Information Assurance

We know information security is a complex world – there are a lot of initialisms and controls and, often, knowing where to start is the hardest part.
Choosing the right framework is not as simple as reviewing the size of an organisation, there are several aspects that will impact the decision:
We’ve put together a rundown on the most popular frameworks—Cyber Essentials, Cyber Essentials Plus and ISO 27001—to help you find the right one:
Cyber Essentials (CE) provides a set of simple technical and procedural controls that if applied correctly can significantly reduce organisations’ exposure to potential cyber risks. Essentially, it provides a framework for the baseline security measures required to secure a business. If you had a ‘bricks n mortar’ shop on the high street, consider these measures as the basic security you would put in place, such as locks on the front door, an alarm system and locking the cash register.
These measures aim to make it harder for a cyber criminal to gain access to a network. The framework covers five key areas:
The certification application involves a self-service questionnaire that can be completed internally and submitted to a certified body, who will review the results and grant certification if appropriate. It’s important to note that this certification must be renewed annually to ensure the measures are maintained.
The Cyber Essentials certification demonstrates to customers that your business takes cyber security seriously and is committed to protecting their information. As a bonus, putting the CE ‘badge’ on your website can be a strong selling point.
Cyber Essentials is perfect for businesses that:
Cyber Essentials Plus is the highly regarded next level up from Cyber Essentials. The aim is the same, but the key difference is that your compliance with the standard must be validated by an external certification body, via onsite assessments, including:
This external validation provides a higher level of assurance for internal and external stakeholders. In the high street shop analogy, you’re hiring a security expert to review your current security measures and tightening them up if needed.
Like Cyber Essentials, the Plus certification begins with a self-assessment questionnaire, which is then reviewed by an external certification body. On receipt of the self-assessment, the certification body will send a consultant to your site to undertake the assessments—this can take between three and five days depending on the size of the organisation. Should there be any need for remedial action, the certification body will allow time for this to be achieved before granting certification. It’s important to note that this certification must be renewed annually to ensure the measures are maintained.
The Cyber Essentials Plus certification demonstrates to customers that your business takes cyber security seriously and is committed to protecting their information – an excellent selling point for your services. And, in addition, many insurance companies will consider reduced premiums for certification holders.
ISO 27001 is a globally recognised Information Security Management System (ISMS). It is considered industry best practice and the most scalable framework. The overall aim is to ensure security is managed consistently and cost-effective control measures are implemented, proportionate to the level of risk.
In your high street shop, ISO 27001 provides the next level of security controls—incorporating background checks into the staff hiring process, adding a swipe card to the lock on the front door, installing CCTV and developing schedules for how often it is checked, and so on.
The scope of this certification can be adapted to specific aspects of a business, such as key processes, physical locations and critical systems, choosing the relevant controls based on your risk appetite. The framework is made up of 14 control areas:
As you can see, ISO 27001 is a significantly bigger undertaking than Cyber Essentials or Cyber Essentials Plus. Typically, a gap analysis and implementation can take between 6 and 12 months because there is a high likelihood of needing new controls to meet the requirements, but that will depend on resource availability, skills, knowledge and experience. Of course, a third-party can be engaged to take on the full project.
Once certified—though many organisations undertake ISO 27001 implementation without going for certification—there will be maintenance visits every 6-12 months from the assessor, just to ensure that processes are still in place and that the business is progressing. The maintenance visit is not a full audit; that is done during re-certification, which is every three years. If your scope changes in the meantime, you will need to re-certify against that new scope.
What kind of business are you? It’s likely that legal, contractual or regulatory obligations may make the choice straightforward, but if you do get a choice, here are a few things to think about:
We believe that cyber security doesn’t need to be overly complicated, incomprehensible or vastly expensive. We want to help you find the right solution for the threats your organisation and sector face. If you need help implementing security measures in your business, get in touch.
In the rapidly evolving digital landscape of 2025, every organisation faces a huge range of challenges that extend far beyond traditional cyber threats.
Protection Group International (PGI) is pleased to be the Official Training Material Developer to CREST, the global not-for-profit body supporting the cyber security industry.
The Department for Education (DfE) is changing its IT security requirements to improve resilience against cyber threats in the education sector.