Skip to main content

ARVITENI

Case StudiesAboutBlogContact Us

ARVITENI

technology partner for regulated organisations

Managed IT, purpose-built software, AI consulting, and technology consulting for regulated organisations across England.

Services

Managed ITAI ConsultingTech Consulting

Products

CareGate ATSSoonCareGate CRMSoonCareGate LMSSoonCareGate AnalyticsSoonCareGate ConnectSoonCareGate SenseSoonClara AI

Sectors

CareHousingCharitiesProfessional Services

Company

AboutCase StudiesBlogContact

Legal

Privacy PolicyCookie PolicyTerms of UseAccessibility

© 2026 Arviteni Ltd. All rights reserved.

Arviteni Ltd. Registered in England and Wales. Company No. 12255133. VAT No. 340921227. Registered office: Greetwell Place, 2 Lime Kiln Way, Lincoln, LN2 4US.
All posts

7 April 2026 · 8 min read · Arviteni

Cyber Essentials for Housing Associations: A Practical Guide

Housing associations hold sensitive tenant data and face growing cyber threats. Here's what Cyber Essentials certification involves, why funders and partners increasingly expect it, and how to get there.

Cybersecurity
Compliance
Housing Associations
Cyber Essentials

Cyber Essentials for Housing Associations: A Practical Guide

In 2023, a ransomware attack on a major UK housing association locked staff out of tenancy management, repairs scheduling, and financial systems for weeks. Tenants could not report repairs. Rent payments could not be processed. Vulnerable tenants flagged for safeguarding fell through the gaps.

The housing sector holds some of the most sensitive personal data of any industry — tenancy agreements, financial details, vulnerability assessments, domestic abuse records, safeguarding referrals, and health information. Yet cyber maturity across the sector remains uneven. The National Cyber Security Centre has highlighted housing as a sector that faces significant and growing cyber risk.

Cyber Essentials certification is the UK government's baseline security standard. It is not expensive, it is not overly complex, and it is increasingly expected by local authority partners, lenders, and insurers. Here is what housing associations need to know.

What Cyber Essentials covers

Cyber Essentials is built around five technical controls. These are not aspirational goals — they are specific, testable requirements:

1. Firewalls

Every device that connects to the internet must be protected by a properly configured firewall. For housing associations, this includes office networks, remote worker connections, and any cloud-hosted systems. Default firewall rules should block all inbound connections except those explicitly required.

2. Secure configuration

Devices and software must be configured securely. Default passwords must be changed. Unnecessary software must be removed. Auto-run and auto-play must be disabled. This applies to every device — desktops, laptops, tablets, and smartphones used by housing officers, repairs teams, and office staff.

3. User access control

Access to data and services must be controlled through user accounts with appropriate privileges. Admin accounts should only be used for administration tasks, not day-to-day work. Every user should have their own account (no shared logins). Multi-factor authentication should be enabled wherever possible.

For housing associations, this is particularly important for systems containing tenant vulnerability data, safeguarding records, and financial information. Not every member of staff needs access to everything.

4. Malware protection

Devices must be protected against malware. This means anti-malware software that is kept up to date and configured to scan files automatically. For housing associations managing a distributed workforce with mobile devices, this includes ensuring endpoint protection covers every device that accesses corporate systems.

5. Security update management

Software must be kept up to date. Security patches must be applied within 14 days of release. Unsupported software (past its end-of-life date) must be removed or isolated from the network. This is one of the most common failure points — housing associations running legacy systems that no longer receive security updates are exposed to known vulnerabilities.

Cyber Essentials vs Cyber Essentials Plus

There are two levels of certification:

Cyber Essentials is a self-assessment questionnaire verified by a certification body. It costs between £300 and £500 and takes most organisations two to four weeks to complete (assuming the controls are already in place). It demonstrates that you have the five controls implemented.

Cyber Essentials Plus includes everything in the basic certification plus an independent technical audit. A qualified assessor tests your systems directly — scanning for vulnerabilities, testing configurations, and verifying that the controls work in practice. It costs between £1,500 and £3,000 depending on the size and complexity of your environment.

For housing associations, Cyber Essentials Plus is increasingly the expected standard. Local authority partners commissioning supported housing services often require it. Lenders funding development programmes ask about it during due diligence. Insurance underwriters offer better premiums for certified organisations.

Why housing associations are targeted

Housing associations are attractive targets for cyber criminals for several reasons:

High-value data. Tenancy records include names, addresses, dates of birth, National Insurance numbers, bank details, and income information. Vulnerability assessments and safeguarding records are highly sensitive. This data has significant value on criminal markets.

