Back to Blog

Common Reasons Businesses Fail Cyber Essentials Plus

Common Reasons Businesses Fail Cyber Essentials Plus

Every year, thousands of UK organisations apply for Cyber Essentials Plus certification — and a significant proportion of them fail on their first attempt. Unlike the basic Cyber Essentials certification, which is a self-assessment questionnaire, Cyber Essentials Plus involves a hands-on technical audit conducted by an accredited assessor. There is nowhere to hide: real devices are scanned, real configurations are inspected, and real vulnerabilities are exposed.

Understanding why businesses fail is the first step towards ensuring your organisation does not. In this article, we examine the most common reasons UK businesses stumble during their Cyber Essentials Plus assessment, drawing on real-world experience from hundreds of assessments across industries ranging from legal services and accountancy to manufacturing and technology.

The Scale of the Problem

The Cyber Essentials Plus failure rate is not publicly disclosed by the NCSC or IASME (the scheme's accreditation body), but industry estimates suggest that between 40% and 60% of organisations fail at least one element of their first assessment. That is a sobering statistic, particularly when you consider that these are organisations that have already completed the basic Cyber Essentials self-assessment and believe themselves to be compliant.

Unpatched software67%
Most common failure
Misconfigured firewalls52%
Frequent issue
Weak access controls44%
Common oversight
End-of-life software38%
Persistent problem
Missing malware protection29%
Avoidable gap

The gap between self-assessment and reality is the core issue. Many organisations answer the Cyber Essentials questionnaire based on what they believe their policies dictate, rather than what is actually happening on their devices. Cyber Essentials Plus closes that gap by checking the ground truth.

Reason 1: Unpatched Software and Operating Systems

This is, without question, the single most common reason businesses fail their Cyber Essentials Plus assessment. The scheme requires all software within scope to be patched within 14 days of a critical or high-risk security update being released. During the assessment, the certifying body will run vulnerability scans that reveal exactly which patches are missing.

The problem manifests in several ways. Sometimes it is the operating system itself — a Windows device that has not received its latest cumulative update, or a macOS machine that is running a version behind. More often, it is third-party applications: an outdated version of Adobe Acrobat, an old Java runtime that was installed for a legacy application and then forgotten, or a browser plugin that has not been updated in months.

The third-party application gap is particularly insidious because many organisations have excellent processes for operating system patches (thanks to tools like WSUS and Intune) but no equivalent mechanism for the dozens of third-party applications installed across their estate.

Watch Out

Browser extensions are often overlooked during patch management. A single outdated Chrome or Edge extension can cause a Cyber Essentials Plus failure, even if the browser itself is fully updated. Audit your extensions regularly and remove any that are unnecessary.

How to Avoid This Failure

Implement a comprehensive patch management solution that covers not just operating systems but all installed applications. Tools like ManageEngine Patch Manager Plus, Ivanti, or PDQ Deploy can automate third-party patching alongside OS updates. Run a vulnerability scan against your own estate at least one week before your scheduled assessment to identify and remediate any gaps.

Reason 2: Misconfigured Firewalls and Routers

Firewalls are one of the five core Cyber Essentials controls, and the assessment will check that your boundary firewalls and software firewalls are configured correctly. Common failures in this area include default administrator credentials on routers and firewalls, unnecessary ports left open, and firewall rules that are overly permissive.

Many small businesses use consumer-grade routers provided by their internet service provider, and these devices often ship with default passwords and configurations that are not appropriate for a business environment. If your ISP-provided router is acting as your boundary firewall, you must ensure that its default password has been changed, that remote management is disabled (or at minimum, secured with strong credentials), and that no unnecessary services are exposed to the internet.

For larger organisations, the challenge is typically one of firewall rule hygiene. Over time, firewall rules accumulate — temporary rules that become permanent, rules created for projects that have long since ended, and rules that are overly broad because the original administrator did not want to spend time defining precise access requirements. Each unnecessary rule is a potential avenue for an attacker.

How to Avoid This Failure

Conduct a full firewall audit before your assessment. Document every rule, understand its purpose, and remove any that are no longer required. Ensure that all management interfaces use strong, unique passwords and that remote management is either disabled or restricted to specific IP addresses. If you are using an ISP-provided router, consider replacing it with a business-grade firewall appliance.

