Cyber Essentials checklist for small businesses: practical steps for UK firms
If you run a business of 10–200 people in the UK, the phrase “cybersecurity” probably sits somewhere between “tax return” and “fire drill” on your list of things you’d rather postpone. That’s understandable — but also risky. The Cyber Essentials scheme is a straightforward, government-backed way to reduce common cyber risks. This post gives a no-nonsense Cyber Essentials checklist for small businesses so you can focus on outcomes: less downtime, lower risk of fines, and more credibility when you bid for work.
Why Cyber Essentials matters (in plain English)
Cyber Essentials isn’t about turning your team into security experts. It’s about basic, effective controls that stop most opportunistic attacks: patched systems, decent passwords, controlled admin rights and the like. For many SMEs this means fewer incidents that interrupt work, lower costs fixing breaches, and a clearer story for customers and insurers. I’ve seen local suppliers in Leeds and a legal practice in Bristol avoid months of remediation simply by tackling the basics early.
Your Cyber Essentials checklist for small businesses
Think of this as a practical to-do list you can assign across IT, office managers and leaders. It’s focused on business impact rather than technical detail.
- Inventory and ownership: Know what counts as a business device and who’s responsible for it. Laptops, desktops, servers, tablets and company phones should be logged and assigned to a person or role.
- Patch management: Apply operating system and application updates promptly. Aim for automatic updates where possible, and a weekly check for anything that’s not covered.
- Firewall and network segmentation: Ensure a firewall protects your internet connection. Separate guest Wi‑Fi from business systems to reduce risk from visitors and contractors.
- Secure configuration: Disable unnecessary services and change default passwords on devices before they’re used for business. Defaults are the easiest way in for attackers.
- Access control: Use least privilege — give people only the access they need. Limit admin accounts and use separate accounts for admin tasks.
- Multi-factor authentication (MFA): Enforce MFA for remote access, email and cloud services. It’s one of the most effective steps for relatively low effort.
- Email and phishing defences: Use spam filtering, and train staff to spot suspicious emails. Regular, short refreshers are more effective than a single annual lecture.
- Backups: Maintain regular, tested backups, ideally with an offline copy. Test restores occasionally — backups that can’t be restored are a cost, not protection.
- Incident plan: Have a simple, written incident response plan that says who does what if something goes wrong. The plan should include communications (customers, staff, regulator if needed).
- Policies and training: Keep a concise acceptable use policy and run short, relevant training. Make sure new starters get the basics on day one.
Prioritise for business impact
You don’t have to fix everything at once. Start with high-impact, low-effort items: MFA, backups and patching. These will reduce most of the common threats quickly. For example, enabling MFA on email and cloud services often prevents breaches that would otherwise lead to significant downtime and reputational damage.
How to prepare for certification
If you want the badge for tenders or insurance, certification is straightforward if you’ve got the basics in place. Gather evidence: device inventories, update schedules, firewall configuration screenshots and your incident plan. Many small businesses in my experience find that documenting what they already do is the most time-consuming part — not the technical changes.
If you need guidance on practical steps and what evidence is acceptable, see this short guide on getting Cyber Essentials in place: getting Cyber Essentials in place. It explains the certification route and common stumbling blocks without the jargon.
Common pitfalls and how to avoid them
Beware of the checklist illusion — ticking boxes without real enforcement. For example, a policy that exists only as a file on a server does nothing if staff aren’t aware of it. Also, don’t ignore suppliers: third-party access is a frequent source of compromise. Ensure your vendors follow compatible basic controls, and ask for evidence when needed.
Maintenance: the ongoing work
Cyber Essentials is not a one-off project. Treat it like fire safety: set regular reviews, keep your inventory current, and make security part of routine IT work. Schedule quarterly checks for patches, monthly spot checks of backup restores and an annual policy review. I’ve seen businesses that treated security as an annual chore — those were the ones that called at 7am on a Monday when something went wrong.
Costs and who should own what
Budgets vary. The good news is many controls are low-cost: MFA is often free with business-grade email, and firewalls are standard in most broadband packages. Where you need external help, choose clarity over complexity — a fixed-scope review to get you to Cyber Essentials certification is often cheaper than reactive incident work. Responsibility usually sits with IT or operations; however, directors should own risk decisions and sign off policies.
Putting it into practice — one realistic first week
Here’s a sensible 7-day starter plan you can follow:
- Day 1: Create an inventory and assign device owners.
- Day 2: Enable automatic updates and start patching critical systems.
- Day 3: Turn on MFA for email and remote access.
- Day 4: Review firewall settings and separate guest Wi‑Fi.
- Day 5: Verify backups and perform a test restore.
- Day 6: Draft a one-page incident plan and acceptable use rules.
- Day 7: Run a short team briefing — 20 minutes to explain the basics.
FAQ
How long does it take to get Cyber Essentials certified?
It depends on your starting point. If your basics are in place, the self-assessment route can take a few days of focused work to gather evidence and complete the submission. If you’re starting from scratch, allow a few weeks to implement and document the controls.
Is Cyber Essentials enough for my business?
It covers the most common attack vectors and offers tangible protection for most SMEs. For businesses handling highly sensitive data or working in regulated sectors, additional controls may be required alongside Cyber Essentials.
Do I need an IT team to comply?
No. Many small businesses implement Cyber Essentials with a mix of in-house staff and short-term external help. The key is appointing someone responsible and ensuring basic tasks are carried out and documented.
Will it stop all cyberattacks?
No security measure is perfect, but Cyber Essentials stops the majority of opportunistic attacks that target common misconfigurations and weak credentials. It significantly reduces likelihood and impact for most businesses.
How often should I review controls?
Review critical controls like patching and backup monthly, and perform a full policy and inventory review at least annually or after significant changes such as new systems or staff increases.
Ready to turn this checklist into fewer incidents, lower IT cost and stronger credibility with customers and insurers? Start by assigning the inventory task and scheduling the first week’s actions — it’s the cheapest insurance your business will buy and the quickest way to calm the inbox.