Large attack surface. Housing associations operate distributed workforces — housing officers visiting properties, repairs teams using mobile devices, call centre staff working remotely. Every device and every connection point is a potential entry.

Legacy systems. Many housing associations run older housing management systems that were designed before modern cyber threats existed. Integrations between systems sometimes rely on insecure methods. Legacy infrastructure that "still works" may harbour vulnerabilities that have been publicly known for years.

Supply chain exposure. Housing associations work with dozens of contractors, maintenance firms, and service providers. Each one that connects to your systems or handles your data is a potential vulnerability. The contractor who uploads gas safety certificates to your portal, the repairs scheduling company that accesses your job management system, the surveyor who receives tenant contact details — all are part of your attack surface.

Pressure to restore services. When a housing association is hit by ransomware, the pressure to restore services is immense. Tenants cannot report emergencies. Rent processing stops. Safeguarding systems go offline. This pressure makes housing associations more likely to pay ransoms than organisations whose operations are less immediately life-affecting.

Common gaps we see

Working with housing associations on cybersecurity, the same issues appear repeatedly:

Shared accounts. Multiple staff sharing a single login to the housing management system, making it impossible to audit who accessed what. This fails Cyber Essentials and creates safeguarding risks.

Unmanaged mobile devices. Housing officers and repairs teams using personal phones to access work email, tenant data, and scheduling systems without any mobile device management in place.

No MFA on critical systems. Housing management systems, finance platforms, and email accounts protected by passwords alone. A single compromised password gives an attacker access to thousands of tenant records.

Patching delays. Security updates not applied for months because "the system is working fine" or because a legacy application breaks when the underlying platform is updated.

No tested backup recovery. Backups exist but have never been tested. When ransomware hits, the organisation discovers that backups are incomplete, corrupted, or take days to restore.

Contractor access uncontrolled. Third-party contractors with VPN access or system credentials that were never revoked after the contract ended.

How to get certified

The practical path to Cyber Essentials certification:

Step 1: Gap assessment

Assess your current position against the five controls. For each control, document what you have in place and where the gaps are. This typically takes one to two days and can be done internally or with IT partner support.

Step 2: Remediation

Address the gaps identified. Common remediation work includes:

  • Deploying multi-factor authentication across all accounts
  • Enrolling mobile devices into a device management platform
  • Removing shared accounts and creating individual logins
  • Applying outstanding security patches
  • Configuring firewalls correctly (especially for remote access)
  • Removing or isolating unsupported software

The remediation phase varies from a few days (if your environment is well-managed) to several weeks (if there are significant legacy issues).

Step 3: Self-assessment

Complete the Cyber Essentials self-assessment questionnaire through an accredited certification body (such as IASME or CREST-accredited assessors). Answer honestly — the questionnaire is designed to verify your controls, and misrepresenting your position defeats the purpose.

Step 4: Certification

The certification body reviews your submission and either issues the certificate or identifies areas that need further work. Certification is valid for 12 months and must be renewed annually.

Step 5: Consider Plus

Once you hold Cyber Essentials, consider progressing to Cyber Essentials Plus. The independent technical audit gives genuine assurance (not just self-declared compliance) and meets the higher expectations of funders, commissioners, and insurers.

Beyond certification

Cyber Essentials is a baseline, not a ceiling. Housing associations handling particularly sensitive data (domestic abuse cases, safeguarding referrals, mental health records) should consider additional measures:

  • Staff awareness training — regular, practical training on phishing, social engineering, and data handling. Not annual tick-box exercises, but ongoing education that reflects real threats
  • Incident response planning — a documented, tested plan for what happens when (not if) a security incident occurs. Who is called, what systems are isolated, how tenants are notified
  • Supply chain security — assessing contractor cybersecurity as part of procurement. Requiring Cyber Essentials from suppliers who handle tenant data
  • Data classification — understanding which data requires the highest protection and ensuring access controls reflect that

What to look for in an IT partner

Housing associations need an IT partner who understands the sector context, not just the technology. Questions to ask:

  • Do they understand RSH consumer standards and how cybersecurity relates to compliance?
  • Can they manage the distributed device estate (office, remote, and mobile workers)?
  • Do they have experience with housing management system integrations?
  • Can they support Cyber Essentials certification and guide you through the process?
  • Do they understand the sensitivity of the data you hold and the regulatory requirements around it?

Generic IT support that treats every organisation the same will miss sector-specific risks. Your IT partner should understand why a housing association's cybersecurity needs differ from a retail business or a professional services firm.

Get in touch if you want to discuss your housing association's cybersecurity position. We can assess where you stand against Cyber Essentials, identify the gaps, and build a practical plan to get you certified.