UK National Cyber Security Centre Guidance.
This includes feeds from guidance
- Timelines for migration to post-quantum cryptographyon June 18, 2025 at 6:25 am
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years.
- Authentication methods: choosing the right typeon June 11, 2025 at 8:04 pm
Recommended authentication models for organisations looking to move ‘beyond passwords’.
- Software Security Code of Practice – Assurance Principles and Claims (APCs)on May 20, 2025 at 9:01 am
Helps vendors measure how well they meet the Software Security Code of Practice, and suggests remedial actions should they fall short.
- Decommissioning assetson May 20, 2025 at 6:28 am
How to retire digital assets (such as data, software, or hardware) from operation.
- Data breaches: guidance for individuals and familieson May 15, 2025 at 8:48 am
How to protect yourself from the impact of data breaches
- Ransomware: ‘WannaCry’ guidance for home users and small businesseson May 8, 2025 at 11:54 am
Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
- Ransomware: ‘WannaCry’ guidance for enterprise administratorson May 8, 2025 at 11:47 am
Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
- Introduction to logging for security purposeson May 8, 2025 at 11:37 am
Laying the groundwork for incident readiness.
- Cyber security for major eventson May 8, 2025 at 11:32 am
Assessing the cyber security needs of major events.
- Mitigating malware and ransomware attackson April 30, 2025 at 10:13 am
How to defend organisations against malware or ransomware attacks.
- Protective DNS for the private sectoron April 1, 2025 at 8:25 am
Advice on the selection and deployment of Protective Domain Name Systems (DNS).
- Zero trust: building a mixed estateon March 12, 2025 at 10:46 am
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles.
- What is an antivirus product? Do I need one?on March 12, 2025 at 10:44 am
Detect and prevent malicious software and viruses on your computer or laptop.
- Vulnerability scanning tools and serviceson March 12, 2025 at 10:40 am
Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes.
- Video conferencing services: using them securelyon March 12, 2025 at 10:35 am
How to set up and use video conferencing services, such as Zoom and Skype, safely and securely
- Video conferencing services: security guidance for organisationson March 12, 2025 at 10:35 am
Guidance to help you to choose, configure and deploy video conferencing services such as Zoom and Skype within your organisation
- Using IPsec to protect dataon March 12, 2025 at 10:16 am
Guidance for organisations wishing to deploy products that use IPsec.
- Using TLS to protect dataon March 12, 2025 at 10:15 am
Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.
- Transaction Monitoring for online serviceson March 12, 2025 at 10:14 am
This guidance is aimed at service owners and security specialists involved in the provision of online services.
- Takedown: removing malicious content to protect your brandon March 12, 2025 at 10:14 am
How to protect your brand from being exploited online.