Explore the vulnerability, attack path, business impact and fix for each of the five Cyber Essentials controls. Click any control to expand it, then step through the four stages.
Your network has an unprotected boundary — internet traffic can reach internal systems directly without passing through any security checkpoint.
Devices and software are in use with factory-default settings — including unchanged default passwords, unnecessary services running, and features enabled that create attack surface.
Known vulnerabilities exist in operating systems, applications or firmware that have published security patches available but have not been applied within the required 14-day window.
User accounts have excessive permissions beyond their role requirements, cloud services are accessible with a password alone (no MFA), or administrative and standard-user tasks are performed from the same account.
Devices have no centrally managed anti-malware protection, or protection exists but users can disable it, definitions are not kept current, or there is no visibility of coverage across the fleet.