An online tool which helps organisations find out how resilient they are to cyber attacks and practise their response in a safe environment
Tagged with esecurity
Reducing The Impact
This is a National Cyber Security Resource
Most cyber attacks are composed of four stages: Survey, Delivery, Breach and Affect. The following security controls, applied at each stage of an attack, can reduce your organisation’s exposure to a successful cyber attack.
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
'No, you can’t win tickets for Radio 1’s Big Weekend festival by liking a Facebook page. It’s not true that there are free business-class flights being given away by Qantas Air. And no, TV show Total Wipeout isn’t bringing a tour to your local city. But all three are recent examples of convincing scams on Facebook where fraudsters pretending to be trusted brands have mocked up pages in search of likes, comments, shares and more from unwitting users.'
With vast swathes of data being sold on the dark web in recent weeks following high-profile breaches, many sites are encouraging users to change their passwords, even if they weren't directly affected.
Facebook and Netflix appear to be taking this a step further with reports a number of users are being forced to update their credentials.
This document, by the NEN, is intended for school senior leadership teams and provides an overview of what needs to be in place to keep school networks secure.
The 10 steps described here are adapted from the 2012 CESG document 10 Steps to Cyber Security. CESG is the information security arm of Government Communications Headquarters (GCHQ).
Make sure you understand where the responsibilities for maintaining all these systems and processes reside: some may be maintained in-house while others may be provided by your broadband supplier or another third party.