Recent Breaches
Breaches
View All →
OSS, Compliance & Risk

Cyber Essentials with Offline Secure Storage

Cyber Essentials provides baseline security controls. Offline Secure Storage (OSS) goes further, removing your most sensitive data from the attack surface entirely.

We Think This Is Hard to Ignore

The Co-op had Cyber Essentials certification when attackers exfiltrated 6.5 million members' personal data. Baseline controls protect the perimeter, but data inside the perimeter was still reachable. At Firevault, sensitive data is removed from the certified perimeter entirely, because protection beyond baseline starts with physical disconnection.

£14M

ICO fine to Capita, Cyber Essentials certified at time of breach

ICO, October 2025

£300M

Estimated cost of M&S ransomware despite baseline controls

Reuters, 2025

327

Public sector cyber incidents in 2024

NCSC Annual Review, 2025

6.5M

People affected in single Co-op breach

BBC News, 2025

The Gap

Cyber Essentials is a baseline, not a ceiling.

Baseline Controls

Cyber Essentials covers firewalls, patching, and access controls, but not physical protection.

Beyond the Perimeter

Even with Cyber Essentials Plus, connected data remains reachable by determined attackers.

Government Contracts

Many government contracts now require Cyber Essentials Plus as a minimum.

The Reality

Baseline certification does not prevent breaches.

Capita: £14M Fine Despite Holding Cyber Essentials Certification

Capita held baseline certifications at the time of its breach. The ICO still fined the company £14 million, demonstrating that Cyber Essentials without physical protection is insufficient for sensitive data.

ICO, October 2025

M&S: £300M Loss Despite Baseline Security Controls

Marks and Spencer had established security controls in place. Attackers bypassed them via a compromised third party and deployed DragonForce ransomware, shutting down online operations for months.

Reuters, 2025

Co-op: 6.5 Million Records Stolen Despite Security Measures

The Co-op had security measures in place but attackers still exfiltrated personal data of all 6.5 million members, demonstrating that connected data remains reachable regardless of baseline controls.

BBC News, 2025

How OSS Complements

Go beyond baseline with physical protection.

Offline Secure Storage (OSS) complements Cyber Essentials by removing the most sensitive data from the certified perimeter entirely.

  • Sensitive data removed from the attack surface entirely
  • Reduces scope of Cyber Essentials certification
  • Supports government contract requirements
  • Physical protection exceeds baseline controls

Take Sensitive Data Off the Certified Perimeter

Step 1 of 3

Sensitive data is taken off the certified perimeter and written to physically disconnected RAID 1 drives inside a Firevault Bunker. This reduces the scope of what Cyber Essentials must protect and removes the most sensitive assets entirely.

Featured In

TechRadar ProSecurity BuyerYahoo FinanceSecurityBriefChannel Insider

Choose Your Protection

Which OSS Fits?

300GB

Low Use Vault, Deep Cold Storage

From £74.99/mo

inc. VAT · £0 due today

Offline Secure Storage for Offline Secure Storage, low use vault, deep cold storage.

What 300GB holds

~60,000 high-res photos
~150,000 PDF documents
~1,200 hours of voice recordings
~75 hours of HD video

Specifications

Capacity

300GB

Access

2 windows/week

Authentication

Identity-locked

Commitment

36 months

Security & Compliance

NATO-Approved FacilityDSIT-ReferencedGDPR Art. 32Cyber Essentials Plus

How to Get Started

Step 1

Discovery Call

Understand what you need to protect and how you operate.

Step 2

Vault Configuration

Select your tier, capacity, and access model.

Step 3

Identity Verification

Complete KYC/AML and set up multi-factor authentication.

Step 4

Go Live

Data ingestion, access policy activation, and ongoing support.

Commercial Advantage

Win Business, Earn Trust, and Build Reputation with Butterfly

Butterfly is an operational model that helps organisations structure sensitive data to close deals faster, strengthen client relationships, and demonstrate the governance maturity that wins enterprise contracts.

Built on the VPPP framework (Vault, Policy, Permissions, Purpose), Butterfly maps your sensitive data and assigns dedicated Vaults by role, relationship, and purpose, turning data stewardship into a competitive advantage.

Deal Readiness

Governed materials ready to share with confidence

Client Trust

Demonstrate stewardship that earns loyalty

Board Confidence

Clear governance that inspires stakeholders

Enterprise Scale

Structure data governance across your organisation

Butterfly deployment model

Who Uses Butterfly?

  • Sales Teams

    Secure client proposals, pricing, and commercial intelligence

  • Service Providers

    Exchange sensitive documents with clients through governed Vaults

  • Businesses

    Protect strategic plans, IP, and competitive intelligence

  • Family Offices

    Structure data governance across principals, staff, and advisors

Questions

Frequently Asked

Ready to take the next step?

See how Firevault can protect your most sensitive data with physically disconnected storage.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy

    Firevault

    Firevault is Offline Secure Storage. Hardware you own, physically disconnected by default, with KYC-verified access. Ransomware-proof by design, not by patch.

    © 2026 Firevault Limited. Disconnect to Protect®