Customer Support +44 (0) 1183 801501 Email us

Cyber Certification


Cyber Certification

Authentic Associates is a Certification Body for the Cyber Essentials Scheme and can provide Cyber Essentials, Cyber Essentials Plus and IASME accreditation services.

Cyber Essentials — gained by self-assessment, this certification provides assurance to stakeholders that your business is compliant with the fundamentals of the Cyber Essentials Scheme.
Cyber Essentials PLUS — involves both internal and external testing of your network and computers performed on site. This certification provides a more detailed level of assurance that you are compliant with the Cyber Essentials Scheme.
IASME Standard – Information Assurance for Small to Medium Enterprises – Available either as a self-assessment or assessed by an independent auditor, this standard allows SMEs to demonstrate their level of cyber security in a realistic and affordable way. Demonstrating you are following best practice when protecting client and supplier information.

In addition we offer our tailored assessments or managed services to continually monitor your security and visibility on the dark web.

Security Assessments

Our tailormade assessments range from simply illustrating how easily an attack can be made against your organisation to showing how an external source could gain full access and control.

Covering Cyber Security Reviews, Penetration Tests, Red Team exercises and Gap Analysis for certifications.

Having established your specific requirements we develop an individual scope of testing which we carry out with your permission.

Managed Services

Continuous Protective Monitoring – Active security monitoring of your IT systems, providing analysis on how they are used and assess any security incidents as they arise.

Cyber Intelligence Assessments – Regular threat and intelligence reports ensuring you keep pace with the ever changing threat.

Information Security Executives – Providing experienced cyber security professionals to cover roles such as Chief Information Officer (CIO), Chief Information Security Officer (CISO) and / or Chief Technical Officer (CTO). Our flexible model will be tailored to meet the needs of your organisation working either on site, on call, or on demand.