Back to News

Cyber Essentials v3.3 Launches 27 April 2026: The Danzell Update, Auto-Fail Rules and the 8-Day Countdown for UK SMEs

Cyber Essentials v3.3 Launches 27 April 2026: The Danzell Update, Auto-Fail Rules and the 8-Day Countdown for UK SMEs

The clock is ticking. On Monday 27 April 2026 the biggest change to UK Cyber Essentials certification in three years takes effect — and every UK SME that currently holds the badge, is planning to renew, or wants to win public sector work has just eight days to decide what to do about it. The NCSC and IASME are retiring the familiar “Willow” question set and v3.2 requirements, replacing them with the new “Danzell” question set that maps to v3.3 — and Danzell brings the first automatic-fail questions the scheme has ever contained, a fundamentally tightened definition of what counts as a “cloud service”, and a Cyber Essentials Plus audit process that will finally catch the selective-patching habits many businesses had quietly been relying on.

For roughly 40,000 UK organisations that hold Cyber Essentials and the far larger population that plans to certify in 2026, this is not a tweak. It is a genuine step change in what the scheme demands and what your assessor will reject on the spot. This article unpacks every significant change in v3.3, shows you exactly where most SMEs will trip up, and gives you a practical 10-step plan to be ready on 27 April — or, realistically, to have a clear runway through the summer.

8 days
Until Cyber Essentials v3.3 and the Danzell question set become mandatory for new certifications
100%
Cloud services now require MFA on every admin and standard user account — no exceptions
14 days
Maximum window to apply critical and high-severity patches before automatic assessment failure
43%
Of UK businesses suffered a cyber breach or attack in the last year, according to the Government’s Cyber Security Breaches Survey

What Is Actually Changing on 27 April 2026?

Cyber Essentials is a Government-backed, NCSC-designed certification scheme administered by IASME. It is built around five technical controls — firewalls, secure configuration, user access control, security update management and malware protection — that together block roughly 80% of the commodity cyber attacks UK SMEs face. Certification has two tiers: the self-assessed Cyber Essentials badge, and the independently audited Cyber Essentials Plus badge, which is increasingly a tender prerequisite for public sector, healthcare, legal and supply-chain work.

The scheme is refreshed approximately every two years. The current v3.2 Requirements for IT Infrastructure came into force in April 2025 and are paired with the “Willow” question set you see in the IASME self-assessment portal today. v3.3 was published on 8 January 2026 to give organisations a full quarter of notice, and on 27 April 2026 it replaces v3.2 entirely for new applications. The matching question set is called Danzell. Together these are widely referred to as the “Danzell update” or simply “Cyber Essentials 2026”.

The critical cut-off date

If you purchase your Cyber Essentials or Cyber Essentials Plus certification on or before Sunday 26 April 2026, you can still complete the assessment against the Willow question set and v3.2 Requirements — and you then have six months to submit your self-assessment. Any purchase made from Monday 27 April onwards goes through Danzell and v3.3, with no exceptions. This creates a narrow last-chance window for organisations that are not yet ready for the new rules.

The Three Changes Every UK SME Must Understand

There are many smaller adjustments in the Danzell update, but three in particular will determine whether your next assessment passes or fails. These are not minor clarifications — each one converts what was previously an advisory or best-effort control into a hard, binary pass-or-fail gate that your assessor is instructed to apply without discretion.

1. MFA on cloud services is now an automatic fail

Under Willow, multi-factor authentication on cloud services was strongly required and checked during assessment, but missing MFA on a single standard user account would typically trigger a remediation request rather than an instant failure. Under Danzell, question A6.4 makes MFA on every administrative and standard user cloud service account an automatic-fail requirement. If a single eligible account does not have MFA enforced, the assessment fails at that question and you cannot progress further until it is fixed.

