Authentication methods: choosing the right type

This guidance assists organizations in choosing the right method for authenticating their customers accessing online services. It is designed for a range of sectors, such as retail, hospitality, and utilities, but is relevant for any organization needing to authenticate customers when they log into online platforms. By implementing any of the methods outlined here, in…

Read More

Approaching enterprise technology with cyber security in mind

Most cyber threats that an organization encounters can be mitigated effectively when enterprise technology is thoughtfully designed, implemented, and maintained with cybersecurity considerations at the forefront. This document offers guidance on how organizations should effectively approach enterprise technology to prevent cyber threats. When we refer to ‘enterprise technology,’ we are discussing the IT systems utilized…

Read More

Approaching enterprise technology with cyber security in mind

Effective cybersecurity can significantly reduce the effectiveness of most cyber attacks faced by organizations when enterprise technology is strategically deployed, managed, and maintained. This guidance aims to outline how organizations should handle enterprise technology to minimize vulnerabilities to cyber threats. The term ‘enterprise technology’ encompasses the IT infrastructure that supports organizational operations. This includes: Devices…

Read More

Authentication methods: choosing the right type

This guidance assists organizations in selecting a suitable method for authenticating their customers accessing online services. It is targeted at retailers, hospitality providers, and utility services, but is applicable to any organization that requires customer authentication when using online apps or websites. Integrating any of the methods detailed in this guidance (in addition to traditional…

Read More

Building and operating a secure online service

Online services comprise several essential components, each requiring adequate security measures to ensure a trustworthy service. This section explores a broad range of topics, from managing data to securing the various elements of your service. While it’s impossible to ensure any system is entirely secure, striving to design, develop, and deliver a resilient online service…

Read More

Cyber security for high profile conferences

Overview This document builds upon existing NCSC Cyber Security Guidelines for Major Events and aims to cover essential elements such as governance, threat assessment, incident management, and testing processes. Our emphasis will be on analyzing cyber risks, selecting service providers, and establishing assurance protocols. The guidance addresses both physical and online components of high-profile conferences,…

Read More

Building and operating a secure online service

Online services consist of various elements that must be secured to ensure overall service integrity. This section covers a broad range of topics from managing data within your service to protecting its various components. While no system can claim to be completely secure, designing an online service that is as secure as necessary is essential….

Read More

Building and operating a secure online service

Online services consist of various critical components that need effective security measures to ensure the overall integrity of the service. This section discusses a comprehensive array of topics, from data management to securing individual service elements. Although no system can claim to be completely secure, the goal should be to create an online service that…

Read More

Cyber security for high profile conferences

Overview This document provides additional context to the existing NCSC Cyber Security Guidance for Major Events, which should be reviewed beforehand. It encompasses critical elements such as governance, risk management, incident response, testing, and practical exercises. We will delve into cyber risk evaluation, supplier selection, and the process of assurance. This guidance aims to address…

Read More

Cyber security for high profile conferences

Overview This document builds on the existing NCSC Cyber Security Guidance for Major Events, which should be reviewed beforehand. It focuses on key components such as governance, risk assessment, incident management, and the importance of testing. The emphasis here is on cyber risk analysis, supplier selection, and the assurance process, recognizing that high-profile conferences present…

Read More
Back To Top