Skip to content
Salus Cyber


Cyber Essentials Basic

Become Cyber Essentials accredited.

Salus Cyber’s consultants have experience with advising and auditing Cyber Essentials accreditation with both large and small companies in a variety of industries.

Our consultants are experts in their field, holding Crest and Cyber Scheme certifications and possessing extensive technical experience. With credentials like CISSP and CISMP, they bring valuable advisory and auditing expertise to support your organisation’s security objectives.


Cyber Essentials Basic is an industry-recognised cybersecurity certification backed by the UK Government and supported by the National Cybersecurity Centre (NCSC). It sets a standard for organisations to adhere to essential cybersecurity principles, ensuring robust protection against common cyber threats. By obtaining the Cyber Essentials Basic certificate, your business can showcase its commitment to implementing best cybersecurity practices and mitigating the risk of potential attacks.


  • Access Control: Implementing proper access control measures ensures that only authorised individuals have access to sensitive data and systems. This involves setting up user accounts with appropriate privileges, using strong passwords or multi-factor authentication, and regularly reviewing access rights for employees.


  • Firewalls and Routers: Firewalls act as a barrier between your internal network and the internet, controlling incoming and outgoing network traffic. Routers, on the other hand, enable secure communication between different network segments while enforcing network traffic rules.


  • Malware Protection: Implementing robust anti-malware software and keeping it up to date to detect and prevent various types of malicious software, including viruses, ransomware, and spyware. Regular scans and real-time monitoring can help identify and mitigate potential malware threats.


  • Secure Configuration: Ensuring that your systems and software are securely configured helps reduce the risk of vulnerabilities and unauthorised access. This includes applying the principle of least privilege, disabling unnecessary services and protocols, securing administrative accounts, and using secure configurations for devices, applications, and operating systems.


  • Software Updates: Keeping your software up to date with the latest security patches is essential for addressing known vulnerabilities. Regularly applying software updates and patches help protect against potential exploits and reduce the risk of successful attacks.


Free automatic cyber insurance upon completion of a self-assessed certification (up to £25,000 limit of indemnity). The policy liability amount also covers you against extortion demands and ransoms, emergency costs following a breach, loss of electronic data and any other business interruption.


One of the benefits of Cyber Essentials certification is access to a 24-hour helpline, which offers valuable support in crisis management and incident response, ensuring that organisations have immediate assistance and guidance during critical cybersecurity incidents.


Organisations can face the challenge of a lack of resources needed to effectively implement Cyber Essentials controls, such as adapting networks and existing investments to comply with the standard. L


Organisations often struggle with the challenge of maintaining visibility into the patching status of their internal systems and devices. Our experienced team conducts thorough assessments, verifying the presence of the latest security patches and updates. By providing detailed reports and insights, we enable organisations to gain a clear understanding of their patching gaps and vulnerabilities.

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back