The definition of “where available” has also tightened. Under the new rules, if a cloud service supports MFA — which in 2026 includes virtually every mainstream SaaS product from Microsoft 365 and Google Workspace through to Xero, QuickBooks, Salesforce, HubSpot, GitHub, Slack, Dropbox, Zoom, DocuSign and the rest — MFA must be enabled. You can no longer justify its absence by arguing that it is inconvenient, that users dislike it, or that your service provider has not made it a default. SMS remains an acceptable MFA method, although authenticator apps and FIDO2 keys are strongly preferred.

2. 14-day patching is now an automatic fail

Question A6.5 introduces a second automatic-fail trigger around patch management. Under Danzell, critical and high-severity patches for operating systems, applications and firmware must be applied within 14 days of release. One unpatched device sampled during Cyber Essentials Plus testing can fail the entire assessment.

The CE Plus audit process has been specifically redesigned to catch “selective patching” — the pattern IASME spotted in audits where organisations would rush to patch the specific devices their assessor had asked to sample, rather than genuinely running a consistent patch policy across the estate. Danzell introduces a two-stage sampling process: if the first device sample reveals a patching failure, the assessor takes a second, larger sample. If the second sample also fails, the overall CE Plus assessment fails and IASME will revoke any existing certificate. This is the first time the scheme has contained an explicit revocation route for in-life certificates.

3. The definition of “cloud service” has been widened

Under v3.2, organisations could sometimes exclude cloud services they felt were peripheral to their operations. Under v3.3, the definition is rewritten as any on-demand, scalable service hosted on shared infrastructure, accessed via the internet through an organisational account, that stores or processes your organisation’s data. This pulls in a much wider list: file storage, accounting, CRM, customer support, marketing automation, code repositories, payroll, e-signature platforms, HR tools, AI assistants, password managers and every other SaaS product your business uses.

Every one of those services must be documented, scoped, protected with MFA, and brought under the shared responsibility model. For many SMEs this will be the single biggest piece of preparation work: producing an accurate, complete inventory of every SaaS product in use, who uses it, what data it touches, and who owns the security configuration.

Auto-Fail Controls Under Cyber Essentials v3.3 Danzell

MFA on cloud services
Auto-Fail
14-day critical patching
Auto-Fail
Unsupported software in scope
Auto-Fail
Default admin passwords unchanged
Auto-Fail
CE Plus two-sample patching failure
Revocation
Incomplete cloud service inventory
Major Non-Conformity
Missing director declaration
Blocker

The Wider Danzell Changes You Still Need to Plan For

Beyond the three headline rules, Danzell introduces a set of operational and procedural tightenings that collectively raise the bar for what “compliant” actually looks like. These are not auto-fail items on their own, but they shape how your assessor will interpret the evidence you submit and how forgiving they will be when you fall short.

The director declaration now requires ongoing commitment

Every Cyber Essentials application requires a board-level sign-off. Under Danzell, that declaration is explicitly extended: the director signs not just a statement of truth about the current state of controls, but a commitment to maintain those controls for the full 12 months of the certification period. IASME is empowered to investigate subsequent incidents and, if evidence shows controls were dropped post-certification, to revoke the badge. This mirrors the approach taken by ISO 27001 and similar frameworks and aligns Cyber Essentials with the direction of travel for regulated sectors.

Scoping is stricter — and whole-organisation is the default assumption

Under v3.2, organisations could relatively easily opt for partial scopes, certifying only a particular department, product line or office. Under v3.3, whole-organisation scope is presumed unless you can justify and document a clear boundary. Any excluded systems must be supported by a credible rationale and evidence that the excluded segment cannot access certified assets, certified data or certified users. This is intended to stop the creative scoping that some organisations were using to bypass controls on troublesome legacy systems.

BYOD and home working have tighter rules

Any device used to access organisational data must be in scope, and any personal device (BYOD) in scope must have the five controls applied — including software firewall, patching, malware protection, and a documented, enforced BYOD policy. Remote workers must also have patch management that covers their home devices within the 14-day window. Many SMEs have been relaxed about remote patching; Danzell closes that loophole.

