Network security fundamentals

Networks are crucial for ensuring the effective operation, security, and resilience of numerous organizations. This guidance offers an overview of essential considerations when designing, maintaining, or utilizing networks that demand security and resilience. It also assists in applying the NCSC’s Cyber Security Design Principles to networks. Additional technical information can be found in the ‘further…

Read More

Network security fundamentals

Networks play a crucial role in the operational efficiency, security, and resilience of numerous organizations. This guidance serves as an introduction to fundamental considerations for designing, managing, or utilizing networks that require robust security and resilience. Additionally, it will assist you in implementing the NCSC’s Cyber Security Design Principles within your network infrastructure. For more…

Read More

MIKEY-SAKKE frequently asked questions

Understanding MIKEY-SAKKE MIKEY-SAKKE is a specialized protocol crafted for governmental bodies and relevant enterprises to facilitate secure, cross-platform multimedia communications. Advantages of MIKEY-SAKKE MIKEY-SAKKE offers significant scalability, eliminating the need for pre-configuration between users or the distribution of user certificates. It also features flexibility, accommodating real-time communications like voice calls, conference calls, and deferred messages…

Read More

Network security fundamentals

Networks are essential for the functionality, security, and resilience of various organizations. This guide offers an overview of important considerations when designing, maintaining, or utilizing networks that require robust security and resilience. It also assists in applying the NCSC’s Cyber Security Design Principles to network setups. For more in-depth technical resources, please refer to the…

Read More

Network security fundamentals

Networks are essential for the functionality, security, and resilience of numerous organizations. This guide serves as an introductory resource on the critical aspects to consider when designing, maintaining, or utilizing networks that must be both secure and resilient. It will also assist you in applying the NCSC’s Cyber Security Design Principles to your networks. Additional…

Read More

Network security fundamentals

Networks play a crucial role in the effective functioning, security, and resilience of numerous organizations. This document offers a foundational overview of essential elements to consider while designing, operating, or maintaining secure and resilient networks. It also assists in implementing the NCSC’s Cyber Security Design Principles. For more in-depth information, please refer to the ‘further…

Read More

Pattern: Safely Importing Data

Overview Computer systems often require interaction with external environments to function effectively, making it vital to import information into your organization’s systems without unintentionally bringing in harmful code. Unfortunately, the same pathways that facilitate the import of legitimate data also serve as potential entry points for attackers seeking to infiltrate your systems with malware. This…

Read More

Pattern: Safely Importing Data

Overview In today’s interconnected world, computer systems must interact effectively with external environments. It is crucial to enable the importation of data while ensuring that malicious code is not transferred into your organization’s systems. However, the same channels that allow the legitimate transfer of data can be exploited by attackers to introduce malware. This risk…

Read More

Preventing Lateral Movement

Implementing the following protective measures will provide a buffer of time and enhance the ability to identify attempts at lateral movement within your network. 1. Safeguard Credentials It is essential to secure all credentials on a network, particularly those associated with administrator accounts, to prevent unauthorized access to devices and systems. A prevalent attack strategy…

Read More

Private Branch Exchange (PBX) best practice

Notice: A Private Branch Exchange (PBX) is a crucial telecommunications system that facilitates the management and routing of incoming and outgoing telephone calls within an organization. Following the guidelines set forth in this document can significantly diminish the risk of cyber attackers compromising your PBX system to carry out fraud, launch denial-of-service (DoS) attacks, or…

Read More
Back To Top