entrustIT Insights

The Cyber Resilience Act: What you need to know

Written by Tom Dodd | Feb 9, 2026 12:30:00 PM

If you run a UK business that uses, sells, or relies on technology, you may soon hear more about the Cyber Resilience Act (CRA). While it is an EU regulation, it will begin to have real‑world consequences for UK companies from September – including many SMEs that do not consider themselves “tech businesses”.

This article explains, in plain terms, what the Cyber Resilience Act is, why it affects UK businesses, what compliance will involve, and why working with a Managed Service Provider (MSP) can significantly reduce risk and complexity.

What Is the Cyber Resilience Act?

The Cyber Resilience Act is a European Union regulation designed to improve the cybersecurity of products with digital elements. In simple terms, this includes:

  • Software

  • Hardware connected to networks or the internet

  • Systems that rely on embedded software

The intention is straightforward: products sold into the EU should be secure by design, properly maintained, and supported when security issues arise.

Although the CRA fully comes into force in 2027, a critical part of the regulation — mandatory cyber incident and vulnerability reportingstarts in September. This is the first point at which many businesses will be directly affected.

Why the Cyber Resilience Act Impacts UK Businesses

A common misconception is that EU regulations no longer apply to UK firms. The Cyber Resilience Act is different.

The CRA applies based on where your customers are, not where your business is located. If your organisation:

  • Sells software or digital products to EU customers

  • Manufactures or brands technology used in the EU

  • Provides software embedded in other products sold into the EU

…then the Cyber Resilience Act applies to you.

This includes many UK SMEs who sell through distributors, online platforms, or partners in Europe — even if EU sales are a small percentage of overall revenue.

From September, failure to comply can lead to:

  • Regulatory scrutiny

  • Financial penalties

  • Restrictions on selling into EU markets

  • Reputational damage with customers and partners

For directors, this becomes a commercial and governance issue, not a technical one.

What Happens in September 2026?

From September, organisations covered by the Cyber Resilience Act must begin reporting certain cyber issues to EU authorities.

Specifically, this includes:

  • Actively exploited vulnerabilities in products

  • Serious cyber incidents that affect the security of customers or systems

Reporting timelines are tight:

  • Initial notification within 24 hours of becoming aware

  • Further detail within 72 hours

  • Follow‑up reporting once a fix or mitigation is available

This requires organisations to know what technology they have, where vulnerabilities exist, and how incidents are detected and managed.

For many SMEs, this level of visibility simply does not exist today.

What Compliance Will Look Like in Practice

Compliance with the Cyber Resilience Act is not about buying a single tool or completing a one‑off exercise. It requires ongoing operational capability, including:

1. Visibility of Systems and Software

You need an accurate understanding of:

  • What software and systems you operate

  • What third‑party components they rely on

  • Where EU exposure exists

2. Cyber Incident Detection and Response

You must be able to:

  • Detect security incidents quickly

  • Assess whether they meet CRA reporting thresholds

  • Respond and report within mandated timeframes

3. Vulnerability Management

This includes:

  • Monitoring for known vulnerabilities

  • Understanding whether they are actively exploited

  • Applying fixes and documenting actions taken

4. Documentation and Audit Readiness

Regulators may ask you to demonstrate:

  • How incidents were handled

  • What controls were in place

  • Whether reasonable steps were taken to protect customers

For SME directors, the key challenge is that these are ongoing responsibilities, not theoretical ones.

Why Partnering with an MSP Makes Sense

For most SMEs, building this capability internally is expensive, slow, and difficult to maintain. This is where a Managed Service Provider (MSP) can add significant value.

A competent MSP can:

  • Maintain a live inventory of systems and software

  • Monitor for cyber threats and vulnerabilities

  • Detect and triage incidents in real time

  • Support reporting obligations under the Cyber Resilience Act

  • Provide evidence of controls, processes, and response actions

Crucially, an MSP helps translate regulatory requirements into operational reality, without requiring directors to become cybersecurity experts.

From a governance perspective, partnering with an MSP also demonstrates that the board has taken reasonable and proportionate steps to manage cyber risk — an increasingly important factor in regulatory and contractual discussions.

What Directors Should Do Next

Ahead of September, directors should be asking:

  • Do we sell any digital products or software into the EU?

  • Would we know if a serious cyber vulnerability existed tomorrow?

  • Could we respond and report within 24–72 hours if required?

If the answers are unclear, the Cyber Resilience Act should be treated as a priority risk, not a future problem.

Early engagement — particularly with a trusted MSP — can turn the CRA from a compliance threat into a structured, manageable programme that protects both revenue and reputation.