In May 2021, Dublin's Health Service Executive suffered a ransomware attack that cost over €100 million to recover from, disrupted patient services for months, and crippled IT systems across the country. The attack was not a sophisticated nation-state operation. It exploited a combination of unpatched systems, absent multi-factor authentication, and excessive admin privileges — the same three vulnerabilities that both the Essential 8 and Cyber Essentials are specifically designed to address. The controls existed. They were not applied.
Irish SMEs, particularly those in Donegal and the North-West operating with limited IT resources, face a genuine decision: which framework to use to structure their cybersecurity improvement. Both the Essential 8 and Cyber Essentials offer clear paths to better protection. The right choice depends on your situation.
The Essential 8: Australia's Proactive Defence
The Essential 8 is a set of prioritised mitigation strategies developed by the Australian Cyber Security Centre. It is structured around a maturity model — Level 0 through Level 3 — that allows organisations to improve progressively rather than facing a binary pass or fail. The eight strategies address the specific attack techniques most commonly used against organisations: application control, patching applications, configuring Office macro settings, user application hardening, restricting administrative privileges, multi-factor authentication, patching operating systems, and regular backups.
What distinguishes the Essential 8 from Cyber Essentials is its technical depth and its explicit focus on preventing a broader range of attack types. Where Cyber Essentials focuses on mitigating opportunistic attacks through five foundational controls, the Essential 8 also addresses more sophisticated techniques — macro-based malware delivery, privilege escalation, and lateral movement within networks. For an Irish business handling sensitive data or operating in a high-value supply chain, that additional depth matters.
The Essential 8 does not, by default, offer a certification credential. It is a framework for implementing and measuring controls, not a badge to display to clients. That is both a limitation and a strength: organisations can work toward genuine security improvement without the certification overhead, but they cannot easily demonstrate that improvement to external stakeholders without independent verification.
Cyber Essentials: The UK's Verifiable Baseline
Cyber Essentials is a UK government-backed certification scheme that proves your business has implemented five core technical controls — firewalls, secure configuration, user access control, malware protection, and patch management — verified by an independent certification body. The self-assessment is reviewed by an accredited assessor and you receive a certificate valid for one year.
For Irish businesses, the commercial significance of Cyber Essentials is growing rapidly. A Cork manufacturing firm lost a €2.3 million contract after failing a client cybersecurity audit that required Cyber Essentials certification. A Donegal professional services firm found itself excluded from a public sector tender on the same basis. These experiences are becoming more common as enterprise procurement teams formalise their supplier security requirements and use recognisable certifications as the qualifying threshold.
Cyber Essentials costs roughly €375 to €500 for a small business. It is achievable in weeks once the five controls are genuinely in place. It provides a recognised, verifiable credential that directly answers the most common supplier security questionnaires. For a business where client demands are the primary driver, it is the most practical first certification available.
Are your clients or prospects asking for Cyber Essentials certification — or likely to ask for it in the next twelve months? Book a free 20-minute strategy call — we help Irish SMEs from Donegal to Dublin identify the right framework, implement the controls, and achieve the certification they need to protect and win business.
A Direct Comparison for Irish SMEs
The Essential 8 provides more technical depth and a more comprehensive control set, particularly for preventing ransomware and targeted attacks. Its maturity model allows organisations to demonstrate progressive improvement and target the most critical controls first. It is more demanding to implement, particularly at higher maturity levels, and more appropriate for businesses facing elevated risk — those handling medical, financial, or legal data, or those in critical supply chains.
Cyber Essentials provides a verifiable, widely recognised credential that satisfies most current client and procurement requirements. It is more accessible for businesses with limited IT resources, has a lower implementation cost, and offers a faster path to a credential that enterprises and public sector bodies accept. The Data Protection Commission has noted that documented, certified security controls are a relevant factor in assessing organisational compliance with GDPR data security obligations.[^1]
For a Sligo hotel whose primary concern is the ransomware risk that encrypted its booking system on a bank holiday weekend, the Essential 8's explicit backup and patching strategies — and its application control requirements — provide stronger ransomware-specific protection than Cyber Essentials alone. For a Letterkenny accountancy firm whose clients are asking for a security credential before renewing their engagements, Cyber Essentials provides the answer those clients need.[^2]
The Irish Context: What NCSC Ireland Says
The NCSC Ireland does not mandate either framework for Irish SMEs, but its guidance endorses a structured, risk-based approach to cybersecurity that both frameworks support. The CyFUN Cyber Fundamentals Framework, which the NCSC recommends as the primary NIS2 compliance tool for Irish organisations, is compatible with both. Implementing Cyber Essentials controls covers the Protect function of CyFUN. Implementing Essential 8 controls at Maturity Level 2 covers Protect, Detect, and elements of Recover.
An Garda Síochána's Garda NCCB consistently reports that the majority of Irish business cyber incidents are preventable with the controls that both frameworks require. The specific controls where Irish SMEs most commonly fail — MFA, patch management, access control, tested backups — appear in both frameworks. The choice between them should be driven by your client requirements and risk profile, not by which controls to implement.[^3]
The Conclusion: It Is Not Either/Or
The best answer for most Irish SMEs is not a choice between the Essential 8 and Cyber Essentials, but a sequenced approach that uses both. Implement the five Cyber Essentials controls first — they are the foundation and the fastest path to a verifiable credential. Then layer in the additional Essential 8 controls — application control, macro hardening, user application hardening — to address the attack techniques that Cyber Essentials does not explicitly cover. Use the Essential 8 maturity model to measure and improve your security posture over time.
Both frameworks repeat the same core controls because those controls work. Implement MFA, patching, access control, and tested backups and you have eliminated most of the risk that actually leads to Irish SME cyber incidents.
What Next: Three Actions for Irish SMEs
First, identify whether any of your current clients or near-term prospects require Cyber Essentials certification. Review any supplier questionnaires, contract documents, or procurement requirements you have received in the past six months. If Cyber Essentials appears, it is the right immediate priority. If it does not appear yet, it will.
Second, implement MFA across all business accounts this week regardless of which framework you choose. Both frameworks require it. It is available at no additional cost in Microsoft 365 and Google Workspace. It is the highest-impact single control available for any Irish business.
Third, test your backups this month. Ask your IT support or managed service provider to demonstrate a successful restore from your most recent backup. Document the result. If they cannot demonstrate it, your backup strategy needs immediate review — ransomware protection without tested backups is not protection at all.
[^1]: Data Protection Commission Ireland [^2]: NCSC Ireland — Advice for Organisations [^3]: An Garda Síochána — Cybercrime
Related Reading
- Essential 8: Eight Australian Cyber Strategies Every Irish SME Should Adopt
- CyFUN, Cyber Essentials and Essential 8: A Small Business Guide
- Mapping CyFUN, Cyber Essentials and Essential 8 to NIST CSF 2.0
Pragmatic Security — Cybersecurity advisory for Irish businesses. Based in Donegal, Ireland. CISA, CISSP, CISM certified advisors.