Craig Pepper
February 1, 2024
5 Min Read

Cyber Essentials Charity Case Study


We were supporting a community money advice charity in the completion of their Cyber Essentials and Cyber Essentials Plus applications. The organisation comprised of just one individual who had not gone through the Cyber Essentials process before.

🤔 Problem/Challenge:

Whilst assisting the customer with the completion of the self assessment, it became apparent that the clients mobile devices were outdated and therefore unsupported. The client had 4 outdated and unsupported devices that would have resulted in a fail.

Section A2.6 of the Cyber Essentials self assessment requires organisations to list their mobile devices.

The requirement from IASME is as follows - All tablets and mobile devices that are used for accessing organisational data or services and have access to the internet must be included in the scope of the assessment.

Older devices or unsupported devices that are used to access business data are not compliant with the Cyber Essentials standard.

Security Tip - Why you need updated mobile devices, please read on.

🎯 Solutions

Our skilled assessment team were able to identify this issue ahead of the client submitting the self assessment.

We concluded that in order for the customer to proceed with the assessment they would need to replace all of their mobile devices.

As the customer was a charitable organisation, they did not have the funds available to replace 4 mobile phones.

Periculo went above and beyond to meet the requirements of the Cyber Essentials standard by offering to replace the customers' devices at full cost. This not only ensured compliance but also demonstrated our commitment to providing exceptional service.

🗓️ Implementation

The client was given the opportunity to select their preferred devices.

Periculo then ordered the band new devices on the customers behalf and covered the full cost.

The devices were shipped direct to the customer within 48hrs of being ordered.

🥅 Results:

By replacing the customers mobile devices with brand new handsets the customer was then able to meet the requirements of section A2.6 of the Cyber Essentials self assessment.

The quick turnaround ensured that the assessment was still completed in a timely manner and enabled the customer to pass first time.

✅ Conclusion:

This highlights the importance of needing to date mobile devices for the completion of the Cyber Essentials assessment.

We were thrilled to provide this exceptional service to the customer, assisting them in achieving their business goals of attaining Cyber Essentials.

Are you ready to experience cybersecurity support that goes beyond the checklist, to ensure not just compliance, but true digital resilience? Whether you're stepping into the Cyber Essentials journey for the first time or looking to fortify your defences with Cyber Essentials Plus and beyond, Periculo is here to elevate your cyber protection strategy with expertise, foresight, and a commitment to your success.

Contact us today to discover how we can safeguard your digital future.

💁 Security Tip:

Your smartphone or tablet holds valuable information, and by following these principles, you can enhance your device's cybersecurity.

Regular Software Updates: Consistently update your mobile device's operating system and applications. Cyber Essentials emphasises the importance of patch management to protect against vulnerabilities and keep your device secure.

Access Control: Restrict access to your device and data. Use strong, unique passwords or biometric authentication methods to prevent unauthorized access, meeting the access control requirements of Cyber Essentials.

Firewalls and Secure Configuration: Activate built-in firewalls and ensure your device is configured securely. Cyber Essentials recommends these measures to defend against threats and unauthorized network access.

Protection Against Malware: Install and regularly update antivirus and anti-malware software. This is a fundamental step to meet Cyber Essentials standards and safeguard your device from malicious software.

Data Encryption: Encrypt sensitive data on your device, making it unreadable to unauthorized users. Encryption aligns with the data protection requirements of Cyber Essentials.

App Security: Only download apps from trusted sources, and ensure they are kept up-to-date. Cyber Essentials emphasizes app security to prevent the installation of malicious or vulnerable applications.

By following these Cyber Essentials guidelines, you're taking proactive measures to protect your mobile device against cyber threats and maintaining a strong cybersecurity posture.

Read similar blogs