UK National Cyber Security Centre Guidance.
This includes feeds from guidance
- Protective DNS for the private sectoron April 1, 2025 at 8:25 am
Advice on the selection and deployment of Protective Domain Name Systems (DNS).
- Timelines for migration to post-quantum cryptographyon March 20, 2025 at 3:31 pm
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years.
- Zero trust: building a mixed estateon March 12, 2025 at 10:46 am
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles.
- What is an antivirus product? Do I need one?on March 12, 2025 at 10:44 am
Detect and prevent malicious software and viruses on your computer or laptop.
- Ransomware: ‘WannaCry’ guidance for home users and small businesseson March 12, 2025 at 10:41 am
Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
- Vulnerability scanning tools and serviceson March 12, 2025 at 10:40 am
Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes.
- Video conferencing services: using them securelyon March 12, 2025 at 10:35 am
How to set up and use video conferencing services, such as Zoom and Skype, safely and securely
- Video conferencing services: security guidance for organisationson March 12, 2025 at 10:35 am
Guidance to help you to choose, configure and deploy video conferencing services such as Zoom and Skype within your organisation
- Using IPsec to protect dataon March 12, 2025 at 10:16 am
Guidance for organisations wishing to deploy products that use IPsec.
- Using TLS to protect dataon March 12, 2025 at 10:15 am
Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.
- Transaction Monitoring for online serviceson March 12, 2025 at 10:14 am
This guidance is aimed at service owners and security specialists involved in the provision of online services.
- Takedown: removing malicious content to protect your brandon March 12, 2025 at 10:14 am
How to protect your brand from being exploited online.
- Systems administration architectureson March 12, 2025 at 10:13 am
There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each.
- Supplier assurance questionson March 12, 2025 at 10:08 am
Questions to ask your suppliers that will help you gain confidence in their cyber security.
- Social media: protecting what you publishon March 12, 2025 at 10:07 am
How to reduce the likelihood of unauthorised content appearing within your organisation’s social media channels.
- Social Media: how to use it safelyon March 12, 2025 at 10:07 am
Use privacy settings across social media platforms to manage your digital footprint.
- Smart devices: using them safely in your homeon March 12, 2025 at 10:06 am
Many everyday items are now connected to the internet: we explain how to use them safely.
- Shopping and paying safely onlineon March 12, 2025 at 10:06 am
Tips to help you purchase items safely and avoid fraudulent websites.
- Shadow ITon March 12, 2025 at 10:06 am
Managing ‘unknown assets’ that are used within an organisation.
- Sextortion emails: how to protect yourselfon March 12, 2025 at 10:05 am
Advice in response to the increase in sextortion scams