There's a hole in my bucket
https://www.ncsc.gov.uk/blog-post/theres-hole-my-bucket
Published: October 14, 2025 07:31
...or 'Why do people leave sensitive data in unprotected AWS S3 buckets?'
@www.ncsc.gov.uk.api.1.services.v1.all-rss-feed.xml@rss-parrot.net
I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline! Brought to you by the RSS Parrot.
---
This includes feeds from report, guidance and blog-post
Site URL: www.ncsc.gov.uk/api/1/services/v1/all-rss-feed.xml
Feed URL: www.ncsc.gov.uk/api/1/services/v1/all-rss-feed.xml
Posts: 308
Followers: 1
There's a hole in my bucket
https://www.ncsc.gov.uk/blog-post/theres-hole-my-bucket
Published: October 14, 2025 07:31
...or 'Why do people leave sensitive data in unprotected AWS S3 buckets?'
Maintaining a sustainable strengthened cyber security posture
https://www.ncsc.gov.uk/guidance/maintaining-a-sustainable-strengthened-cyber-security-posture
Published: October 13, 2025 22:22
How organisations can avoid staff burnout during an extended period of heightened cyber threat.
Phishing attacks: defending your organisation
https://www.ncsc.gov.uk/guidance/phishing
Published: October 13, 2025 22:19
How to defend your organisation from email phishing attacks.
Getting your organisation ready for Windows 11 upgrade before Autumn 2025
Published: October 8, 2025 13:04
Why you should act now to ensure you meet the new hardware standards, and prioritise security.
Strengthening national cyber resilience through observability and threat hunting
Published: October 8, 2025 06:26
How organisations can improve their ability to both detect and discover cyber threats.
RFC 9794: a new standard for post-quantum terminology
https://www.ncsc.gov.uk/blog-post/new-standard-for-post-quantum-terminology
Published: October 7, 2025 15:31
The NCSC’s contribution to the Internet Engineering Task Force will help to make the internet more secure.
Moving your business from the physical to the digital
https://www.ncsc.gov.uk/guidance/moving-business-from-physical-to-digital
Published: October 1, 2025 14:32
Security questions to ask your IT service providers when considering a digital transition
Putting staff welfare at the heart of incident response
https://www.ncsc.gov.uk/guidance/putting-staff-welfare-at-the-heart-of-incident-response
Published: September 30, 2025 15:29
Guidance for staff responsible for managing a cyber incident response within their organisation.
Understanding your OT environment: the first step to stronger cyber security
https://www.ncsc.gov.uk/blog-post/understanding-ot-environment-1step-stronger-cyber-security
Published: September 29, 2025 07:21
If you can’t see your entire operational technology environment, you can’t defend it. New guidance from the NCSC will help you gain that visibility.
Early Years practitioners: using cyber security to protect your settings
Published: September 26, 2025 10:46
How to protect sensitive information about your setting and the children in your care from accidental damage and online criminals.
EASM buyer's guide now available
https://www.ncsc.gov.uk/blog-post/easm-buyers-guide-now-available
Published: September 18, 2025 09:13
How to choose an external attack surface management (EASM) tool that’s right for your organisation.
External attack surface management (EASM) buyer's guide
https://www.ncsc.gov.uk/guidance/external-attack-surface-management-buyers-guide
Published: September 17, 2025 16:34
A guide to choosing the right EASM product for your organisation, and the security features you need to consider.
Buying, selling and donating second-hand devices
https://www.ncsc.gov.uk/guidance/buying-selling-second-hand-devices
Published: September 11, 2025 13:37
How to erase the personal data from your phone, tablets, and other devices (and why it's important when you're buying and selling them).