Passwords, brute-force and the 12-character rule

Password rules under v3.3 remove the legacy expiry and complexity requirements and replace them with a length-based approach: minimum 12 characters without MFA, or minimum 8 characters with MFA. Brute-force protection — lockout after a small number of failed attempts, or equivalent throttling — is mandatory. Password managers must be provided to users where practicable. Expiry on a timed basis is now explicitly discouraged.

CE Plus sampling is tougher and more prescriptive

CE Plus now requires the assessor to use IASME-approved vulnerability tooling (Qualys, Nessus and other mainstream tools remain eligible). The sampling logic has been rewritten so that an assessor can expand the sample if irregularities are detected, can verify MFA across both admin and standard user accounts rather than admins only, and can test cloud service configurations directly rather than relying on the organisation’s self-description. Point-in-time certification is preserved, but the window for modifying Verified Self-Assessment (VSA) responses after submission is narrowed.

Where Most SMEs Will Fail: The Gap Analysis

We have run preliminary gap analyses across a cross-section of Cloudswitched clients and prospective clients in recent weeks. The pattern is remarkably consistent. Here is where businesses are landing when measured against v3.3 today.

MFA across all cloud SaaS

High Risk

Most SMEs have MFA on Microsoft 365 but not on every SaaS tool. Xero, HubSpot, Mailchimp, Dropbox and smaller niche apps are the common gaps. Every one of these now triggers auto-fail.

Complete cloud inventory

High Risk

Almost no SME we have spoken to has an accurate, up-to-date list of every cloud service in use. Shadow IT — tools signed up for by individual users without IT approval — is rampant and undocumented.

14-day patching with monitoring

Medium Risk

Patching policies exist, but monitoring and evidence collection rarely do. If your assessor asks for proof that every device was patched within 14 days for the last quarter, can you produce it?

BYOD policy with enforcement

High Risk

Most businesses have a BYOD policy that lives in an HR handbook but has no technical enforcement. Under v3.3, the assessor expects to see MDM, conditional access or equivalent technical controls.

Unsupported software isolated

Medium Risk

Windows 10 reached end-of-life on 14 October 2025. Any device still running Windows 10 without Extended Security Updates is an auto-fail. Office 2016 and Office 2019 are also out of mainstream support and will trip assessments.

Admin interface protection

Medium Risk

Router admin panels, NAS devices, printers and edge firewalls frequently still have default credentials or are exposed to the internet. Each is an auto-fail under v3.3’s strengthened firewall rules.

Remote worker patching

Medium Risk

Hybrid and fully remote workers often fall out of centralised patching. Laptops that spend weeks off the corporate network can go unpatched. v3.3 does not distinguish between office and home devices.

Director declaration evidence

Low Risk

The formal sign-off is straightforward in most SMEs, but businesses without clear governance need to identify now who will sign and how ongoing compliance will be evidenced through the year.

Willow vs Danzell: The Side-by-Side Comparison

If you are trying to work out whether to push for a Willow-based certification before 26 April or wait and prepare properly for Danzell, this comparison shows the material differences that will shape your decision.

Willow — v3.2 (until 26 April 2026)

  • Question set: Familiar Willow questions used since April 2025
  • MFA rule: Required on admin accounts; remediation-friendly on user accounts
  • Patching: 14 days required; minor lapses often treated as non-conformity rather than failure
  • Cloud scope: Narrower — peripheral SaaS could often be excluded
  • CE Plus sampling: Single-pass sample; selective patching sometimes went undetected
  • Scoping: Partial organisation scope widely accepted
  • Director declaration: Point-in-time statement of truth
  • Valid until: Certifications purchased before 27 April remain valid for 12 months; self-assessment window is 6 months from purchase
  • Best for: Organisations already well-progressed, renewing, or needing a badge before mid-summer

The Real-World Business Impact

The tighter rules will hurt if you are not ready, but the commercial value of the badge has never been higher. Here is why Cyber Essentials still matters more than ever in 2026.

