Protect your customers to protect your brand

We are excited to release a set of documents aimed at assisting organizations in safeguarding their customers against various cyber-enabled crimes, including fraud. This updated guidance is applicable to any organization with an online presence, with a particular focus on those offering online customer accounts or those at risk of being impersonated by criminals attempting…

Read More

Protecting internet-facing services on public service CNI

In my role as a security architecture consultant with the National Cyber Security Centre (NCSC), I am privileged to collaborate with critical national infrastructure (CNI) organizations in the public sector. The challenges they encounter in ensuring our safety are always intriguing. From safeguarding the United Kingdom’s energy grids and water supplies to securing transportation, healthcare,…

Read More

Facing the cyber threat behind the headlines

Notice This blog post is a revised version of a letter originally published in the Times. (opens in a new tab, subscription required) The recent series of significant cyber attacks serves as a crucial reminder of the ongoing threat we face. These incidents are not isolated; they reveal the daily realities encountered by the National…

Read More

The problems with forcing regular password expiry

The practice of mandating regular password expiration is frequently adopted in various security policies. Nevertheless, in the Password Guidance released in 2015, we advised against this practice. This article outlines the reasoning behind our unexpected recommendation and presents our perspective on the best approach moving forward. To mitigate the risks associated with an attacker possessing…

Read More

TLS 1.3: better for individuals – harder for enterprises

The Secure Sockets Layer (SSL) protocol was initially launched in 1994 by Netscape. It has undergone several modifications, most notably rebranding to Transport Layer Security (TLS), and has emerged as one of the most widely utilized encryption protocols on the Internet. Initially designed to safeguard financial transactions and personal data for rising e-commerce ventures online,…

Read More

Advanced Cryptography: new approaches to data privacy

In recent years, researchers have developed groundbreaking mathematical techniques in Advanced Cryptography that allow users to manage, search, and compute with sensitive data while ensuring robust cryptographic security for that data. The NCSC has released a white paper on the applications of Advanced Cryptography. This document assists users in evaluating which techniques may be appropriate…

Read More

Impact of AI on cyber threat from now to 2027

The role of AI in enhancing cyber intrusion operations is expected to continue evolving, leading to a rise in the frequency and severity of cyber threats. Cyber threat actors are likely already leveraging AI to improve their existing tactics, techniques, and procedures (TTPs) when it comes to victim reconnaissance, vulnerability research, exploit development, social engineering…

Read More

Incidents impacting retailers – recommendations from the NCSC

Preparation and resilience extend beyond simply establishing robust defenses against intruders. Despite the effectiveness of your security measures, there may be instances when attackers successfully breach your defenses. This approach involves not only identifying threat actors exploiting legitimate access to your employees, network, or cloud services, but also containing these attackers to mitigate damage. Additionally,…

Read More

Cyber security for major events

Large-scale events are becoming increasingly dependent on digital technologies. Cyber attacks that threaten the confidentiality, integrity, or availability of these systems can lead to significant disruptions, resulting in both financial losses and damage to reputation. This guide provides a framework for integrating Cyber Risk Management processes into the planning of major events. While the focus…

Read More
Back To Top