
“What’s happened to my data?”
Irrespective of whether the ransom is paid, a ransomware attack means organisations have lost control of their information.

“If you have knowledge, let others light their candles in it.”
Why sharing lessons learned from cyber security incidents and ânear missesâ will help everyone to improve

Summary of the NCSC analysis of May 2020 US sanction
A summary of the NCSCâs analysis of the May 2020 US sanction which caused the NCSC to modify the scope of its security mitigation strategy for Huawei.

Summary of NCSCâs security analysis for the UK telecoms sector
A summary of the NCSCâs security analysis for the UK telecoms sector

Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking
Technical report on best practice use of this fundamental data routing protocol.

Decrypting diversity: Diversity and inclusion in cyber security report 2020
Joint report between the NCSC and KPMG UK is the first in a series to benchmark and track levels of diversity and inclusion in the cyber security industry.

Decrypting diversity: Diversity and inclusion in cyber security report 2021
The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made.

Cyber Threat Report: UK Legal Sector
An updated report from the NCSC explaining how UK law firms – of all sizes – can protect themselves from common cyber threats.

Active Cyber Defence (ACD) – the fourth year
The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme.

ACD – The Fifth Year
Key findings from the 5th year of the Active Cyber Defence (ACD) programme.

A method to assess ‘forgivable’ vs ‘unforgivable’ vulnerabilities
Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement.

Zero trust: building a mixed estate
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles.

What is an antivirus product? Do I need one?
Detect and prevent malicious software and viruses on your computer or laptop.

Ransomware: ‘WannaCry’ guidance for home users and small businesses
Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).

Vulnerability scanning tools and services
Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes.

Video conferencing services: using them securely
How to set up and use video conferencing services, such as Zoom and Skype, safely and securely

Video conferencing services: security guidance for organisations
Guidance to help you to choose, configure and deploy video conferencing services such as Zoom and Skype within your organisation

Using IPsec to protect data
Guidance for organisations wishing to deploy products that use IPsec.

Using TLS to protect data
Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.

Transaction Monitoring for online services
This guidance is aimed at service owners and security specialists involved in the provision of online services.

Smart devices: using them safely in your home
Many everyday items are now connected to the internet: we explain how to use them safely.

Shopping and paying safely online
Tips to help you purchase items safely and avoid fraudulent websites.

Shadow IT
Managing ‘unknown assets’ that are used within an organisation.

Responding to a cyber incident â a guide for CEOs
Guidance to help CEOs in public and private sector organisations manage a cyber incident.

Reducing data exfiltration by malicious insiders
Advice and recommendations for mitigating this type of insider behaviour.

Recovering a hacked account
A step by step guide to recovering online accounts.

Network security fundamentals
How to design, use, and maintain secure networks.

NCSC advice: Malicious software used to illegally mine cryptocurrency
Guidance for members of the public, website administrators and JavaScript developers in relation to the recently publicised cryptocurrency mining compromises of several websites

NCSC advice for Dixons Carphone plc customers
Advice for Dixons Carphone customers following its data breach.

Managing the risk of cloud-enabled products
Guidance outlining the risks of locally installed products interacting with cloud services, and suggestions to help organisations manage this risk.

Managing Public Domain Names
Good practises for the management of public domain names owned by your organisation.

Maintaining a sustainable strengthened cyber security posture
How organisations can avoid staff burnout during an extended period of heightened cyber threat.

Home working: preparing your organisation and staff
How to make sure your organisation is prepared for home working.

Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both before and after a compromise.

Guidance for organisations considering payment in ransomware incidents
Advice for organisations experiencing a ransomware attack and the partner organisations supporting them.

Cyber security for major events
Assessing the cyber security needs of major events.

Cyber security for high profile conferences
Managing the cyber security of high profile events in the real and virtual worlds.

Cyber security for farmers
Guidance to help farmers improve the security and resilience of their business against cyber threats.

Business communications – SMS and telephone best practice
How to ensure your organisation’s SMS and telephone messages are effective and trustworthy.

Engaging with Boards to improve the management of cyber security risk
How to communicate more effectively with board members to improve cyber security decision making.

Authentication methods: choosing the right type
Recommended authentication models for organisations looking to move ‘beyond passwords’.

Actions to take when the cyber threat is heightened
When organisations might face a greater threat, and the steps to take to improve security.

Acquiring, managing, and disposing of network devices
Advice for organisations on the acquisition, management and disposal of network devices.

‘Smart’ security cameras: Using them safely in your home
How to protect ‘smart’ security cameras and baby monitors from cyber attack.

A method to assess ‘forgivable’ vs ‘unforgivable’ vulnerabilities
Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement.

CyberFirst industries support CyberTV for students
Cyber security-themed videos, blogs and interviews from industry experts are supporting students and teachers.

Not all types of MFA are created equal…
Our updated multi-factor authentication (MFA) guidance recommends organisations use techniques that give better protection against phishing attacks.

Authentication methods: choosing the right type
Recommended authentication models for organisations looking to move ‘beyond passwords’.

Vulnerability Scanning: Keeping on top of the most common threats
Vulnerability Scanning solutions offer a cost-effective way to discover and manage common security issues.

Identifying suspicious credential usage
How NCSC guidance can help organisations detect and protect themselves from credential abuse.

