UK National Cyber Security Centre.
UK National Cyber Security Centre Feed This includes feeds from report, guidance and blog-post
- The cyber threat to Universitieson February 19, 2025 at 3:23 pm
Assessing the cyber security threat to UK Universities
- Organisational use of Enterprise Connected Deviceson February 19, 2025 at 3:11 pm
Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.
- Erasing data from donated deviceson February 19, 2025 at 2:32 pm
How charities can erase personal data from donated laptops, phones and tablets, before passing them on.
- Firmware updates on Linux, and using data to influence procurement decisionson February 19, 2025 at 2:31 pm
Focused on automating UEFI firmware updates on Windows devices.
- What exactly should we be logging?on February 19, 2025 at 2:30 pm
A structured look at what data to collect for security purposes and when to collect it.
- An RFC on IoCs – playing our part in international standardson February 19, 2025 at 2:29 pm
The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol design – and hopes to encourage more cyber defenders to engage with international standards.
- Cyber Essentials Plus is for charities too!on February 19, 2025 at 2:27 pm
Sara Ward, the CEO of Black Country Women’s Aid, discusses her organisation’s experience of gaining Cyber Essentials Plus certification.
- New cloud guidance: how to ‘lift and shift’ successfullyon February 19, 2025 at 2:24 pm
Henry O discusses the pitfalls of performing a basic ‘lift and shift’ cloud migration.
- Drawing good architecture diagramson February 19, 2025 at 2:23 pm
Some tips on good diagram drafting and pitfalls to avoid when trying to understand a system in order to secure it.
- So long and thanks for all the bitson February 19, 2025 at 2:19 pm
Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything.
- The future of telecoms in the UKon February 19, 2025 at 2:17 pm
NCSC Technical Director Dr Ian Levy explains how the security analysis behind the DCMS supply chain review will ensure the UK’s telecoms networks are secure – regardless of the vendors used.
- Studies in secure system designon February 19, 2025 at 2:16 pm
Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
- NCSC’s cyber security training for staff now availableon February 19, 2025 at 2:15 pm
The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into your own training platform.
- New ‘Connected Places’ infographic publishedon February 19, 2025 at 2:14 pm
A new visual guide to the cyber security principles that are essential when developing and managing ‘smart cities’.
- Cyber security for high profile conferenceson February 19, 2025 at 2:12 pm
Managing the cyber security of high profile events in the real and virtual worlds.
- Asset managementon February 19, 2025 at 2:11 pm
Implementing asset management for good cyber security.
- Building and operating a secure online serviceon February 19, 2025 at 2:07 pm
Guidance for organisations that use, own, or operate an online service who are looking to start securing it.
- Pattern: Safely Importing Dataon February 19, 2025 at 1:24 pm
An architecture pattern for safely importing data into a system from an external source.
- Effective steps to cyber exercise creationon February 19, 2025 at 1:23 pm
The following tips can help organisations create their own cyber incident response exercises.
- How to spot scammers claiming to be from the NCSCon February 19, 2025 at 1:17 pm
Check that you’re talking to a genuine NCSC employee, and not a criminal.
- GDPR security outcomeson February 19, 2025 at 1:16 pm
This guidance describes a set of technical security outcomes that are considered to represent appropriate measures under the GDPR.
- Design Pattern: Safely Exporting Dataon February 19, 2025 at 1:14 pm
How to implement a secure end-to-end data export solution
- Early Years practitioners: using cyber security to protect your settingson February 19, 2025 at 1:11 pm
How to protect sensitive information about your setting and the children in your care from accidental damage and online criminals.
- MIKEY-SAKKE frequently asked questionson February 19, 2025 at 1:10 pm
A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.
- Reducing data exfiltration by malicious insiderson February 19, 2025 at 1:09 pm
Advice and recommendations for mitigating this type of insider behaviour.
- Scam ‘missed parcel’ SMS messages: advice on avoiding malwareon February 19, 2025 at 1:07 pm
How to avoid malware sent using scam ‘missed parcel’ SMS messages, and what to do if your phone is already infected.
- Zero trust: building a mixed estateon February 19, 2025 at 1:04 pm
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles.
- Transaction Monitoring for online serviceson February 19, 2025 at 1:02 pm
This guidance is aimed at service owners and security specialists involved in the provision of online services.
- Macro Security for Microsoft Officeon February 19, 2025 at 12:59 pm
Why macros are a threat, and the approaches you can take to protect your systems.
- Making Principles Based Assurance a realityon February 11, 2025 at 4:17 pm
An update on the work to make Principles Based Assurance (PBA) usable in practice.