Tenders, supply chains and insurance

Cyber Essentials is increasingly a hard requirement. It is mandatory for most central government contracts, for handling sensitive Government information, and for an expanding list of NHS, local authority, defence supply chain and professional services tenders. The NCSC published a supply chain playbook in early 2026 that encourages large organisations to require Cyber Essentials from their suppliers as a minimum security baseline — and the biggest UK employers are increasingly following through. If your business is in a B2B supply chain, losing or failing to achieve the badge is now a revenue risk, not just a compliance inconvenience.

Cyber insurance is following the same path. Most UK cyber insurance policies now either require or heavily discount for Cyber Essentials certification. Insurers are tightening their wording so that a revoked certificate during an incident can become grounds for claim reduction. The Danzell revocation rules make this more than hypothetical.

The 19 June 2026 management deadline

The other deadline you cannot ignore

Running alongside the Danzell switchover, a separate regulatory update requires every UK business to have a formal internal process for identifying, managing and reporting cyber-related incidents by 19 June 2026. This is broader than Cyber Essentials itself — but an up-to-date CE certification is one of the most straightforward ways to evidence that process to auditors, clients and insurers. Businesses that delay both decisions risk scrambling to meet two overlapping deadlines in the same quarter.

The cost of not certifying versus the cost of certifying

Scenario Typical cost What it covers
Cyber Essentials (self-assessed) £300 – £500 per year Certification fee, typical SME scope, 12-month badge
Cyber Essentials Plus £1,400 – £3,500 per year Independent audit, external and internal vulnerability scans, larger evidence pack
Typical SME breach cost (2026) £4,200 Direct remediation, downtime and customer notification costs for a small business
Serious incident (ransomware) £75,000 – £350,000 Ransom, forensics, downtime, lost contracts, regulatory fines for medium UK organisations
Lost tender / contract 10–40% of annual revenue Direct revenue loss when a major customer requires Cyber Essentials and the badge has lapsed

Looked at purely as financial risk management, a few hundred pounds a year to carry the Cyber Essentials badge is one of the cheapest insurance products a UK SME can buy. What Danzell changes is that buying the badge now requires you to do the work the scheme was always supposed to demand — no more paper-only compliance.

62%
UK SMEs with current Cyber Essentials

Of the UK SMEs Cloudswitched assessed in preparation for Danzell, only 62% of those holding a current Cyber Essentials badge would pass the new v3.3 rules without remediation. The remaining 38% have at least one automatic-fail exposure — most commonly missing MFA on a peripheral SaaS product.

Your 10-Step Danzell Readiness Plan

This is the practical action plan Cloudswitched walks clients through when we are preparing them for v3.3. Whether you are certifying for the first time, renewing, or stepping up from CE to CE Plus, working through these ten items in order will put you in a passing position.

1 Produce a complete cloud service inventory Week 1

List every SaaS tool your organisation uses — Microsoft 365, Google Workspace, accounting, CRM, HR, marketing, developer tools, file sharing, password managers, AI assistants, everything. Capture who owns it, what data it holds and which users have access. Audit billing records, SSO logs and browser-based usage reports to catch shadow IT.

2 Enforce MFA on every cloud service, admin and user Week 1–2

Walk through the inventory and enable MFA on every account that supports it. Microsoft 365 Conditional Access, Google Workspace 2-step verification, authenticator apps for everything else. Any exceptions must be documented and justified — but assume “no MFA” means auto-fail, so push to zero exceptions.

3 Decommission or isolate unsupported software Week 2

Windows 10, older Office versions, end-of-life Android devices, unsupported macOS versions and legacy line-of-business applications must either be upgraded, covered by a paid ESU programme, or fully isolated from in-scope systems. Keep the evidence of upgrade or isolation ready for the assessor.

4 Deploy a patch management platform with reporting Week 2–3

Intune, Jamf, Kandji, Action1, NinjaOne or an equivalent RMM tool. Configure it to deploy critical patches within 14 days and, crucially, to produce the compliance report that proves it. “We try to patch” is not evidence. “Here is a report showing 99.4% of devices patched within the window over the last 90 days” is.

