End-of-Life Devices: The Silent Risk to Your Cyber Essentials Certification

Outdated, end-of-life hardware could be putting your Cyber Essentials certification at risk. Find out how unsupported devices can jeopardise compliance—and what you can do about it.

cyber essentials
Cyber Essentials has become a baseline requirement for organisations across the UK, especially those working with public sector contracts or handling sensitive data. It’s designed to help businesses defend against common cyber threats—but achieving (and maintaining) certification means more than just ticking boxes.

One often-overlooked risk? End-of-life (EoL) hardware.

In this blog, we’ll explain what EoL means, why it matters for your Cyber Essentials compliance, and what steps your organisation should take to stay secure and certified.

What Does “End-of-Life” Hardware Actually Mean?

When a manufacturer declares a product as “end-of-life,” it means the device:

  • No longer receives software or security updates
  • Is no longer supported by the vendor
  • Will not be patched for newly discovered vulnerabilities
  • May not work reliably with modern systems

This includes things like:

  • Outdated desk phones
  • Legacy routers, switches, and firewalls
  • Unsupported operating systems (e.g. Windows 7 or Server 2012)
  • Older mobile devices or IP handsets

Why Is EoL Hardware a Problem for Cyber Essentials?

Cyber Essentials requires that all devices within scope are secure and up to date. If you’re running unsupported equipment, you’re immediately at risk of non-compliance—even if the rest of your environment is fully protected.

Key Risks EoL Devices Pose:

  • Unpatched vulnerabilities – No security updates means attackers can exploit known issues.
  • No vendor support – If something goes wrong, there’s no fix or workaround.
  • Limited compatibility – Older devices may not support modern encryption or authentication standards.
  • Increased attack surface – Cybercriminals often target outdated hardware because they know it’s unlikely to be secured.

Important: During a Cyber Essentials assessment or audit, if any EoL device is found in scope, even if it’s not actively in use, you could fail certification.

What Does the Cyber Essentials Scheme Say?

The National Cyber Security Centre (NCSC) is clear: devices must be supported to be compliant.

Operating systems and software that are no longer supported must be removed from scope or segregated from the rest of the network.” — NCSC Cyber Essentials Technical Requirements

That means:

  • No unsupported operating systems or firmware
  • No networked legacy equipment without justification and segmentation
  • No excuses — EoL means out of scope, or out of compliance

Taking corrective action — such as replacing outdated devices — can restore compliance, but not without consequences. In many cases, delays in addressing unsupported technology can disrupt operations, create unnecessary risk, and stall critical business activities.

What You Should Do Now

If you’re preparing for Cyber Essentials—or simply want to protect your business—it’s essential to identify and phase out EoL hardware before it becomes a liability.

Action Plan:

  1. Audit all connected devices – Phones, routers, switches, PCs, mobile devices.
  2. Check support status – Look up firmware and OS support from the manufacturer.
  3. Document everything – Prove that each device is supported and up to date.
  4. Replace where needed – Prioritise phones, firewalls, and networking gear.
  5. Isolate if you can’t replace – If a device must remain, segment it from the rest of your network.

Don’t Let Old Devices Undermine Your Compliance

Cyber Essentials is a powerful safeguard, but it’s only as effective as your most neglected asset. That overlooked device in the corner could be the reason you fail certification, expose customer data, or lose out on critical contracts.


You can find out more about Cyber Essentials and why its vital for all businesses here.


Call us now or book a free consultation to protect your business and keep compliance on track.

Like what you’ve read?

Join our newsletter and receive regular updates, guides and articles that can help you improve your business infrastructure.

Share this article

You might be interested in…

  • phonesystemsfeature e1720513867759 1

    Keep calling on-site with cloud failover

    Whether you’re a small start-up or a multinational corporation, having the right phone system is crucial for business growth and continuity.

    Discover

  • phoneserrvicefewautre 1

    Business VoIP phone services across the UK

    With our suite of phone services, we’re dedicated to elevating your business’s communication capabilities. Stay connected with SIP trunking and global numbering, collaborate seamlessly, and scale your unified communications infrastructure effortlessly.

    Discover

  • AdobeStock 408113732

    Cyber Essentials Certification

    Cyber Essentials is aimed at helping organisations of all sizes and across various industries to implement cybersecurity practices to protect against common cyber threats.

    Discover

Want to get started?

View our products & services or get in touch with one of our advisors.

Use the contact form for IT support enquiries, plan questions, or audit requests.

Share this page