How much does cyber essentials cost?

Cyber Essentials

In order to secure their business and client data, a Cyber Essentials certification encourages organizations across the UK to adhere to a set of cybersecurity principles. Cyber Essentials certification is required for any company participating in a high-value tender. Unlike those that are not supported by the government, this scheme is both affordable and well respected within the industry.

Through exploring vulnerabilities in systems and devices linked to the internet, Cyber Essentials enables businesses to minimize the threat of phishing attacks, ransomware, website connections, malicious emails, and hacking vulnerabilities. Before the submission of the certificate, any possible risks are detected, allowing companies the ability to address these issues.

Cyber Essentials Basic

A DIY approach one, where we provide you access to a Web portal with a list of questions for you to answer –  £300
Signup online to Cyber Essentials Basic

Cyber Essentials Plus

As above but with an on-site visit by a penetration tester – POA, circa £2,000 for a small business *

Cyber Essentials UM Guided

Full guidance and advice through the process – £550
Signup online to Cyber Essentials UM Guided

IASME Governance Self-Assessed

Again a DIY approach and Web portal with a list of questions for you to answer – Includes CE – £400
Signup online to IASME Governance Self-Assessed

IASME Governance Audited

An on-site audited version of the above – THE GOLD STANDARD –  POA, circa £2,000 for a small business *

CYBER-EXTENDED

A three year monthly contract to work with you to keep you compliant – POA, starting at £10 per month *

* Where POA (Price on Application) has been specified, the nature of these services is very dependent on network size and complexity and is therefore quoted uniquely.

Tailored Protection

Risk
Reduction

Trusted Expertise

Trusted
Expertise

24/7 Support

24/7
Support

Easy Compliance

Pain-Free
Compliance

Latest Articles

What is a virtual CISO? When and how to hire one

What is a virtual CISO? When and how to hire one

Chief information security officers (CISOs) are in high demand, and good ones are expensive and difficult to find. Following a rash of high-profile data breaches, and knowing that such breaches have far-reaching consequences that are far more costly than the cost of...

read more
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

Penetration testing and vulnerability scanning are often confused as the same service. This leads to business owners purchasing one when they really need the other. Below, we will outline the differences between the two to help better your understanding and ascertain which service your business requires.

read more
A DATA security partner you can count on

A DATA security partner you can count on

Unity Metrix Unity Metrix are a company formed of IT and security professionals who have been in the business a very long time. We live by the tenets of honesty, integrity and helpfulness and deliver services that align with those tenets.

read more
Cyber Essentials – Take data security seriously

Cyber Essentials – Take data security seriously

Cyber Essentials Service Cyber essentials is a great way to prove to your customers that you take your data security seriously and is a great ‘badge of honour’ to display. Unity Metrix is an IASME accredited Certification Body for Cyber Essentials We can help to:...

read more
Acunetix web vulnerability scanner

Acunetix web vulnerability scanner

How Acunetix Works Acunetix works in the following manner: Acunetix DeepScan analyses the entire website by following all the links on the site, including links which are dynamically constructed using JavaScript, and links found in robots.txt and sitemap.xml (if...

read more
Do I need a penetration test?

Do I need a penetration test?

Do I need a penetration test? If you have a website that takes information about users… If you have a website that takes credit cards… If you have an internal system that shares personal information with external bodies… If you develop systems that will hold personal...

read more
How do you perform a vulnerability scan?

How do you perform a vulnerability scan?

How do you perform a vulnerability scan? A vulnerability scan is performed by a piece of software that resides either on a system inside the network, or more often on a cloud service. Modern scanners are very powerful and have a lot of automation built-in, so for a...

read more

Get in Touch

Have any questions or need assistance? Fill out the form below and one of our helpful and friendly cyber security experts will get back to you promptly.