Cyber Essentials

Find out where you stand before attackers do. We examine your network, devices, email, cloud accounts, and people. We fix what we find and give you a clear, prioritized plan. No IT background required.

Everything Your Business Needs to Be Secure Done For You

Most small business owners know they should "do something about cybersecurity" but don't know where to start, don't have an IT team to handle it, and don't have time to figure it out on their own. That is exactly what Cyber Essentials is built for.

We come to your business (or connect remotely), take a thorough look at your entire technology environment your computers, your network, your cloud accounts, your email, how your employees access things and we find everything that could be used against you. Then we fix it.

This is not a report that sits on a shelf. We do the actual work. Misconfigured settings get corrected. Outdated software gets flagged and patched. Risky accounts get locked down. When we're done, your business is in a meaningfully more secure position than when we started.

We close out every engagement with a plain-English briefing, no jargon, no acronyms you don't recognize. You leave knowing exactly what we found, what we fixed, and what your remaining exposure looks like. Our senior practitioners lead every engagement personally.

You didn't get into business to become a cybersecurity expert. Cyber Essentials handles the technical side so you can focus on running your company.

No IT department required we do the work ourselves

Plain-English findings no technical background needed to understand your results

We fix critical issues during the engagement not just a list of problems

Senior practitioner leads your engagement start to finish

Minimal disruption most of the work happens in the background

"43% of cyberattacks target small businesses. Most succeed not because attackers are sophisticated, but because the basics were never done."

Cybersecurity Group, LLC Advisory Team

How It Works

Four straightforward phases. No surprises, no jargon, no ongoing obligation unless you want it.

STEP 01

Discovery

We start with a conversation. We learn how your business runs, what systems you use, how your team works, and what you're most concerned about. No technical knowledge required on your end.

STEP 02

Assessment

We examine everything your network, devices, cloud accounts, email, employee access, software, and security settings. We look for the same entry points attackers use, before they do.

STEP 03

Remediation

We don't just hand you a list of problems. We fix what we find tightening configurations, closing open doors, correcting settings, and hardening the areas most likely to be exploited.

STEP 04

Debrief & Report

We walk you through everything we found and fixed in plain English. You receive a written report that any business owner can read, plus a 30-day follow-up call to answer questions as they come up.

What We Look At

A complete review of your business technology environment the same way an attacker would look at it, but with you on our side.

Network & Wi-Fi

  • Router and firewall configuration review
  • Wi-Fi security settings and guest network separation
  • Open ports and unnecessary remote access points
  • Connected device inventory

Computers & Devices

  • Operating system and software patch status
  • Antivirus and endpoint protection coverage
  • Screen lock, encryption, and remote wipe readiness
  • Personal devices used for business (BYOD risk)

Cloud Accounts & Apps

  • Microsoft 365 / Google Workspace security settings
  • Third-party app permissions and integrations
  • Cloud storage sharing settings and data exposure
  • Multi-factor authentication (MFA) status

Email Security

  • Phishing and spam filter configuration
  • Email authentication (SPF, DKIM, DMARC)
  • Business email compromise (BEC) exposure
  • External email forwarding rules audit

User Accounts & Passwords

  • Who has access to what (access controls review)
  • Former employee accounts still active
  • Shared and default passwords in use
  • Password manager and MFA adoption

Vulnerabilities & Backups

  • Known vulnerability scan of internet-facing systems
  • Backup status does it exist, and does it actually work?
  • Ransomware readiness and recovery capability
  • Critical data exposure and storage practices

Small Businesses Are the #1 Target

Attackers go after small businesses precisely because most of them have never done a security review.

43%

of all cyberattacks are aimed at small businesses

$200K

average cost of a cyberattack on a small business

60%

of small businesses close within 6 months of a major breach

91%

of breaches begin with a phishing email targeting an employee

What You Get When We're Done

Every Cyber Essentials engagement ends with a complete package not just findings, but actual fixes and a clear path forward.

Plain-English Security Report

A written summary of everything we found, what we fixed, and what still needs attention written for a business owner, not an IT professional.

Critical Fixes Done During the Engagement

High-priority vulnerabilities are remediated as we find them misconfigured settings corrected, risky accounts locked down, obvious entry points closed.

Prioritized Action List

Everything we didn't fix on the spot ranked by risk level, with plain-English guidance on what it is, why it matters, and what to do about it.

Owner Debrief Session

A live walkthrough of the report with you (and any key staff) so you fully understand your security posture and what comes next.

30-Day Follow-Up Call

Thirty days after delivery, we check in to answer questions, verify fixes held, and confirm nothing new has come up.

Cyber Insurance Readiness Summary

A summary of your security posture relevant to cyber insurance applications and renewals increasingly required by carriers and often results in lower premiums.

Who This Service Is Built For

Cyber Essentials is specifically designed for small and mid-sized businesses that have real assets to protect but don't have a dedicated security team.

Never Had a Security Review

You've been running your business, relying on common sense and basic tools, but have never had an expert actually look at your environment. You're not sure what you're missing Cyber Essentials tells you.

Growing Business (5–100 Employees)

You've grown past the point where it's just you and a laptop. You have employees, cloud tools, customer data, and vendor access. The security habits that worked at 3 people don't scale to 30.

Something Felt Off Recently

A suspicious email, a slow computer, a weird login notification. You aren't sure if something happened and you want to know before it becomes a real problem.

Applying for Cyber Insurance

Insurance carriers are increasingly asking about your security posture. Cyber Essentials documents your baseline, identifies gaps before underwriters do, and often results in better coverage terms.

Cyber Essentials FAQ

How long does the engagement take?

Most Cyber Essentials engagements complete within one to two weeks from kickoff to final report delivery, depending on the size of your business and the number of systems involved. We coordinate all work around your schedule to minimize disruption.

Do I need to have IT staff for this to work?

No. Cyber Essentials is specifically designed for businesses without dedicated IT or security staff. You just need to give us access to the systems we'll be reviewing. We handle all the technical work and translate everything into plain English for you.

Will this disrupt my business operations?

Minimal to none. The assessment work is primarily passive we observe and review rather than actively probe. Any hands-on remediation work is scheduled with you in advance. We will never make changes to critical systems without your explicit approval first.

What if you find something serious?

We tell you immediately clearly and calmly. We have seen a lot of environments, and very few surprises are truly catastrophic with the right response. If we find something critical, we'll walk you through exactly what it means for your business and what needs to happen next, without panic or pressure.

How is this different from just buying antivirus software?

Antivirus software catches known malware on a single device. Cyber Essentials looks at your entire business environment every system, account, and access point and finds the gaps that antivirus software doesn't know to look for, like open network ports, misconfigured cloud accounts, or employees who still use the same password from 2018.

Is this a one-time service or ongoing?

Cyber Essentials is a single engagement with a defined start and end. There is no ongoing obligation. That said, many clients choose to do an annual reassessment as their business grows and changes, and we offer retainer options for ongoing advisory support if you want us in your corner on a regular basis.

Can this help me get or renew cyber insurance?

Yes. Cyber insurance carriers are increasingly requiring documented evidence of security practices. The Cyber Insurance Readiness Summary included in your deliverables is designed specifically to support insurance applications and renewals, and to demonstrate to underwriters that you take security seriously.

Not Sure Where Your Business Stands?

Schedule a free 30-minute call with a senior advisor. We will learn about your business, answer your questions honestly, and tell you whether Cyber Essentials is the right fit, no pressure, no obligation.