Reason 3: Weak Access Control and User Account Management

Access control failures take many forms. The most common is the use of administrator accounts for day-to-day work. Cyber Essentials requires that users operate with standard (non-administrative) accounts for routine tasks, with administrative privileges reserved for specific activities that require them.

In practice, many organisations give their users administrator rights because it is convenient — it avoids the helpdesk tickets that arise when users cannot install software or change system settings. However, this convenience comes at a significant security cost: if a user with administrator rights clicks on a malicious link or opens an infected attachment, the malware has full control of the system.

73%
Of UK SMEs give users admin rights unnecessarily
94%
Of critical Windows vulnerabilities mitigated by removing admin rights
5x
More likely to suffer malware with admin accounts

Other access control failures include shared accounts (multiple users sharing a single set of credentials), accounts for former employees that have not been disabled, and weak password policies that do not meet the Cyber Essentials minimum requirements.

How to Avoid This Failure

Audit all user accounts before your assessment. Ensure that standard users do not have administrative privileges, that all accounts belong to current employees, and that your password policy meets or exceeds Cyber Essentials requirements (minimum 8 characters for accounts with multi-factor authentication, 12 characters without). Implement a formal joiner-mover-leaver process to ensure that accounts are created, modified, and disabled in a timely manner.

Reason 4: End-of-Life Software Still in Use

If a software product is no longer receiving security updates from its vendor, it cannot be used within the scope of a Cyber Essentials assessment. This rule catches many organisations off guard, particularly those running legacy applications that depend on older software versions.

The most high-profile example in 2025 is Windows 10, which reaches end of mainstream support in October 2025. Organisations that have not migrated to Windows 11 by their assessment date will need to either complete the migration, purchase Microsoft's Extended Security Updates (ESUs), or remove Windows 10 devices from scope.

But operating systems are only part of the picture. Office 2016 and Office 2019 are also approaching or have reached their end of support. Older versions of PHP, Python, .NET Framework, and other development platforms may be running on servers within scope. Even seemingly minor utilities like WinRAR or Notepad++ can be flagged if they are running unsupported versions.

How to Avoid This Failure

Maintain a software asset register that tracks the support status and end-of-life dates for every application within your scope. Set calendar reminders at least six months before a product reaches end of life so that you have adequate time to plan and execute a migration. Where migration is not immediately feasible, consider whether the affected systems can be removed from scope.

Reason 5: Inadequate Malware Protection

Cyber Essentials requires that all devices within scope have malware protection that is kept up to date and configured to prevent the execution of malicious software. For Windows and macOS devices, this typically means having an antivirus or endpoint protection solution installed, enabled, and configured to receive automatic signature updates.

Common failures in this area include antivirus software that has been installed but subsequently disabled by the user, signature databases that are out of date because the device has been offline or the update mechanism has failed, and devices that have no malware protection at all.

The rise of cloud-based endpoint detection and response (EDR) solutions has generally improved the situation, but organisations that rely on traditional antivirus products with local signature databases are still vulnerable to update failures, particularly for devices that are frequently offline or connected to slow network links.

How to Avoid This Failure

Verify that every device within scope has active, up-to-date malware protection. Use a centrally managed solution that provides visibility into the protection status of all devices. If you are using Windows, Microsoft Defender (included with Windows 10 and 11) is a perfectly acceptable solution, provided it is enabled and configured to receive automatic updates.

Reason 6: Insecure Configuration of Cloud Services

As more UK businesses migrate to cloud platforms like Microsoft 365, Google Workspace, and AWS, the Cyber Essentials scheme has evolved to include cloud services within its scope. This means that the configuration of your cloud environment is now subject to assessment — and many organisations are not prepared for this.

Common cloud configuration failures include not enabling multi-factor authentication (MFA) for all users, granting excessive permissions to service accounts, failing to disable legacy authentication protocols that bypass MFA, and not configuring audit logging. Microsoft 365 tenants are a particularly common source of failures, as the default configuration is not sufficiently secure for Cyber Essentials compliance.

Pro Tip

Use Microsoft's Secure Score tool to assess your Microsoft 365 configuration before your Cyber Essentials Plus assessment. It highlights security gaps and provides step-by-step remediation guidance. Aim for a Secure Score of at least 70% as a baseline.

