Insights
In this article, we guide you through how to protect a remote charity with Cyber Essentials and maintain good cyber security and compliance
With charities increasingly embracing remote and hybrid working, protecting your charity’s digital environment has never been more important or more challenging. Fortunately, the Cyber Essentials certification provides a framework to ensure your charity remains protected from the most common cyber threats, even with a fully remote workforce.
Below, Robert Connor, Cyber Essentials Assessor and Cyber Advisor at Cyber Sense guides you through the steps to scope a remote charity for Cyber Essentials and maintain compliance.
Find out more about Cyber Essentials
To keep cyber security on track, designate a trustee or senior staff member as your cyber security lead. This person doesn’t need to be a technical expert—they will simply ensure essential tasks are completed, policies are up to date, and Cyber Essentials requirements are met.
If additional support is needed, consider working with a Cyber Advisor. You can find trusted providers through the National Cyber Security Centre (NCSC).
Any asset that regularly accesses charity data falls within the scope of this assessment, making it crucial to maintain a comprehensive and up-to-date list. For remote charities, this is especially important. After all, you can only protect what you know exists. Use a straightforward spreadsheet to track all devices and cloud services, ensuring that no asset is overlooked.
To stay organised, create three separate worksheets for:
Workstations: Laptops and desktop computers, including their operating system versions
Mobile Devices: Phones or tablets used for work purposes, including operating system details
Cloud Services: Platforms like email providers, file-sharing tools, and CRM systems
For example: Your spreadsheet might include five key columns: the device name (e.g., "Laptop-123"), the operating system and version (e.g., "Windows 11 Pro v23H2"), the assigned user, confirmation that all security updates are applied, and whether unnecessary software has been removed.
A great time to update your asset list is during team meetings, at least quarterly. Use these opportunities to confirm device details and ensure everyone’s tools are accounted for. The IASME Cyber Essentials Knowledge Hub can guide you in determining whether devices are compliant.
Fully remote charities must pay special attention to the configuration of employees’ devices. Start your Cyber Essentials journey with a full audit, ensuring all devices meet baseline security standards. This can even be conducted remotely by observing the employee’s device setup during a Teams call.
For Computers:
Verify that devices use standard user accounts, not admin accounts, to reduce risks
Confirm firewalls are enabled – this is important as employee’s home routers are outside of the scope for Cyber Essentials
Ensure anti-malware software is installed and up to date
Check that all software is updated and running the latest versions
Ensure unnecessary software is removed from the computer
For Mobile Devices:
Verify that lock screens and passwords are enabled
Check that only secure apps are installed for work purposes
Ensure updates are applied promptly
If you’re uncertain about the technical aspects of these checks, consider working with a Cyber Advisor to ensure everything is correctly configured. The IASME Knowledge Hub can also help you review current requirements and align your devices with best practices.
Cloud services are a lifeline for remote charities, but they can also be points of vulnerability. Cyber Essentials requires that multi-factor authentication (MFA) is enabled for all cloud accounts.
This simple step significantly enhances security by requiring an additional verification step, even if a password is compromised. Most cloud platforms, like Microsoft 365, Google Workspace, and Dropbox, provide step-by-step guides in their knowledge bases to help you configure MFA.
Include a column in your asset list to track whether MFA is available and configured for each service.
Documenting your onboarding process ensures new hires and devices align with security standards from day one, reducing vulnerabilities. Include the following in your checklist:
Training on security policies: New hires should understand password requirements, phishing awareness, and secure communication practices
Setting up MFA: Ensure all accounts have MFA enabled during the onboarding process
Device configuration: New devices should meet Cyber Essentials standards from day one
A strong onboarding process creates a secure foundation for your team and your charity’s operations
Once your organisation has scoped its systems and applied the necessary measures, seek certification to Cyber Essentials. Certification provides external validation of your efforts and demonstrates your commitment to security.
Consider working with an Assessor from a Certification Body to guide you through the process and ensure your remote setup meets the required standards. Certification not only ensures compliance but also boosts donor confidence and operational resilience.
Security is not a one-time event. Fully remote charities should schedule regular check-ins to update their asset spreadsheets, particularly when:
New employees or devices are added
Staff leave or change roles
Devices or software are replaced or decommissioned
To make this easier, schedule quarterly reminders or include it as a standing agenda item in team meetings. Keeping your records accurate ensures readiness for annual Cyber Essentials recertification.
Securing a fully remote charity may seem daunting, but by following these steps, you can simplify the process and stay compliant with Cyber Essentials. Nominate a responsible person, maintain a robust asset list, conduct regular device checks, and implement strong onboarding practices. With consistent effort, your charity can protect its mission from cyber threats and build trust with its supporters.
Cyber Essentials is the Government approved, annually renewable cyber security certification scheme for organisations of all sizes.
Cyber Advisor is the National Cyber Security Centre’s (NCSC) scheme to help small and medium-sized organisations find reliable, cost-effective cyber security consultancy. Cyber Advisors are assessed against whether they can understand and communicate with small organisations to give proportionate and sensible cyber security support.
Our courses aim, in just three hours, to enhance soft skills and hard skills, boost your knowledge of finance and artificial intelligence, and supercharge your digital capabilities. Check out some of the incredible options by clicking here.