5 Bring remote and BYOD devices into scope Week 3

Either ban BYOD entirely or enforce controls on it: MDM enrolment, conditional access, software firewall, patch management. Document the BYOD policy, have employees sign it, and tie access to compliance status. For personally-owned phones accessing work email, Microsoft Intune App Protection policies are usually sufficient.

6 Lock down admin interfaces and default passwords Week 3

Audit every router, firewall, NAS, printer and IoT device on your network. Change default credentials. Disable remote admin on the internet side. Put internal admin panels behind MFA or IP allowlisting. Document each device, its owner, its credentials vault entry and its patch status.

7 Upgrade passwords and brute-force protection Week 4

Move to a 12-character minimum without MFA, or 8 characters with MFA enforced. Turn off legacy complexity and expiry rules in Active Directory and identity providers. Confirm every cloud service enforces account lockout or throttling. Roll out a business password manager such as 1Password, Bitwarden or Keeper.

8 Write the scope and boundary document Week 4

Whole-organisation scope is the default. If you need to carve out any system, produce a clear written justification, show how users and data are segregated, and be ready to defend the boundary under CE Plus testing. Include a network diagram and a data flow summary.

9 Brief the director and prepare the ongoing declaration Week 5

Identify the board-level director who will sign. Walk them through the controls, the ongoing commitment clause, and the quarterly evidence pack they will review. Build a simple monthly dashboard so the commitment is auditable, not theoretical.

10 Dry-run the assessment before you buy Week 5–6

Before you purchase certification, walk the Danzell question set end-to-end with your IT partner or internal security lead. For CE Plus, commission a mock vulnerability scan. Fix what surfaces. Only then buy the assessment. This is the single biggest predictor of first-time pass versus expensive re-submission.

Cyber Essentials Plus: Why the Audit Has Suddenly Become Much Harder

The headline Danzell changes apply to both CE and CE Plus, but CE Plus carries extra weight because its independent audit stage is where selective compliance gets exposed. Here is what has specifically changed in the Plus audit process and why businesses that passed CE Plus last year should not assume they will breeze through in 2026.

CE Plus audits must now use IASME-approved vulnerability tooling. Assessors are given a fresh mandate to check MFA enforcement across both administrative and standard user cloud accounts, rather than sampling admin accounts only. Endpoint configuration is tested more rigorously, particularly firewall configuration, browser security settings and locked-down admin accounts. The audit window for modifying VSA responses has been narrowed, so you cannot materially change your answers after submission.

The most important change is the two-stage device sampling process. In a first-stage sample, the assessor picks a handful of devices and runs vulnerability scans. If any device fails — for example, missing a critical patch released more than 14 days ago — the assessor takes a second, expanded sample. If the second sample also fails, the assessment fails overall and IASME has the authority to revoke the certificate. This directly targets selective patching, where organisations historically rushed to patch “the devices the assessor wanted to see” rather than genuinely applying consistent patch policy across the whole estate.

What this means for your CE Plus budget

Expect audit times to lengthen by roughly 20–40%, and expect remediation cycles to become more common rather than less. Budget for proactive vulnerability scanning in the months before your audit — not as a Cyber Essentials cost, but as an ongoing operational investment. The businesses that pass CE Plus cleanly under Danzell are the ones that run their own monthly vulnerability scan rather than treating the annual audit as their only check.

80%
of commodity attacks blocked

The NCSC estimates that Cyber Essentials’ five controls, fully implemented, block approximately 80% of the commodity cyber attacks UK businesses face — phishing with credential theft, opportunistic ransomware, exploitation of unpatched internet-facing systems, and brute-force attacks on weak authentication.

Danzell tightens those controls so they actually work in practice. The real benefit of the 2026 update is not the badge — it is the operational resilience that comes from implementing the controls in a way that survives a real attacker.

Timeline: What to Expect in the Next 90 Days

For organisations planning their next certification cycle, the next three months split into three distinct phases. Here is how to think about sequencing decisions and spend.