Cyber resilience matters as much as cyber defence
https://www.ncsc.gov.uk/blog-post/why-resilience-matters-as-much-as-defence
Published: September 9, 2025 16:16
Why planning and rehearsing your recovery from an incident is as vital as building your defences
From bugs to bypasses: adapting vulnerability disclosure for AI safeguards
Published: September 2, 2025 06:36
Exploring how far cyber security approaches can help mitigate risks in generative AI systems
Social Media: how to use it safely
https://www.ncsc.gov.uk/guidance/social-media-how-to-use-it-safely
Published: August 29, 2025 06:24
Use privacy settings across social media platforms to manage your digital footprint.
"If you have knowledge, let others light their candles in it."
https://www.ncsc.gov.uk/blog-post/let-others-light-candles
Published: August 18, 2025 15:09
Why sharing lessons learned from cyber security incidents and ‘near misses’ will help everyone to improve
Why more transparency around cyber attacks is a good thing for everyone
Published: August 13, 2025 10:15
Eleanor Fairford, Deputy Director of Incident Management at the NCSC, and Mihaela Jembei, Director of Regulatory Cyber at the Information Commissioner’s Office (ICO), reflect on why it’s so concerning when cyber attacks go unreported – and look at some of…
Ransomware: 'WannaCry' guidance for enterprise administrators
https://www.ncsc.gov.uk/guidance/ransomware-wannacry-guidance-enterprise-administrators-1
Published: August 13, 2025 10:05
Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
Mitigating malware and ransomware attacks
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks
Published: August 13, 2025 09:54
How to defend organisations against malware or ransomware attacks.
Cyber security for high profile conferences
https://www.ncsc.gov.uk/guidance/cyber-security-for-high-profile-conferences
Published: August 12, 2025 06:23
Managing the cyber security of high profile events in the real and virtual worlds.
Cyber Assessment Framework v4.0 released in response to growing threat
https://www.ncsc.gov.uk/blog-post/caf-v4-0-released-in-response-to-growing-threat
Published: August 7, 2025 14:59
Updates to the CAF helps providers of essential services to better manage their cyber risks.
Actions to take when the cyber threat is heightened
https://www.ncsc.gov.uk/guidance/actions-to-take-when-the-cyber-threat-is-heightened
Published: August 7, 2025 08:45
When organisations might face a greater threat, and the steps to take to improve security.
What is an antivirus product? Do I need one?
https://www.ncsc.gov.uk/guidance/what-is-an-antivirus-product
Published: August 5, 2025 09:14
Detect and prevent malicious software and viruses on your computer or laptop.
Active Cyber Defence (ACD) - the fourth year
https://www.ncsc.gov.uk/report/acd-report-year-four
Published: August 4, 2025 14:28
The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme.
Active Cyber Defence (ACD) - The Third Year
https://www.ncsc.gov.uk/report/acd-report-year-three
Published: August 4, 2025 14:24
The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe.
Incidents impacting retailers – recommendations from the NCSC
https://www.ncsc.gov.uk/blog-post/incidents-impacting-retailers
Published: July 29, 2025 15:20
A joint blog post by the NCSC’s National Resilience Director, Jonathon Ellison, and Chief Technology Officer, Ollie Whitehouse.
'NCSC Cyber Series' podcast now available
https://www.ncsc.gov.uk/blog-post/cyber-series-podcast
Published: July 15, 2025 07:37
Listen to all five episodes now, covering a wide range of cyber security topics.
Creating the right organisational culture for cyber security
https://www.ncsc.gov.uk/blog-post/creating-the-right-organisational-culture-for-cyber-security
Published: June 25, 2025 14:40
Calling cyber security professionals, culture specialists and leaders to drive uptake of new Cyber security culture principles.
Have you got what it takes to be a 'Cyber Advisor'?
https://www.ncsc.gov.uk/blog-post/have-you-got-what-it-takes-to-be-a-cyber-advisor
Published: June 25, 2025 09:00
Become a Cyber Advisor consultant and provide hands-on security advice tailored for SMEs.
Trusting the tech: using password managers and passkeys to help you stay secure online
Published: June 24, 2025 07:02
How today’s secure tools simplify your digital life, and reduce login stress and password fatigue
Timelines for migration to post-quantum cryptography
https://www.ncsc.gov.uk/guidance/pqc-migration-timelines
Published: June 18, 2025 06:25
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years.