ACD 2.0: Insights from the external attack surface management trials
We publish the results of our ACD 2.0 external attack surface management (EASM) trials

Making Principles Based Assurance a reality
An update on the work to make Principles Based Assurance (PBA) usable in practice.

There’s a hole in my bucket
…or ‘Why do people leave sensitive data in unprotected AWS S3 buckets?’

Equities process
Publication of the UKâs process for how we handle vulnerabilities.

Protecting system administration with PAM
Remote system administration provides powerful and flexible access to systems and services.

Supplier assurance: having confidence in your suppliers
Questions to ask your suppliers that will help you gain confidence in their cyber security.

Why cloud first is not a security problem
Using the cloud securely should be your primary concern – not the underlying security of the public cloud.

NCSC IT: There’s confidence and then there’s SaaS
Raising a cheer for SaaS vendors who respond to our cloud security principles.

New interactive video – and related downloads – to help secondary school kids stay safe online
A new initiative, aimed at 11 to 14-year-olds, that helps them navigate the risks of online life.

The future of Technology Assurance in the UK
Chris Ensor highlights some important elements of the NCSC’s new Technology Assurance strategy.

The near-term impact of AI on the cyber threat
An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.

Cloud security made easier with Serverless
Our research shows that using Serverless components makes it easier to get good security in the cloud

NCSC For Startups: from HP Labs to Configured Things
Simon Arnell, co-founder of Configured Things, describes how the NCSC For Startups programme helped the company solve an intelligence community challenge.

Principles and how they can help us with assurance
Explaining the forthcoming NCSC Technology Assurance Principles.

The cyber threat to Universities
Assessing the cyber security threat to UK Universities

Organisational use of Enterprise Connected Devices
Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.

Firmware updates on Linux, and using data to influence procurement decisions
Focused on automating UEFI firmware updates on Windows devices.

What exactly should we be logging?
A structured look at what data to collect for security purposes and when to collect it.

An RFC on IoCs â playing our part in international standards
The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol design – and hopes to encourage more cyber defenders to engage with international standards.

So long and thanks for all the bits
Ian Levy, the NCSCâs departing Technical Director, discusses life, the universe, and everything.

Studies in secure system design
Worked examples for Operational Technology and Virtualised systems, using the NCSCâs secure design principles

NCSC’s cyber security training for staff now available
The NCSCâs e-learning package ‘Top Tips For Staff’ can be completed online, or built into your own training platform.

New ‘Connected Places’ infographic published
A new visual guide to the cyber security principles that are essential when developing and managing âsmart citiesâ.

Cyber security for high profile conferences
Managing the cyber security of high profile events in the real and virtual worlds.

Asset management
Implementing asset management for good cyber security.

Building and operating a secure online service
Guidance for organisations that use, own, or operate an online service who are looking to start securing it.

Pattern: Safely Importing Data
An architecture pattern for safely importing data into a system from an external source.

How to spot scammers claiming to be from the NCSC
Check that you’re talking to a genuine NCSC employee, and not a criminal.

GDPR security outcomes
This guidance describes a set of technical security outcomes that are considered to represent appropriate measures under the GDPR.

Design Pattern: Safely Exporting Data
How to implement a secure end-to-end data export solution

Reducing data exfiltration by malicious insiders
Advice and recommendations for mitigating this type of insider behaviour.

Scam ‘missed parcel’ SMS messages: advice on avoiding malware
How to avoid malware sent using scam âmissed parcelâ SMS messages, and what to do if your phone is already infected.

Zero trust: building a mixed estate
Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can’t implement the zero trust principles.

Transaction Monitoring for online services
This guidance is aimed at service owners and security specialists involved in the provision of online services.

Macro Security for Microsoft Office
Why macros are a threat, and the approaches you can take to protect your systems.

Private Branch Exchange (PBX) best practice
Protecting your organisationâs telephony systems from cyber attacks and telecoms fraud.

Mapping your supply chain
How organisations can map their supply chain dependencies, so that risks in the supply chain can be better understood and managed.

Check your email security, and protect your customers
Free online tool from the NCSC prevents cyber criminals using your email to conduct cyber attacks.

Cyber Security Toolkit for Boards: updated briefing pack released
New presentation includes voiceover and insights on ransomware attack on the British Library.

‘NCSC Cyber Series’ podcast now available
Listen to all five episodes now, covering a wide range of cyber security topics.

Making Principles Based Assurance a reality
An update on the work to make Principles Based Assurance (PBA) usable in practice.

Network security fundamentals
How to design, use, and maintain secure networks.

Secure sanitisation and disposal of storage media
How to ensure data cannot be recovered from electronic storage media.

Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both before and after a compromise.

Business communications – SMS and telephone best practice
How to ensure your organisation’s SMS and telephone messages are effective and trustworthy.

Penetration testing
How to get the most from penetration testing

Preserving integrity in the age of generative AI
New âContent Credentialsâ guidance from the NSA seeks to counter the erosion of trust.

A method to assess ‘forgivable’ vs ‘unforgivable’ vulnerabilities
Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement.

Eradicating trivial vulnerabilities, at scale
A new NCSC research paper aims to reduce the presence of âunforgivableâ vulnerabilities.

ACD 2.0 exploration into attack surface management completed
We thank participants and look forward to sharing what we’ve learned