January 2026 — Danzell published

v3.3 Requirements for IT Infrastructure and the Danzell question set published by IASME, giving the market 12 weeks of preparation runway.

April 2026 (current) — Final two weeks of Willow

The last opportunity to purchase a Willow-based Cyber Essentials or Cyber Essentials Plus assessment. Organisations well-advanced on v3.2 compliance should consider locking in a Willow purchase this week. You then have six months to complete the self-assessment under v3.2.

27 April 2026 — Danzell switchover

All new Cyber Essentials and Cyber Essentials Plus purchases move to v3.3 and the Danzell question set. Auto-fail triggers on MFA, patching and unsupported software become active. Whole-organisation scope becomes the default.

May–June 2026 — First wave of Danzell assessments

Expect higher-than-usual failure rates in this first wave as organisations discover gaps during real assessments. Assessors will be calibrating their approach to the new rules; early applicants should budget for one round of remediation.

19 June 2026 — Internal cyber process deadline

Separate but related deadline: every UK business should have a formal internal process for identifying, managing and reporting cyber-related incidents by this date. Cyber Essentials certification is one of the cleanest ways to evidence this process.

Q3–Q4 2026 — Supply chain wave

Large UK organisations implementing the NCSC’s supply chain playbook will progressively mandate Cyber Essentials across their supplier base. Expect your larger customers to start asking about your certification status during contract renewals from the summer onwards.

Should You Push for a Willow Purchase This Week?

Cloudswitched is genuinely asked this question most days at the moment. The honest answer is: it depends on your starting position, your contractual pressure and your appetite for deferring hard work.

Push for Willow this week if…

  • You already have a v3.2 assessment mostly complete and can finish inside the 6-month self-assessment window.
  • Your certification is lapsing in the next 60 days and you need continuity.
  • You have a live tender or contract renewal that requires a current Cyber Essentials badge in the next quarter.
  • Your estate has one or two Danzell gaps (typically missing MFA on a peripheral SaaS product or Windows 10 devices) that you genuinely cannot resolve in the next 4–6 weeks.

Take the time and go straight to Danzell if…

  • You have time, budget and executive support to do the work properly.
  • You are certifying for the first time and want a certification that actually reflects good security hygiene.
  • Your next certification anniversary is six months or more away, giving you breathing room to do the gap closure work.
  • You are stepping up from CE to CE Plus and want the certification to be defensible against Danzell’s tougher audit.

The Cloudswitched view

For the majority of our SME clients, our recommendation is to aim directly for Danzell rather than scramble for a last-minute Willow purchase. The v3.2 badge you might secure this week will still need to be re-certified against Danzell in 12 months, and by then the rules will have been in force long enough that assessors will have zero tolerance for gaps. The work is the work — better to do it once, properly, than twice under pressure.

How Cloudswitched Helps UK SMEs Pass Cyber Essentials v3.3

Cloudswitched is a UK-based managed IT and cybersecurity provider. We deliver Cyber Essentials readiness, remediation and certification support as an embedded part of our managed services for SMEs across the UK. Our Cyber Essentials service covers the full journey from initial gap analysis to certified badge and ongoing compliance management.

Gap analysis & readiness assessment

We walk the Danzell question set across your real environment — Microsoft 365, Google Workspace, your device estate, your network, your SaaS portfolio, your remote workers, your suppliers. You receive a pass/fail/remediate scoring against every Danzell question, a prioritised remediation plan, and a fixed-fee scope to close the gaps.

Remediation delivery

Deployment of Microsoft Intune or Jamf for device management, Conditional Access and MFA configuration, patch management tooling with compliance reporting, firewall and router hardening, password manager rollout, BYOD policy and enforcement, and the evidence pack your assessor will expect.

Certification support

We work alongside an IASME-certified assessment body to guide you through the Danzell VSA or CE Plus audit. Our clients have a consistent track record of first-time passes, because the assessment is never the first time anyone looks at the evidence.

