Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

December 16, 2025

Urban VPN Proxy Accused of Harvesting AI Chat Conversations

December 16, 2025

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

December 16, 2025
Facebook X (Twitter) Instagram
Wednesday, December 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCSC Playbook Embeds Cyber Essentials in Supply Chains
News

NCSC Playbook Embeds Cyber Essentials in Supply Chains

Team-CWDBy Team-CWDDecember 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


UK government security experts have called on the country’s businesses to embed best practice security in their supply chains using a new playbook.

The National Cyber Security Centre (NCSC) said on Friday that the government’s Cyber Essentials (CE) scheme should be used as an assurance mechanism. It can be deployed in combination with a new NCSC Supplier Check tool, which enables organizations to quickly check which of their suppliers are certified, and to what level – CE or CE Plus.

The NCSC also reminded those UK businesses with a turnover of under £20m that CE certification entitles them to free cyber-liability insurance, including professional incident response support.

Read more on Cyber Essentials: UK Cyber Essentials Certification Numbers Falling Short

The playbook itself contains actionable advice, tools and resources to help businesses embed CE in their supply chains. It consists of seven steps:

  1. Understand your supply chain and any security risks that may affect your operations/reputation/contracts/safety
  2. Define a set of supplier security profiles
  3. Consider a minimum set of security requirements for each profile, using CE to help where appropriate
  4. Consider how to communicate and enforce minimum security requirements with suppliers
  5. Incentivize CE adoption
  6. Embed CE adoption into procurement processes and RFPs
  7. Monitor adoption via the Supplier Check tool

The NCSC said its Supply Chain Principles guide can also help organizations better understand the cyber-risks associated with suppliers for steps 1 and 2.

“There have been too many occasions where we’ve seen first-hand the impact that cyber-attacks can have on businesses. Supply chains can provide numerous points that attackers look to exploit, but only 14% of firms are on top of the potential risks faced by their immediate suppliers,” said cybersecurity minister, Liz Lloyd.

“That’s why we wrote to the UK’s leading companies, to set out steps to bolster their cybersecurity – including a specific action on securing supply chains using the Cyber Essentials scheme – which should be a priority for every company.”

Cyber Essentials Still Struggling

The NCSC said CE is a great way for organizations to improve baseline security posture, noting that 43% suffered a cyber-attack over the past year.

However, take up remains low. Even though quarterly certifications surpassed the 10,000 milestone for the first time in the first three months of the year, there are nearly six million private sector businesses in the UK.

Awareness of the best practice framework sank to just 12% of businesses polled by the government in June, down from 16% in 2022. The figures for large (51%) and medium (43%) businesses are higher, but still nowhere near universal.

The study claimed just 3% of UK businesses are accredited, rising to 21% of large organizations.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
Next Article The Budget Effect of a Security Incident
Team-CWD
  • Website

Related Posts

News

USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

December 16, 2025
News

Urban VPN Proxy Accused of Harvesting AI Chat Conversations

December 16, 2025
News

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

December 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.