NCSC Ireland EndorsedNIS2 Aligned

CyFUN, Cyber Essentials & Essential 8Ireland's Cyber Baseline — Explained

Three frameworks. One goal: protect your Irish business from the attacks that are happening right now. This hub organises everything you need to understand CyFUN, implement Cyber Essentials, and apply Essential 8 — in plain English, with no jargon.

Whether you are starting from zero or trying to demonstrate NIS2 compliance to a regulator or enterprise client, this is your starting point.

11
In-depth articles
6
CyFUN functions covered
3
Frameworks compared
Free
Self-assessment guide

What is CyFUN?

CyFUN — the Cyber Fundamentals Framework — is Ireland's national cybersecurity baseline, published by the NCSC Ireland. It is built on NIST CSF 2.0 and organises cybersecurity into six functions: Govern, Identify, Protect, Detect, Respond, and Recover.

It is voluntary — but it is the NCSC's recommended path to NIS2 compliance. For Irish SMEs trying to demonstrate that they take cybersecurity seriously to regulators, insurers, or enterprise clients, CyFUN is the most credible starting point available.

The framework works alongside — not instead of — Cyber Essentials and Essential 8. Think of CyFUN as the governance structure, Cyber Essentials as the five technical controls, and Essential 8 as the eight prioritised mitigations. Together, they form a complete baseline.

The Three Frameworks at a Glance

CyFUN
Ireland / NCSC · Governance + risk management
NIS2: Directly aligned
Cyber Essentials
UK / NCSC UK · 5 technical controls
NIS2: Complementary
Essential 8
Australia / ACSC · 8 prioritised mitigations
NIS2: Complementary

The Six CyFUN Functions

CyFUN organises cybersecurity into six functions. Each function has a dedicated article and a quick-win guide. Start with Govern — everything else depends on it.

Govern

Establish cybersecurity policies, assign accountability, and ensure leadership understands the organisation's risk exposure. This is the foundation — without governance, every other control is optional.

7-Day CyFUN Govern Quick Start

Identify

Know what you have: hardware, software, data, and the people who access it. You cannot protect what you cannot see. Asset inventory is the single most impactful first step for any SME.

Asset Inventory in a Day

Protect

Implement the controls that reduce your attack surface: MFA, patching, access management, email security, and staff training. This is where Cyber Essentials and Essential 8 live.

MFA Rollout Roadmap

Detect

Know when something is wrong. Logging, monitoring, and alerting are the difference between discovering a breach in hours and discovering it in months — after the damage is done.

Security Monitoring Basics

Respond

Have a plan for when — not if — something goes wrong. An incident response plan does not need to be 50 pages. It needs to answer: who calls who, what do we shut down, and who do we tell?

Incident Response Planning Guide

Recover

Get back to business. Tested backups, documented recovery procedures, and a communication plan for customers and regulators. The Essential 8 backup strategy is the gold standard for SMEs.

Backup Basics: Essential 8 Recovery

Not sure where your business stands on CyFUN?

In a free 20-minute call, we will tell you exactly which CyFUN functions your business already meets, which are gaps, and what to fix first. No sales pitch — just a straight answer.

Book Your Free CyFUN Assessment

Frequently Asked Questions

Free 20-Minute Assessment

Ready to implement CyFUN in your business?

Most Irish SMEs are closer to CyFUN compliance than they think. In a free 20-minute call, we will map your current controls to the six CyFUN functions, identify your biggest gaps, and give you a prioritised action plan — at no cost and no obligation.

We have helped businesses in Donegal, Sligo, and across Ireland implement CyFUN, achieve Cyber Essentials controls, and demonstrate NIS2 compliance to regulators and enterprise clients.

Cookie Preferences

We use cookies to enhance your experience, analyze site traffic, and serve targeted content. By clicking "Accept All," you consent to our use of cookies. You can manage your preferences in our cookie policy.