeks period, to complete the audit in full.<\/p><p>Ultimately, the key to any certification preparation is to work methodically through the standard and only go for certification once everything is in place. Historically, too many companies rush to get certification and this results in an unnecessarily and avoidable costly mistakes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6749f53 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"6749f53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ee1b533 jltma-glass-effect-no\" data-id=\"ee1b533\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddcff7e jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"ddcff7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Next Steps<\/strong><\/p><p>We always recommend a scoping call to discuss the company and how we move forward with the audit and where you can ask our team any questions ahead of starting the auditing work.<\/p><p><span style=\"text-decoration: underline;\">Please use the booking calendar, below, to schedule your scoping call:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ccf1be elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"4ccf1be\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64b6af4 jltma-glass-effect-no\" data-id=\"64b6af4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b6cbdc jltma-glass-effect-no elementor-widget elementor-widget-html\" data-id=\"3b6cbdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/cyberfortified\/scoping-call-cyber-essentials-scheme?hide_gdpr_banner=1\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Essentials Scheme Cyber Essentials: Overview Cyber Essentials is a Government-backed, industry-supported scheme to help organisations protect themselves against common online threats. Cyber Essentials is suitable for all organisations, of any size, in any sector. Why should your organisation consider Cyber Essentials certification? Cyber Essentials is a great way for organisations to build a basic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10161","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/comments?post=10161"}],"version-history":[{"count":27,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10161\/revisions"}],"predecessor-version":[{"id":10710,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10161\/revisions\/10710"}],"wp:attachment":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/media?parent=10161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}