Authentication methods: choosing the right type
https://www.ncsc.gov.uk/guidance/authentication-methods-choosing-the-right-type
Published: June 11, 2025 20:04
Recommended authentication models for organisations looking to move 'beyond passwords'.
Products on your perimeter considered harmful (until proven otherwise)
https://www.ncsc.gov.uk/blog-post/products-on-your-perimeter
Published: June 11, 2025 09:09
As attackers' tactics change, so must network defenders'.
Sausages and incentives: rewarding a resilient technology future
https://www.ncsc.gov.uk/blog-post/sausages-incentives-rewarding-resilient-technology-future
Published: June 6, 2025 14:43
Why ‘thinking big’ is required to shift the dynamics of the technology market.
New ETSI standard protects AI systems from evolving cyber threats
https://www.ncsc.gov.uk/blog-post/new-etsi-standard-protects-ai-systems-from-evolving-cyber-threats
Published: May 22, 2025 11:45
The NCSC and DSIT work with ETSI to ‘set a benchmark for securing AI’.
Facing the cyber threat behind the headlines
https://www.ncsc.gov.uk/blog-post/cyber-threat-behind-the-headlines
Published: May 21, 2025 15:50
NCSC CEO urges all businesses to face the stark reality of the cyber threat they face, whether in the spotlight or not.
Software Security Code of Practice - Assurance Principles and Claims (APCs)
https://www.ncsc.gov.uk/guidance/software-security-code-of-practice-assurance-principles-claims
Published: May 20, 2025 09:01
Helps vendors measure how well they meet the Software Security Code of Practice, and suggests remedial actions should they fall short.
Decommissioning assets
https://www.ncsc.gov.uk/guidance/decommissioning-assets
Published: May 20, 2025 06:28
How to retire digital assets (such as data, software, or hardware) from operation.
Impact of AI on cyber threat from now to 2027
https://www.ncsc.gov.uk/report/impact-ai-cyber-threat-now-2027
Published: May 16, 2025 20:03
An NCSC assessment highlighting the impacts on cyber threat from AI developments between now and 2027.
Data breaches: guidance for individuals and families
https://www.ncsc.gov.uk/guidance/data-breaches
Published: May 15, 2025 08:48
How to protect yourself from the impact of data breaches
Ransomware: 'WannaCry' guidance for home users and small businesses
https://www.ncsc.gov.uk/guidance/wannacry-guidance-for-home-users-and-small-businesses
Published: May 8, 2025 11:54
Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).
Introduction to logging for security purposes
https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes
Published: May 8, 2025 11:37
Laying the groundwork for incident readiness.
Cyber security for major events
https://www.ncsc.gov.uk/guidance/cyber-security-for-major-events
Published: May 8, 2025 11:32
Assessing the cyber security needs of major events.
Software Code of Practice: building a secure digital future
https://www.ncsc.gov.uk/blog-post/software-code-of-practice-building-a-secure-digital-future
Published: May 7, 2025 08:06
New voluntary code of practice for technology providers defines a market baseline for cyber security.
Advanced Cryptography: new approaches to data privacy
https://www.ncsc.gov.uk/blog-post/advanced-cryptography-new-approaches-to-data-privacy
Published: April 25, 2025 13:41
A new NCSC paper discusses the suitability of emerging Advanced Cryptography techniques.
Building Web Check using PaaS
https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas
Published: April 15, 2025 08:27
How Platform as a Service (PaaS) can make good security easier to achieve.
New guidance on securing HTTP-based APIs
https://www.ncsc.gov.uk/blog-post/new-guidance-on-securing-http-based-apis
Published: April 3, 2025 06:28
Why it’s essential to secure your APIs to build trust with your customers and partners.
