Vulnerability Scanning: Keeping on top of the most common threats

Managing a Vulnerability Management Program (VMP) can be more challenging than it appears. Critical vulnerabilities can suddenly arise online, software updates may lag, and misconfigurations can inadvertently compromise your security, often without immediate detection. In this article, we aim to provide some encouragement through vulnerability scanning services and our updated guidance on their selection and…

Read More

Acquiring, managing, and disposing of network devices

Overview Securing a network against potential cyber threats may feel overwhelming. This guide outlines practical steps regarding the acquisition, management, and disposal of devices, aimed at minimizing the risk of successful cyber attacks. Acquisition and Deployment of Network Devices Proper acquisition and initial deployment of network devices are crucial to maintain the security of existing…

Read More

Actions to take when the cyber threat is heightened

Finding the Right Balance in Cyber Risk Management Organizations face varying threats over time, necessitating a careful balance between the current risk level, the necessary defensive measures, the implications of those measures, and the overall risk to the organization. At times, the cyber risks faced by an organization may increase significantly. Moving to a heightened…

Read More

Authentication methods: choosing the right type

This guidance assists organizations in choosing the right method for authenticating their customers accessing online services. It is designed for a range of sectors, such as retail, hospitality, and utilities, but is relevant for any organization needing to authenticate customers when they log into online platforms. By implementing any of the methods outlined here, in…

Read More

Approaching enterprise technology with cyber security in mind

Most cyber threats that an organization encounters can be mitigated effectively when enterprise technology is thoughtfully designed, implemented, and maintained with cybersecurity considerations at the forefront. This document offers guidance on how organizations should effectively approach enterprise technology to prevent cyber threats. When we refer to ‘enterprise technology,’ we are discussing the IT systems utilized…

Read More

Approaching enterprise technology with cyber security in mind

Effective cybersecurity can significantly reduce the effectiveness of most cyber attacks faced by organizations when enterprise technology is strategically deployed, managed, and maintained. This guidance aims to outline how organizations should handle enterprise technology to minimize vulnerabilities to cyber threats. The term ‘enterprise technology’ encompasses the IT infrastructure that supports organizational operations. This includes: Devices…

Read More

Authentication methods: choosing the right type

This guidance assists organizations in selecting a suitable method for authenticating their customers accessing online services. It is targeted at retailers, hospitality providers, and utility services, but is applicable to any organization that requires customer authentication when using online apps or websites. Integrating any of the methods detailed in this guidance (in addition to traditional…

Read More

Building and operating a secure online service

Online services comprise several essential components, each requiring adequate security measures to ensure a trustworthy service. This section explores a broad range of topics, from managing data to securing the various elements of your service. While it’s impossible to ensure any system is entirely secure, striving to design, develop, and deliver a resilient online service…

Read More

Cyber security for high profile conferences

Overview This document builds upon existing NCSC Cyber Security Guidelines for Major Events and aims to cover essential elements such as governance, threat assessment, incident management, and testing processes. Our emphasis will be on analyzing cyber risks, selecting service providers, and establishing assurance protocols. The guidance addresses both physical and online components of high-profile conferences,…

Read More

Building and operating a secure online service

Online services consist of various elements that must be secured to ensure overall service integrity. This section covers a broad range of topics from managing data within your service to protecting its various components. While no system can claim to be completely secure, designing an online service that is as secure as necessary is essential….

Read More
Back To Top