← Workshop
🎯 Cyber Essentials Risk Visualiser

Explore the vulnerability, attack path, business impact and fix for each of the five Cyber Essentials controls. Click any control to expand it, then step through the four stages.

Click any card to explore it — or expand all at once
🛡️
Firewalls
Control 1 of 5
Critical Risk
🔓 The Vulnerability

Your network has an unprotected boundary — internet traffic can reach internal systems directly without passing through any security checkpoint.

⚙️
Secure Configuration
Control 2 of 5
High Risk
🔓 The Vulnerability

Devices and software are in use with factory-default settings — including unchanged default passwords, unnecessary services running, and features enabled that create attack surface.

🔄
Security Updates
Control 3 of 5
Critical Risk
🔓 The Vulnerability

Known vulnerabilities exist in operating systems, applications or firmware that have published security patches available but have not been applied within the required 14-day window.

🔐
User Access Control
Control 4 of 5
Critical Risk
🔓 The Vulnerability

User accounts have excessive permissions beyond their role requirements, cloud services are accessible with a password alone (no MFA), or administrative and standard-user tasks are performed from the same account.

🦠
Malware Protection
Control 5 of 5
High Risk
🔓 The Vulnerability

Devices have no centrally managed anti-malware protection, or protection exists but users can disable it, definitions are not kept current, or there is no visibility of coverage across the fleet.

See where your organisation stands.
The CE Readiness Check assesses your current position against all five controls.