UK National Cyber Security Centre Guidance.
This includes feeds from guidance
- Phishing attacks: defending your organisationon October 1, 2025 at 2:38 pm
How to defend your organisation from email phishing attacks.
- Maintaining a sustainable strengthened cyber security postureon October 1, 2025 at 1:54 pm
How organisations can avoid staff burnout during an extended period of heightened cyber threat.
- Putting staff welfare at the heart of incident responseon September 30, 2025 at 3:29 pm
Guidance for staff responsible for managing a cyber incident response within their organisation.
- Early Years practitioners: using cyber security to protect your settingson September 26, 2025 at 10:46 am
How to protect sensitive information about your setting and the children in your care from accidental damage and online criminals.
- External attack surface management (EASM) buyer’s guideon September 17, 2025 at 4:34 pm
A guide to choosing the right EASM product for your organisation, and the security features you need to consider.
- Buying, selling and donating second-hand deviceson September 11, 2025 at 1:37 pm
How to erase the personal data from your phone, tablets, and other devices (and why it’s important when you’re buying and selling them).
- Social Media: how to use it safelyon August 29, 2025 at 6:24 am
Use privacy settings across social media platforms to manage your digital footprint.
- Ransomware: ‘WannaCry’ guidance for enterprise administratorson August 13, 2025 at 10:05 am
Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
- Mitigating malware and ransomware attackson August 13, 2025 at 9:54 am
How to defend organisations against malware or ransomware attacks.
- Cyber security for high profile conferenceson August 12, 2025 at 6:23 am
Managing the cyber security of high profile events in the real and virtual worlds.
- Actions to take when the cyber threat is heightenedon August 7, 2025 at 8:45 am
When organisations might face a greater threat, and the steps to take to improve security.
- What is an antivirus product? Do I need one?on August 5, 2025 at 9:14 am
Detect and prevent malicious software and viruses on your computer or laptop.
- Timelines for migration to post-quantum cryptographyon June 18, 2025 at 6:25 am
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years.
- Authentication methods: choosing the right typeon June 11, 2025 at 8:04 pm
Recommended authentication models for organisations looking to move ‘beyond passwords’.
- Software Security Code of Practice – Assurance Principles and Claims (APCs)on May 20, 2025 at 9:01 am
Helps vendors measure how well they meet the Software Security Code of Practice, and suggests remedial actions should they fall short.
- Decommissioning assetson May 20, 2025 at 6:28 am
How to retire digital assets (such as data, software, or hardware) from operation.
- Data breaches: guidance for individuals and familieson May 15, 2025 at 8:48 am
How to protect yourself from the impact of data breaches
- Ransomware: ‘WannaCry’ guidance for home users and small businesseson May 8, 2025 at 11:54 am
Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
- Introduction to logging for security purposeson May 8, 2025 at 11:37 am
Laying the groundwork for incident readiness.
- Cyber security for major eventson May 8, 2025 at 11:32 am
Assessing the cyber security needs of major events.