Ongoing compliance management

Post-certification, our managed service maintains the controls through the 12-month period — monthly patch compliance reporting, quarterly evidence reviews for the director declaration, MFA enforcement monitoring across your SaaS stack, and proactive remediation before any control drifts. This is how the director declaration’s ongoing commitment becomes real rather than theoretical.

Book a Danzell Readiness Call

Book a 30-minute Cyber Essentials v3.3 readiness call with a Cloudswitched security engineer. We will walk through your current position against the Danzell rules, identify your auto-fail exposures, and give you a fixed-fee remediation plan with a target certification date.

Book a readiness call →

Frequently Asked Questions

If we hold Cyber Essentials today, does our certificate become invalid on 27 April 2026?
No. Any Cyber Essentials or Cyber Essentials Plus certificate issued before 27 April 2026 remains valid for its full 12-month period under the v3.2 rules it was issued against. The Danzell switchover only affects new purchases made from 27 April onwards. Your badge keeps its meaning until it expires, and the change only hits you at renewal time.
What happens if we buy Cyber Essentials on 26 April 2026 but do not complete the assessment until June?
You stay on the v3.2 Willow question set for the full six-month self-assessment window from the date of purchase. So a Willow purchase on 26 April gives you until late October to submit. This is the narrow window many organisations are using to buy themselves an extra year under the old rules. Be honest with yourself about whether that extra year genuinely helps you, or just delays the inevitable Danzell remediation work.
Is SMS still an acceptable MFA method under v3.3?
Yes, SMS is still an acceptable second factor under Cyber Essentials 2026, although authenticator apps and FIDO2 hardware keys are preferred. What matters for Danzell is not the MFA method but the fact that MFA is enforced on every administrative and standard user cloud service account. A mix of SMS and authenticator app across your user base is fine, as long as there are no unprotected accounts.
Does Danzell apply to the cloud services we use, or only to our own devices and network?
Danzell explicitly covers cloud services that store or process your organisation’s data. That includes Microsoft 365, Google Workspace, your accounting platform, your CRM, your HR tools, your file sharing, your password manager, your AI assistants, your code repositories and any other SaaS you rely on. The shared responsibility model applies: the cloud provider is responsible for platform security, but you are responsible for how your users access it — MFA, account hygiene, access reviews, data protection settings. Miss any of those and you fail the assessment.
We still have some Windows 10 devices. Can we still pass Cyber Essentials v3.3?
Only if those devices are covered by Microsoft Extended Security Updates (ESU) or are fully isolated from the rest of your certified scope. Windows 10 reached end-of-life on 14 October 2025, and under Danzell any in-scope unsupported software is an automatic fail. The clean answer is to replace or upgrade those devices before assessment. The second-best answer is to carve them out of scope and evidence that they cannot access certified data or systems.
How long does it take to get Cyber Essentials certified under the new rules?
For an SME starting from a reasonable baseline, a realistic Danzell certification path is 4–6 weeks: one week for gap analysis, two to three weeks for remediation work (MFA deployment, patch platform rollout, unsupported software replacement, BYOD controls), one week for evidence gathering and VSA completion, and then the IASME assessment turnaround. Cyber Essentials Plus adds another 2–4 weeks for the audit and vulnerability scanning, depending on your assessor’s availability.
What is the difference between Cyber Essentials and Cyber Essentials Plus under Danzell?
Cyber Essentials is a self-assessed certification: you answer the Danzell question set honestly, a director signs the declaration, and an IASME-certified body reviews your answers. Cyber Essentials Plus adds an independent technical audit by the certification body, including external and internal vulnerability scans, direct testing of endpoint configuration, and the new two-stage device sampling process. Plus gives stronger assurance and is increasingly required by public sector and larger private sector buyers, but it costs more and takes more preparation. For most SMEs, the sensible progression is CE first, then step up to CE Plus once the controls are embedded.
Our IT is largely Microsoft 365 and a handful of SaaS tools. Does that make Cyber Essentials v3.3 easier or harder?
Easier, if you configure Microsoft 365 well, and harder if you do not. A well-configured Microsoft 365 tenant with Conditional Access, Intune, Defender for Endpoint and modern authentication handles most of the Danzell controls automatically — MFA, patching for managed devices, malware protection, user access controls. The gotchas are the SaaS products that sit outside Microsoft 365 (Xero, Mailchimp, GitHub, Dropbox and the rest), the BYOD devices, and the router or NAS sitting in the server cupboard. If your Microsoft 365 licensing is Business Premium or above, you already have most of the tooling; it just needs to be configured and evidenced properly.
Can Cyber Essentials be revoked once we hold the badge?
Yes, and this is new under Danzell. The revised director declaration carries an ongoing commitment to maintain controls through the certification period, and the CE Plus two-stage sampling process explicitly includes revocation as an outcome when patching failures surface. IASME is empowered to investigate post-certification incidents and, if evidence shows controls were dropped, to revoke the badge. This is one of the most important cultural shifts in Cyber Essentials 2026: the badge is no longer a snapshot, it is a commitment.
What is the single biggest mistake SMEs are making in the run-up to Danzell?
Underestimating the shadow IT problem. Almost every SME we gap-analyse discovers a dozen SaaS products in active use that their IT team did not know about — a marketing tool signed up for on a credit card, a design platform adopted by one team, a data tool a developer started trialling. Each of those now needs to be inventoried, brought under MFA, and considered in scope. The businesses that have done the inventory work already are in good shape. The businesses that have not are going to be surprised by how much there is to fix.

