Support Login 0800 046 9957

What You Should Do If a Supplier Asks for Cyber Essentials and You Don’t Have It Yet?

Josh Kirk
  • 25 Mar 2026
  • 5 min read

Introduction

It’s becoming increasingly common for suppliers, customers and insurers to ask for Cyber Essentials as part of doing business. For many SMEs, this request lands with a mix of surprise and pressure, because it often appears in the middle of onboarding, contract renewal or a tender they’re keen to win. The good news is that Cyber Essentials is achievable for most organisations, and the journey towards certification is often more valuable than the certificate itself.

The quick answer

Cyber Essentials looks at whether your business has consistent controls around devices, identity, patching, email security and access. If a supplier is asking for it, they want reassurance that you won’t introduce risk into their environment. The best way to prepare is to treat CE as a baseline you maintain throughout the year rather than a one‑off audit you cram for.

Part 1: Why suppliers ask for Cyber Essentials (and why it’s happening now)

Cyber Essentials has moved from being “nice to have” to something that many organisations quietly expect before they hand over data or connect systems. Even businesses outside regulated industries are starting to make it part of their standard due‑diligence process.

This shift isn’t driven by compliance for its own sake, there have been a rise in supply chain cyber-attacks that have meant the end target weren’t the point of the initial breach. Suppliers want confidence that the organisations they work with have basic cyber hygiene in place. They have their own risk assessments to answer to, and your certification becomes part of the assurance they provide to their boards, insurers and customers.

Often, a supplier request arrives at an awkward time: just as you’re about to sign, or when your team is already at capacity. It can feel like a hurdle, but in reality it’s an opportunity to resolve long-standing IT weaknesses and align your environment to a stronger baseline.


Request Your Cyber Essentials Readiness Assessment Here

If you need clarity on where you currently stand and how close you are to meeting Cyber Essentials, you can request our Cyber Essentials Readiness Assessment.


Part 2: What Cyber Essentials is actually checking (in plain English)

A lot of SMEs assume Cyber Essentials is a questionnaire. In reality, it’s a standard that assesses whether your business is using sensible controls across five core areas. Most requirements are practical: keep systems supported, apply updates, use multi‑factor authentication, secure admin accounts, and ensure backups are intact.

CE isn’t looking for perfection, it’s looking for consistency. Many organisations have the right tools but lack evidence or don’t apply them in the same way across all users and devices. That’s why the preparation phase is so important.

The practical starting point: understand your readiness before you act

A calm readiness review is one of the most valuable things you can do before engaging with the questionnaire and this doesn’t need to be a long technical exercise. It’s more about mapping the essentials: which devices you have, whether they’re supported, how identity is protected, how patching is handled, and whether backups work as expected.

You may find that most things are in good shape, but a handful of inconsistencies need attention. Or you may discover that the environment has grown organically and needs time to stabilise. In both situations, the readiness stage prevents surprises later in the process.

Common gaps that stop SMEs passing on the first attempt

Even well-run organisations usually uncover a few issues during readiness. These are the patterns we see most often:

  • Some devices are still running unsupported operating systems
  • MFA is enabled for some users but not enforced consistently
  • Local admin rights are widespread
  • Patch status varies across devices, especially remote ones
  • Backups run but haven’t been restore‑tested recently
  • Legacy applications require exceptions the business wasn’t aware of

These aren’t failures in business terms, they are just the reality of IT environments that have evolved quickly or without strong governance. Good CE preparation will find them early so they don’t become blockers or an actual failure near your deadline.

Why Cyber Essentials works best as a year‑round habit, not an annual rush

The most important shift for many SMEs is moving from “let’s get certified” to “let’s maintain the standard”. CE isn’t intended to be a once‑a‑year compliance sprint, the audit simply checks whether you are applying a baseline that should already exist day to day.

The controls that CE checks are the same controls insurers look for and the same controls that reduce the odds of a breach. When businesses treat CE as a continuous posture, the certificate becomes a by‑product of the work, not the work itself.

Ongoing maintenance usually means reviewing patching consistently, keeping MFA and device standards enforced, tightening access where needed, and running periodic restore tests. These small habits build a much stronger security baseline than an annual scramble.

A realistic timeline if your supplier has asked for CE now

There’s no single answer because readiness varies, but for most SMEs the timeline depends on:

  • Whether all devices are supported
  • Whether MFA and identity controls are already in place
  • Whether patching is consistent
  • Whether backups can be proven with recent restore tests

A mature environment can prepare in weeks. An inconsistent or unstructured environment may need longer, not because CE is complex but because the environment needs stabilising.

If you’re tempted to rush, remember that CE reflects your organisation’s real security. Passing it without addressing the underlying issues doesn’t give your supplier confidence, and it doesn’t make your business safer.

How CE often improves wider IT standards

This is the part many SMEs don’t expect. The act of preparing for CE often uncovers operational issues that go beyond cybersecurity.

You may find you need better documentation, clearer ownership of systems, more structured onboarding, or a better way to handle device lifecycles. CE doesn’t directly require these things, but strong cyber hygiene naturally encourages them. It often becomes the moment where organisations decide to standardise their environment rather than continuing with a patchwork of inherited decisions. You can read our article on why standardised tools and systems are better than a pick and mix model here.

For many businesses, the result is not just a certificate but a cleaner, more predictable, more resilient IT foundation.

An example scenario that shows how this can play out

A 120‑user consultancy was asked for Cyber Essentials as part of a tender. They assumed they were “fairly close” because MFA was in place and most devices were modern. Their readiness review told a different story. Several devices were running unsupported versions of Windows, local admin accounts had accumulated over time, and backups were running but hadn’t been tested in months.

None of this was catastrophic. The business worked through the issues in a structured way, introduced a simple review cadence, and treated CE as an ongoing standard rather than a checkbox. By the time they certified, their estate was more consistent, their staff onboarding smoother, and their leadership team had better visibility of risks. The certificate was the output, not the goal.

FAQs

Why do suppliers ask for Cyber Essentials?

Because it provides baseline assurance that you have sensible security controls and that working with you won’t introduce unnecessary risk into their own environment.

Do we need CE or CE Plus?

This is a tough one to answer as a bit like we have mentioned throughout the article it depends on what the goal is. Simply achieving a certificate may be what you require for your suppliers but if you are trying to reduce your risk profile in the business then the higher standard you are working at, the more secure you will be.

How long does CE take?

It depends on readiness/starting point. Some organisations are close and can certify quickly whereas others need time to stabilise patching, standardise devices or improve identity controls.

Can we fail Cyber Essentials?

Yes, but failing is usually a sign of structural issues that were worth discovering anyway. Most failures come from unsupported devices, inconsistent MFA or patching gaps.

Is CE enough to protect us from breaches?

It improves your baseline significantly, but it isn’t a complete cybersecurity programme. Think of it as a starting point but a lot of businesses will want to take this to a far higher level in terms of tooling and services that further protect and reduce risk.

We use third-party cookies to personalise content and analyse site traffic.

Learn more