Additional guidance information

How and where to buy software

About malwareWhat is malware?  Malware is short for malicious software, which is software that is designed to cause harm by disrupting, damaging or gaining access to a computer, without the owner's knowledge. Malware typically consists of code developed by cyber...

read more

About VPNs

About VPNsWhat is a VPN? A virtual private network is a technology that allows a secure and private connection on the internet. Why do I need a secure and private connection on the internet? A regular internet connection is at risk of being tracked, intercepted and...

read more

Guidance to BYOD

Guidance on Bring Your Own Device (BYOD)What is Bring Your Own Device?  Bring Your Own Device (BYOD) is a widespread term for when a company allows employees to use their own laptops, tablets or phones for work purposes. In addition to mobile or remote devices owned...

read more

About remote/home working

About remote / home workingWhat is remote or home working? Remote working is the practice of an employee working at their home, or in some other place that is not an organisation's usual place of business. Anyone working from home for any amount of time is classified...

read more

The value of passwords

The value of passwords and how to strengthen your access controlPassword fatigue A password is the access key to almost every digital device and online account you use. In today's digital world, the average person has between 70-130 online accounts that require...

read more

About size of your school

About size of your school What is the size of your school or college? This question applies to the size of the organisation that you are presenting for certification. That might be just one school, or it might be a Multi-Academy Trust (MAT). For the purposes of the...

read more

About the cloud

About the cloudThe cloud is a term used for a series of remote access services that exist on the internet. When you access services or store information in the cloud, they are not located on your own personal device (e.g. the hard drive on your laptop, your phone or...

read more

About phishing

About phishingLike many cyber attacks, phishing targets many people at the same time, but what is unique to phishing is that the attacker seeks to trick or con their victims into revealing sensitive information. This may take the form of an email, where the cyber...

read more

About accounts

About accountsPeople who work in offices, or who share their computers, may already be familiar with separate user accounts on their computers. Separate accounts ensure accurate authentication and accountability. How else can you track and control who accesses the...

read more

About scope of evaluation

About scope of evaluation The scope of your evaluation Cyber Essentials is suitable for businesses of all sizes Certifying your whole organisation Certifying only part of your organisation Boundary of scope IT equipment that does not connect to the internet Home...

read more

About malware

About malware What is malware? How does malware get onto my device? Protect your laptops, servers and desk top computers with malware protection software Protect mobile devices Manufacturer approved software What is malware? Malware is short for malicious software,...

read more

About password creation

About password creationPasswords are important Just think for a minute of your front door key. How many different doors does this key open? Would you be happy using a universal key to get into your house? Passwords are just like that unique key, they are an effective...

read more

About routers

About routersAbout networks and routers A network is a collection of devices that can communicate with each other. A network can vary in size and complexity; it can range from something as small as your 'home network' – all the devices you have connected to your WIFI...

read more