Work towards Cyber Essentials

We encourage organisations to achieve accreditations to cyber, or information, security standards in order to underpin their cyber security strategy and demonstration compliance to customers and suppliers.


Cyber Essentials

Cyber Essentials requires the completion of a self-assessment questionnaire, which is then certified by our certification body, Xyone Cyber Security, to confirm that you are compliant with controls including: Boundary Firewalls and Internet Gateways; Secure Configurations; User Access Control; Patch Management; Malware Protection.


Cyber Essentials Plus

Cyber Essentials Plus requires the completion of the same self-assessment questionnaire as with Cyber Essentials, but also incorporates a vulnerability assessment by a 'Certified Ethical Hacker' to ensure that your IT infrastructure is secure from external attacks. We can help you to complete the questionnaire, and prepare for the vulnerability assessment.


  • Improved tendering opportunities
  • Can reduce insurance premiums
  • Gain Cyber Essentials kite-mark
  • Enhances customer confidence
  • Provide higher levels of assurance
  • Provide market differentiation and give a competitive advantage
  • Mitigate against common cyber threats to the business
  • Protect company assets and Intellectual Property

We can help you to complete the self-assessment questionnaire, and our certifying organisation can certify that your business is compliant with HM Government's Cyber Essentials framework.

Get in touch...

Complete this form and a member of our team will contact you to discuss your cyber security requirements.

Alternatively, you can email us at or call us on 01352 331400.

Name *


Solvings is a Trusted Channel Partner of Xyone Cyber Security. Based at Lancaster University, Xyone are nationally-recognised market leaders in cyber security services, providing accessible and dynamic services that extend beyond technology to encompass people, culture, processes and even the physical environment to make your business as resilient as possible against the threat of cyber attacks.