New online training helps board members to govern cyber risk
https://www.ncsc.gov.uk/blog-post/new-online-training-helps-board-members-govern-cyber-risk
Published: April 2, 2025 08:57
The NCSC’s CEO, Richard Horne on the new cyber governance resources giving Boards the tools they need to govern cyber security risks.
Protective DNS for the private sector
https://www.ncsc.gov.uk/guidance/protective-dns-for-private-sector
Published: April 1, 2025 08:25
Advice on the selection and deployment of Protective Domain Name Systems (DNS).
Cyber Security and Resilience Policy Statement to strengthen regulation of critical sectors
https://www.ncsc.gov.uk/blog-post/cyber-security-resilience-bill-policy-statement
Published: March 31, 2025 15:53
New proposals will combat the growing threat to UK critical national infrastructure (CNI).
CyberFirst Girls Competition: a proud milestone and exciting future
https://www.ncsc.gov.uk/blog-post/cyberfirst-girls-competition-milestone-future
Published: March 24, 2025 15:12
The future of the CyberFirst Girls Competition and reflecting on brilliant progress.
Privileged access workstations: introducing our new set of principles
https://www.ncsc.gov.uk/blog-post/introducing-new-paws-principles
Published: March 24, 2025 12:46
Principles-based guidance for organisations setting up a PAW solution.
Passkeys: they're not perfect but they're getting better
https://www.ncsc.gov.uk/blog-post/passkeys-not-perfect-getting-better
Published: March 24, 2025 07:55
Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread adoption faces challenges that the NCSC is working to resolve.
Passkeys: the promise of a simpler and safer alternative to passwords
https://www.ncsc.gov.uk/blog-post/passkeys-promise-simpler-alternative-passwords
Published: March 24, 2025 07:39
The merits of choosing passkeys over passwords to help keep your online accounts more secure, and explaining how the technology promises to do this
Setting direction for the UK's migration to post-quantum cryptography
https://www.ncsc.gov.uk/blog-post/setting-direction-uk-migration-to-pqc
Published: March 20, 2025 08:00
Why the key milestones for PQC migration are part of building and maintaining good cyber security practice.
A different future for telecoms in the UK
https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk
Published: March 20, 2025 07:44
NCSC Technical Director Dr Ian Levy explains the technical impact of the recent US sanctions on the security of Huawei equipment in the UK.
Security, complexity and Huawei; protecting the UK's telecoms networks
Published: March 20, 2025 07:42
With 5G set to transform mobile services, Ian Levy explains how the UK has approached telecoms security, and what that means for the future.
Use of Russian technology products and services following the invasion of Ukraine
Published: March 20, 2025 07:41
Cyber security – even in a time of global unrest – remains a balance of different risks. Ian Levy, the NCSC's Technical Director, explains why.
The future of telecoms in the UK
https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk
Published: March 20, 2025 07:40
NCSC Technical Director Dr Ian Levy explains how the security analysis behind the DCMS supply chain review will ensure the UK’s telecoms networks are secure – regardless of the vendors used.
So long and thanks for all the bits
https://www.ncsc.gov.uk/blog-post/so-long-thanks-for-all-the-bits
Published: March 20, 2025 07:39
Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything.
TLS 1.3: better for individuals - harder for enterprises
https://www.ncsc.gov.uk/blog-post/tls-13-better-individuals-harder-enterprises
Published: March 20, 2025 07:38
The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.
Thinking about the security of AI systems
https://www.ncsc.gov.uk/blog-post/thinking-about-security-ai-systems
Published: March 13, 2025 12:05
Why established cyber security principles are still important when developing or implementing machine learning models.
The problems with patching
https://www.ncsc.gov.uk/blog-post/the-problems-with-patching
Published: March 13, 2025 12:00
Applying patches may be a basic security principle, but that doesn't mean it's always easy to do in practice.
The security benefits of modern collaboration in the cloud
https://www.ncsc.gov.uk/blog-post/the-security-benefits-of-modern-collaboration-in-the-cloud
Published: March 13, 2025 11:53
By exploiting cloud services, organisations no longer have to choose between ‘more security’ and ‘better usability’.
