Information request

You have a question ? Need information? do not hesitate to contact us

  • +32(0)800 12 512

Customer area

Access to the information area reserved for customers:

Services Center

Support for incidents & service requests

  •   +32(0)800/12.712 (Fr)
  •   +32(0)800/12.812 (Nl)

Customer services


Billing service

Cyber Essentials certification
for IT security under control!


covering 5 different fields* of application

"Cyber Essentials" CERTIFICATION
particularly suitable for SMEs

your IT environment and DETECTS security vulnerabilities

your company’s level of cybersecurity efficiency

Cyber Essentials enables companies to demonstrate to their customers that they have taken the basic and essential precautions by obtaining Cyber Essentials certification.

2 levels of certification


Cyber Essentials

The company must complete a questionnaire. The answers are analysed by an independent external certification body.

Cyber Essentials PLUS

Provides a higher level of assurance by performing outsourced testing of the cybersecurity strategy implemented by the company.

Steps in the «Cyber Essentials» certification process

  • Management and security of Internet access (Firewall, router, etc.);
  • Secure configuration of servers and workstations in terms of Windows configuration, rules of good practice and associated procedures;
  • Access control: management of access, rights, rules of good practice and internal procedures;
  • Malware protection – tools, configuration of tools, rules of good practice and associated procedures;
  • Patch management: – patching policy, verification of IOS and application compliance (availability of security patches), rules of good practice and associated procedures.

The questionnaire

34 questions in 5 areas of application

  • Boundary Firewalls and Internet Gateways
  • Secure Configuration
  • Access Control
  • Malware Protection
  • Patch Management



  • Possibility of defining scope to limit certification to a sub-entity of the company or a particular activity or a particular site
  • If there is no scope, all systems at all sites must meet the requirements of certification


All systems and software included in the scope must have a valid licence


All OS, software, applications or systems must be products supported by the publisher in terms of security updates. Example : Windows XP or Server 2003 are no longer supported by Microsoft -> cannot be included in the scope. Nevertheless, by applying containment measures, it is possible to leave such systems within the scope (no access to the Internet, limited access, VLAN network, etc.)


The criteria

26 criteria in 5 areas of application

  • Boundary Firewalls and Internet Gateways
  • Secure Configuration
  • Access Control
  • Malware Protection
  • Patch Management

Application of the criteria

  • Each element present in the scope must be checked against these criteria
  • Not all criteria apply to all elements
  • Non-compliance of certain elements with certain criteria is accepted when there are technical impossibilities. In this case, alternative measures must be put in place to limit the risks.

Cyber Essentials in 4 test

Scan of vulnerabilities for external fixed IP addresses.

Sending an email with test malware to test the effectiveness of protection measures against malware propagated via email.

Surfing a test page containing test malware to test the effectiveness of protection measures against malware propagated by websites.

Internal scanning of vulnerabilities on servers with administrator rights. The purpose of this test is to verify the level of protection and to detect vulnerabilities that have not been addressed.

Added value :

  • Profitable investments  in basic cybersecurity for companies of all sizes. Applicable and effective approach for your company too.
  • Eligibility for your company to meet UK government specifications.
  • Reduced risk of cyberattacks on your company.
  • Distinction from your competitors. Demonstrates that your company is taking cybersecurity risks seriously.
  • Certification is an element that you can bring to the attention of your insurer as part of a cyber insurance policy.


Assist the customer with their certification. Advise them, prepare them.



«As-is» audit of the security level of the customer’s infrastructure.


Audit report


Containing the compliant points as well as the defective points and the recommendations for becoming compliant


Application of recommendations






The customer applies for Cyber Essentials certification and responds to the auditor


Why to choose COMPUTERLAND ?

Cybersecurity has become a necessity even for SMEs. Industry 4.0 will further increase the ubiquity of IT
  • Standardisation of the Cyber Essentials approach
  • Tools to facilitate the Cyber Essentials approach under development
  • Economies of scale through the reuse of these tools
  • COMPUTERLAND has the technical and methodological skills to lead  your company to certification


Avenue de l'informatique 9
4432 Alleur - Belgique
+32(0)800 12 512


Avenue Georges Lemaître 54
6041 Charleroi - Belgique
+32(0)800 12 512


89E Parc d’Activités Capellen - West Side Village L- 8308 Capellen
+352 26 59 06 86