IASME Cyber Assurance for 1 to 2 Person Organisations

IASME Cyber Assurance for 1 to 2 person organisations. Discover key requirements, benefits, and how to get certified for stronger cyber security.

Introduction You’re an organisation with 1 or 2 people and are looking for comprehensive cyber security protection, where do you go? Have you achieved Cyber Essentials and are looking for more? Are you considering ISO 27001 but think it’s too much for a micro organisation? This is where IASME Cyber Assurance comes in. It’s an […]

Beyond Cyber Essentials – IASME Cyber Assurance

Beyond Cyber Essentials – IASME Cyber Assurance

  Introduction With an ever increasing dependency on technology , information security is more critical than ever. Cyber Essentials can act as a great starting point for most organisations, but what’s next? In this blog, we explore how IASME Cyber Assurance goes beyond Cyber Essentials and can be a great step for organisations looking for […]

Cyber Essentials: Contractors

Learn how contractors fit into the Cyber Essentials scheme and what organisations must do to ensure compliance and secure access to data and systems.

Introduction With cyber-related incidents making headlines daily, cyber security is an ever-increasing priority for organisations. Cyber Essentials is often a great place to start, with the implementation of just five technical controls proving to be highly effective in reducing risks against common cyber threats. However, a challenging question that often arises is how to consider […]

Cyber Essentials: Difference Between a Cyber Advisor and Assessor

Difference Between a Cyber Advisor and Assessor

Introduction Due to the proven effectiveness of the Cyber Essentials controls, the scheme continues to grow. Almost 50,000 certificates were issued between March 2024 and April 2025. But who issues these certificates, and what happens when organisations need support implementing the controls? This is where IASME Assessors and NCSC Cyber Advisors come into play. In […]

Cyber Essentials Plus: Fixing Windows Unquoted Service Path Vulnerability

Learn how to identify and fix the Windows Unquoted Service Path vulnerability for Cyber Essentials Plus certification and stronger system security.

Introduction  As cyber threats continue to evolve, known weaknesses must be addressed quickly to avoid breaches, data loss, and ransomware attacks. Cyber Essentials Plus testing is aimed at identifying such weaknesses and can highlight configuration issues that should be fixed. One example of this is the “Windows unquoted/trusted service paths privilege escalation security issue” vulnerability […]

Cyber Essentials Plus: Account Separation

Cyber Essentials Plus: Account Separation

  Introduction Cyber Essentials Plus (Level Two) is a technical audit that demonstrates protections are in place to guard against the most common forms of cyberattacks. Here, we focus on account separation checks, explaining why these tests are carried out, the benefits, what to expect, and how we help.   Aim of Account Separation Testing […]

Cyber Essentials Plus: Multi-factor Authentication

Cyber Essentials Plus: Multi-factor Authentication

  Introduction Cyber Essentials Plus (Level Two) is a technical audit that demonstrates protections are in place to guard against the most common forms of cyberattacks. Here, we focus on multi-factor authentication and account separation checks, explaining why these tests are carried out, the benefits, what to expect, and how we help.   Aim of […]

Cyber Essentials Plus: Malicious Software Protection

Cyber Essentials Plus: Malicious Software Protection

  Introduction Cyber Essentials Plus (Level Two) involves tests to determine whether an internet-based attacker can hack into systems. This article focuses on the malicious software checks that are carried out via email and internet browsing. Here, we look into why these tests are done, the benefits, what to expect, and how we help.   […]

Cyber Essentials: User Access Control

Cyber Essentials: User Access Control

Introduction User access control is a fundamental aspect of Cyber Essentials, ensuring that only authorised individuals have access to sensitive systems and data. Effective access control measures significantly reduce the risk of data breaches and cyber attacks by limiting unnecessary exposure to critical information. In this article, we explore the importance of user access control, […]

Cyber Essentials: Security Updates

Cyber Essentials: Security Updates

Introduction Keeping devices secure with vendor-provided updates is key for cyber security best practice. It helps prevent unauthorised access and helps keep devices safe from harm. Whether pursuing Cyber Essentials, Cyber Essentials Plus, or just looking to be secure, applying security updates is a crucial step. In this article, we explain why security updates are […]