How to Avoid This Failure

Review the security configuration of all cloud services within scope. At minimum, ensure MFA is enabled for all user accounts, legacy authentication protocols are blocked, audit logging is enabled, and administrative accounts are using conditional access policies. The NCSC provides specific guidance on securing cloud services for Cyber Essentials compliance.

Reason 7: Scope Definition Errors

Sometimes organisations fail not because of a specific technical deficiency but because they have defined the scope of their assessment incorrectly. The Cyber Essentials scheme requires that all devices and services that access the internet or process internet-derived data are included in scope. Attempting to exclude devices that should be in scope — whether intentionally or through oversight — will result in a failed assessment.

Common scope errors include forgetting about mobile devices (particularly personal devices used for work email), excluding networked printers and other IoT devices, failing to include remote workers' home networks and devices, and not accounting for cloud services like email, file storage, and CRM systems.

How to Avoid This Failure

Work through the scoping exercise carefully and honestly. If a device connects to the internet and is used for business purposes, it is almost certainly in scope. When in doubt, include rather than exclude — it is far better to invest the effort in securing a device than to face an embarrassing scope challenge during the assessment.

Reason 8: Poor Evidence and Documentation

While Cyber Essentials Plus is primarily a technical assessment, assessors also look for evidence that your security controls are being managed consistently and deliberately. If your patching strategy amounts to "we update things when we remember," that lack of rigour will show in the scan results.

Organisations that maintain clear documentation — patching schedules, configuration standards, access control procedures, incident response plans — tend to perform significantly better in their assessments. This is not because the documentation is assessed directly (it is not), but because the discipline of maintaining documentation drives the consistent application of security controls.

Preparing for Success: A Pre-Assessment Checklist

Based on the common failures outlined above, here is a practical checklist that your organisation should work through before your Cyber Essentials Plus assessment.

Do Before Your Assessment

Essential preparation steps
Run a vulnerability scan against all in-scope devices
Patch all critical and high-severity vulnerabilities
Remove or update all end-of-life software
Audit firewall rules and change default passwords
Remove admin rights from standard user accounts
Enable MFA on all cloud service accounts
Verify malware protection is active on every device

Common Mistakes to Avoid

Pitfalls that cause failures
Assuming self-assessment answers match reality
Forgetting about third-party application patches
Leaving default credentials on network devices
Excluding devices that should be in scope
Skipping the pre-assessment vulnerability scan
Ignoring mobile and BYOD devices
Relying on consumer-grade router security

What Happens If You Fail?

Failing a Cyber Essentials Plus assessment is not the end of the world, though it is certainly frustrating and potentially costly. Most certifying bodies offer a remediation period — typically 30 days — during which you can address the identified issues and submit for a re-test. The re-test usually incurs an additional fee, but it is significantly less than the cost of a completely new assessment.

If the failures are minor — a handful of missing patches or a single misconfigured device — remediation and re-testing can often be completed within a week. For more systemic issues, such as a complete lack of patch management tooling or widespread use of administrator accounts, the remediation may take longer and require more fundamental changes to your IT management practices.

The key is to treat a failure as a learning opportunity. Understand exactly what went wrong, implement changes that address the root cause (not just the symptoms), and use the experience to build a more robust security posture going forward.

The Value of Professional Support

Given the failure rates and the complexity of the requirements, many UK organisations choose to work with a specialist partner to prepare for their Cyber Essentials Plus assessment. A good partner will conduct a pre-assessment gap analysis, help you remediate any issues, and guide you through the assessment process with confidence.

The cost of professional support is typically a fraction of the cost of failing and having to remediate under time pressure. More importantly, the process of working with an expert builds internal capability and understanding that serves the organisation well beyond the immediate assessment.

Cyber Essentials Plus certification demonstrates to your customers, partners, and regulators that your organisation takes cybersecurity seriously. By understanding the common reasons for failure and preparing thoroughly, you can approach your assessment with confidence and achieve certification on your first attempt.

Get Certified with Confidence

Our team has guided hundreds of UK organisations through successful Cyber Essentials Plus certifications. We identify gaps before assessors do and ensure you pass first time. Talk to us about your certification journey.

Explore Cyber Essentials Plus Services
Tags:Cyber Essentials PlusCommon FailuresAssessment Tips
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.