General

Cyber Essentials 2026: What’s Changing and Why Businesses Still Get It Wrong 

Cyber Essentials remains one of the most effective starting points.

Matty Dunlop

Matty Dunlop- Cyber Essentials Team Manager

25/03/2026
4 min read
HeroBlogPost image

For businesses taking their first step into cybersecurity, Cyber Essentials remains one of the most effective starting points. It provides a simple but powerful framework to protect against the most common cyber threats.

Share this Article
Contents

    At its core, Cyber Essentials focuses on five key controls:

    • Firewalls

    • Secure configuration

    • Security update management

    • User access control

    • Malware protection

    On paper, it’s straightforward. So why do so many organisations still struggle to adopt it properly and what happens when they don’t?

    Why Businesses Still Struggle With the Basics

    The challenge often comes down to a lack of understanding. Many organisations focus on achieving the certification itself rather than understanding why the controls exist in the first place.

    Size also plays a role. Smaller businesses may underestimate their risk, while larger organisations sometimes overcomplicate what is meant to be a simple baseline. There’s also a persistent mindset that cyber incidents happen to “other companies” until it becomes a reality.

    In truth, many high-profile breaches could have been prevented by correctly implementing these five basic controls.

    The Common Mistakes That Lead to Breaches

    Even with a simple framework, certain behaviours continue to create unnecessary risk.

    One of the most critical issues is the misuse of administrator accounts. Using admin privileges for everyday tasks might feel convenient, but if that account is compromised, it gives an attacker complete control. From installing malware to moving across systems, it effectively hands over the keys to the entire environment.

    Another major gap is the lack of multi-factor authentication (MFA). Some users see it as an inconvenience, but without it, a stolen password becomes an open door. When combined with poor password practices, such as reuse across systems, the risk multiplies quickly.

    Failure to apply security updates is another common weakness. Outdated or unsupported software creates known vulnerabilities that attackers actively exploit. Patching is not optional. It is one of the simplest and most effective ways to close those gaps.

    Underlying all of this is a dangerous mindset: “it won’t happen to us” or “we can’t afford it.” In reality, the cost of a breach can far exceed the cost of prevention.

    What’s Changing in Cyber Essentials 2026?

    The upcoming 2026 update introduces a new question set known as “Danzell,” developed by the National Cyber Security Centre and IASME Consortium.

    Importantly, the core controls are not changing. What’s changing is how organisations are assessed to ensure those controls are being applied properly.


    Stronger Focus on Scope

    One of the biggest updates is within the Verified Self-Assessment (VSA), particularly around scoping.

    Organisations will no longer be able to loosely define what is “in scope” and what is not. For example, simply excluding certain devices while they remain connected to the same network will not be acceptable. If systems can communicate, they are effectively part of the same risk environment.

    The updated questions aim to ensure businesses are not unintentionally or deliberately overlooking vulnerable parts of their infrastructure.


    Stricter Assessment Outcomes

    Some areas that previously resulted in a major non-compliance will now lead to automatic failure. This aligns the baseline assessment more closely with the more rigorous Cyber Essentials Plus testing.


    Enhanced Testing in Cyber Essentials Plus

    The Plus certification will also see improvements, particularly around patch management.

    If vulnerabilities are identified during initial scans, additional random samples may be tested to ensure fixes are applied consistently across the entire environment, not just to a small subset of devices.

    This shift reinforces a key message: cybersecurity must be consistent, not selective.

    Why Cyber Essentials Still Matters

    Cyber Essentials is not just about achieving a certification badge. It’s about building a foundation of security that protects your business, your data, and your customers.

    It also delivers tangible business benefits. Certification demonstrates trust, showing customers and partners that basic protections are in place. It can also open doors to new opportunities, as many government contracts require Cyber Essentials compliance when handling sensitive data.

    10 Practical Ways to Get It Right

    For organisations preparing for Cyber Essentials, or looking to improve their current posture, the fundamentals matter most:

    1. Maintain a complete inventory of all devices accessing your systems, including BYOD

    2. Apply security updates and patches within 14 days of release

    3. Understand your network boundaries and ensure firewalls are properly configured

    4. Carefully assess any attempt to remove systems from scope and ensure proper network segregation

    5. Separate administrator accounts from day-to-day user accounts

    6. Enable MFA across all cloud services

    7. Invest in staff training to build awareness of cyber risks

    8. Enforce strong, unique password practices

    9. Deploy and maintain up-to-date malware protection

    10. Treat Cyber Essentials as an ongoing commitment, not a one-time exercise

    Moving Beyond the Checkbox Mentality

    One of the biggest misconceptions about Cyber Essentials is that it’s a one-time task. In reality, certification is only valuable if the controls are maintained year-round.

    Organisations that treat it as a tick-box exercise risk undoing all the protections it provides. Those that embed it into daily operations, however, gain lasting security benefits and reduce their exposure to real-world threats.

    Final Thoughts

    Cyber Essentials was designed to make cybersecurity accessible, not complicated. The 2026 updates are not about raising the barrier, but about ensuring organisations are applying the controls with the intent they were designed for.

    You don’t need to understand exactly how attackers operate. But you do need to understand how to stop them.

    And in many cases, that starts with getting the basics right.

    Matty Dunlop Headshot

    Meet the author

    Matty Dunlop Cyber Essentials Team Manager

    Matty is Bulletproof’s Cyber Essentials Team Manager, and enjoys taking a big-picture view of how we can help customers get the most out of their CE certification. He takes pride in building a great team of Cyber Essentials & Cyber Essential Plus Assessors, making sure to put forward the best and brightest from Basic through to Plus.

    Related resources