Whats App Contact Us +441617678300

Securing Businesses Across UK

Phishing Protection & Cyber Awareness Training

Cyber Essential Network Audit Incidence Response

Prepare for Cyber Essentials

If you're unsure whether your business is ready for Cyber Essentials certification, we offer a thorough pre-assessment service to help you identify and address any gaps. Our team will guide you through key requirements, making sure you’re fully prepared for a successful certification process.

Cyber Essentials Certification Process

We offer a simple and seamless process with a dedicated consultant to help you get Cyber Essentials Certification.

PRE-ASSESSMENT

PRE-ASSESSMENT

Engage in detailed discussions with our specialists to assess your current cybersecurity measures and pinpoint areas for improvement.

ASSESSMENT

ASSESSMENT

Once the security controls are in place you will need to answer the self-assessment questions. We will then review and advise if any changes are required.

CERTIFICATION

CERTIFICATION

If your evaluation is successful, you will be notified and receive the Cyber Essentials certification.

RENEWAL

RENEWAL

The certification is valid for 12 months and will need to be renewed.

Cyber Essentials is available in two levels:

Level One

Cyber Essentials is an independently verified self-assessment

Cyber Essentials operates through a self-assessment questionnaire, where organizations respond to questions covering the assessment scope, employees, devices, and work locations.
They also answer questions focused on the five core security controls: user access management, secure configuration, security update management, firewalls and routers, and malware protection.
A board member or equivalent must approve the responses, which are then reviewed by an independent Assessor.

Cyber Essentials is priced according to the size of your organisation

0-9 Employees

£420

0-9 Employees

£621

0-9 Employees

£540

0-9 Employees

£789

Level Two

Cyber Essentials Plus is a technical audit of your IT systems

Completing the verified self-assessment questionnaire for Cyber Essentials is a prerequisite for achieving Cyber Essentials Plus.
While both certifications share the same technical requirements, Cyber Essentials Plus includes a technical audit of your IT systems to confirm the controls are effectively implemented. This audit provides greater assurance of compliance with the scheme.
The audit reviews a representative sample of user devices, all internet gateways, and any servers with internet-accessible services.

Cyber Essentials Plus is priced according to the size and complexity of your network

External & Internal Network Audit

Our Network Audit service provides a comprehensive overview of your organization’s security posture, helping you identify vulnerabilities and quantify risk levels across your network.

Internal Network Scan : Gain insights into your internal systems to detect hidden vulnerabilities and weaknesses within your infrastructure.

External Network Scan : Assess your perimeter defences to identify potential entry points that attackers might exploit.

cyber lock

UK GDPR is a vital aspect of your business

Small businesses also must adhere to the data protection principles, which include the same eight rights that apply to large businesses.

We can offer consultancy to venues to discuss how GDPR affects you and devise a plan to ensure that you are GDPR compliant in all areas of your organization. GDPR awareness training is the perfect first step for any organisation looking to achieve GDPR compliance.

Reliable Security Services

We deliver dependable security monitoring to safeguard your digital assests, ensuring smooth and secure operations around the clock.
cyber solution asset

Automated Asset Management

Secure and efficient remote asset management through automation.

cyber solution lock

Penetration & Vulnerability Testing

Identifying security gaps through in-depth testing.

cyber solution monitoring

Solution-Oriented Reporting

Detailed Findings and Solution Proposals.

Intech Incident Response: Prepare, Prevent, and Protect

Intech Incident Response (IIR) ensures your organisation can effectively manage and recover from cyber threats.

Protect: Safeguard your data and systems.

Detect: Identify risks swiftly to minimise damage.

React: Act decisively to neutralise threats and restore operations. 

Deter: Prevent vulnerabilities and discourage attackers.

Stay resilient against cyber challenges with IIR.

protection response

Cyber Security FAQ

For any questions regarding Cyber Essentials that are not covered below, please reach out to us at support@intechsecurity.co.uk.

  • According to the UK government, achieving Cyber Essentials means your organization is protected from approximately 80% of cyber-attacks.
  • Cyber Essentials certifications demonstrate that you are committed to cyber security and data protection to customers and stakeholders.
  • Improves your organisation’s reputation and increases your chance of securing new business by showing you have robust cyber security measures in place.

Protects your Business against the majority of common cyberattacks and demonstrates to stakeholders your commitment to keeping their data secure and your business operational. This can increase business retention and attract new business. Increases the level of security of your systems and data, and puts processes in place to ensure this level continues – if not improves year on year. This helps to drive business efficiencies which in turn improves productivity through streamlined processes, reducing operational costs. Allows you to work on UK government contracts that involve the handling of personal and sensitive information. Reduces your insurance premiums by being able to prove your Business has increased its resilience to cyber threats.

This depends on the needs of your organisation, and also why you are putting it in place. For example, if you are looking to work with the public sector on government contracts then they will ask for Cyber Essentials as a minimum. If you want to demonstrate that your organisation is compliant with cybersecurity and takes data protection seriously, then you may also want to achieve Cyber Essentials Plus certification.

Further details on Cyber Essentials and the Cyber Essentials Plus scheme can be found at the  National Cyber Security Centre website.

Yes, you can download a copy from the IASME website here, and further guidance is available from the National Cyber Security Centre here.

Once you’ve submitted and signed off your assessment a qualified assessor will then evaluate the responses against the criteria. If you meet the FIVE core requirements, you will pass and receive certification.

Yes, you’ll get feedback, we will supply a report with the answers you gave along with the assessor feedback. This will help you improve your security so you can achieve certification in the future.

Strategic Partners

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://intechsecurity.co.uk/.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.
Save settings
Cookies settings