Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCSC Playbook Embeds Cyber Essentials in Supply Chains
News

NCSC Playbook Embeds Cyber Essentials in Supply Chains

Team-CWDBy Team-CWDDecember 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


UK government security experts have called on the country’s businesses to embed best practice security in their supply chains using a new playbook.

The National Cyber Security Centre (NCSC) said on Friday that the government’s Cyber Essentials (CE) scheme should be used as an assurance mechanism. It can be deployed in combination with a new NCSC Supplier Check tool, which enables organizations to quickly check which of their suppliers are certified, and to what level – CE or CE Plus.

The NCSC also reminded those UK businesses with a turnover of under £20m that CE certification entitles them to free cyber-liability insurance, including professional incident response support.

Read more on Cyber Essentials: UK Cyber Essentials Certification Numbers Falling Short

The playbook itself contains actionable advice, tools and resources to help businesses embed CE in their supply chains. It consists of seven steps:

  1. Understand your supply chain and any security risks that may affect your operations/reputation/contracts/safety
  2. Define a set of supplier security profiles
  3. Consider a minimum set of security requirements for each profile, using CE to help where appropriate
  4. Consider how to communicate and enforce minimum security requirements with suppliers
  5. Incentivize CE adoption
  6. Embed CE adoption into procurement processes and RFPs
  7. Monitor adoption via the Supplier Check tool

The NCSC said its Supply Chain Principles guide can also help organizations better understand the cyber-risks associated with suppliers for steps 1 and 2.

“There have been too many occasions where we’ve seen first-hand the impact that cyber-attacks can have on businesses. Supply chains can provide numerous points that attackers look to exploit, but only 14% of firms are on top of the potential risks faced by their immediate suppliers,” said cybersecurity minister, Liz Lloyd.

“That’s why we wrote to the UK’s leading companies, to set out steps to bolster their cybersecurity – including a specific action on securing supply chains using the Cyber Essentials scheme – which should be a priority for every company.”

Cyber Essentials Still Struggling

The NCSC said CE is a great way for organizations to improve baseline security posture, noting that 43% suffered a cyber-attack over the past year.

However, take up remains low. Even though quarterly certifications surpassed the 10,000 milestone for the first time in the first three months of the year, there are nearly six million private sector businesses in the UK.

Awareness of the best practice framework sank to just 12% of businesses polled by the government in June, down from 16% in 2022. The figures for large (51%) and medium (43%) businesses are higher, but still nowhere near universal.

The study claimed just 3% of UK businesses are accredited, rising to 21% of large organizations.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
Next Article The Budget Effect of a Security Incident
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.