The Bottom Line

Cyber Essentials v3.3 is not a quiet refresh. It is the most consequential update to the scheme since its launch in 2014. The Danzell question set introduces genuine automatic-fail triggers on the three areas that have historically been weakest in UK SME security practice — MFA on cloud services, timely patching, and unsupported software. It broadens the definition of cloud service to cover the entire modern SaaS stack, tightens scoping, demands ongoing director-level commitment, and makes CE Plus audits meaningfully harder to breeze through.

That is uncomfortable if you have been treating Cyber Essentials as a paperwork exercise, and welcome if you have been treating it as a genuine security framework. For UK SMEs, the pragmatic path is simple: accept that the Danzell rules are the new floor for responsible cyber hygiene, do the work, and emerge from the next certification cycle with a badge that actually represents the resilience your customers, insurers and regulators increasingly expect.

The 27 April switchover is the forcing function. Eight days is not enough time to transform your security posture from scratch — but it is enough time to make a clear, informed decision about how you want to navigate the next 12 months, and to start the gap-closure work that will pay for itself many times over in avoided breaches, retained contracts and reduced insurance risk.

Start Your Danzell Readiness Today

Cloudswitched delivers Cyber Essentials and Cyber Essentials Plus readiness, remediation and certification support for UK SMEs. Book a 30-minute readiness call with one of our security engineers and walk away with a clear picture of your v3.3 position and a fixed-fee plan to get certified.

Talk to a Cloudswitched engineer →
Tags:Cyber EssentialsCybersecurityIT Support
CloudSwitched

London-based managed IT services provider offering support, cloud solutions and cybersecurity for SMEs.

CloudSwitched Service

Managed IT Support

Proactive monitoring, helpdesk and on-site support for London businesses

Learn More

Technology Stack

Powered by industry-leading technologies including SolarWinds, Cloudflare, BitDefender, AWS, Microsoft Azure, and Cisco Meraki to deliver secure, scalable, and reliable IT solutions.

SolarWinds
Cloudflare
BitDefender
AWS
Hono
Opus
Office 365
Microsoft
Cisco Meraki
Microsoft Azure

Latest Articles

18
  • IT Office Moves

How to Plan IT for a Multi-Floor Office Move

18 Mar, 2026

Read more
18
  • Internet & Connectivity

How to Monitor Your Business Network Performance

18 Mar, 2026

Read more
18
  • IT Office Moves

How to Move Your VoIP System to a New Office

18 Mar, 2026

Read more

Enquiry Received!

Thank you for getting in touch. A member of our team will review your enquiry and get back to you within 24 hours.