The problems with forcing regular password expiry
https://www.ncsc.gov.uk/blog-post/problems-forcing-regular-password-expiry
Published: March 13, 2025 11:50
Why the NCSC decided to advise against this long-established security guideline.
The logic behind three random words
https://www.ncsc.gov.uk/blog-post/the-logic-behind-three-random-words
Published: March 13, 2025 11:50
Whilst not a password panacea, using 'three random words' is still better than enforcing arbitrary complexity requirements.
The future of Technology Assurance in the UK
https://www.ncsc.gov.uk/blog-post/future-of-technology-assurance-in-the-uk
Published: March 13, 2025 11:43
Chris Ensor highlights some important elements of the NCSC's new Technology Assurance strategy.
The Cyber Assessment Framework 3.1
https://www.ncsc.gov.uk/blog-post/the-cyber-assessment-framework-3-1
Published: March 13, 2025 11:30
Latest version of the CAF focusses on clarification and consistency between areas of the CAF.
Thanking the vulnerability research community with NCSC Challenge Coins
https://www.ncsc.gov.uk/blog-post/thanking-vulnerability-research-community-ncsc-challenge-coins
Published: March 13, 2025 11:29
Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.
Terminology: it's not black and white
https://www.ncsc.gov.uk/blog-post/terminology-its-not-black-and-white
Published: March 13, 2025 11:24
The NCSC now uses 'allow list' and 'deny list' in place of 'whitelist' and 'blacklist'. Emma W explains why...
Telling users to ‘avoid clicking bad links’ still isn’t working
https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working
Published: March 13, 2025 11:22
Why organisations should avoid ‘blame and fear’, and instead use technical measures to manage the threat from phishing.
Tackling the 'human factor' to transform cyber security behaviours
https://www.ncsc.gov.uk/blog-post/tackling-human-factor-transform-cyber-security-behaviours
Published: March 13, 2025 11:22
ThinkCyber's CEO Tim Ward reflects on the challenges that startups face when developing innovative products.
Supplier assurance: having confidence in your suppliers
https://www.ncsc.gov.uk/blog-post/supplier-assurance-having-confidence-in-your-suppliers
Published: March 13, 2025 08:36
Questions to ask your suppliers that will help you gain confidence in their cyber security.
Studies in secure system design
https://www.ncsc.gov.uk/blog-post/studies-in-secure-system-design
Published: March 13, 2025 08:36
Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles
Spotlight on shadow IT
https://www.ncsc.gov.uk/blog-post/spotlight-on-shadow-it
Published: March 13, 2025 08:35
New guidance to help organisations manage rogue devices and services within the enterprise.
Smart devices: new law helps citizens to choose secure products
https://www.ncsc.gov.uk/blog-post/smart-devices-law
Published: March 13, 2025 08:29
Download the NCSC’s point-of-sale leaflet explaining how new PSTI regulation affects consumers and retailers.
SCADA 'in the cloud': new guidance for OT organisations
https://www.ncsc.gov.uk/blog-post/scada-cloud-new-guidance-ot-organisations
Published: March 13, 2025 08:28
If migrating SCADA solutions to the cloud, cyber security must be a key consideration for operational technology organisations.
SBOMs and the importance of inventory
https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory
Published: March 13, 2025 08:27
Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply chains?
RITICS: Securing cyber-physical systems
https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems
Published: March 13, 2025 08:23
Discover the Research Institute in Trustworthy Inter-connected Cyber-physical Systems.
Revolutionising identity services using AI
https://www.ncsc.gov.uk/blog-post/revolutionising-identity-services-using-ai
Published: March 13, 2025 08:23
The ‘NCSC for Startups’ alumnus giving identity verification the 'Trust Stamp'
Researching the hard problems in hardware security
https://www.ncsc.gov.uk/blog-post/introducing-hardware-security-problem-book
Published: March 13, 2025 08:12
Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics in hardware cyber security.
Relaunching the NCSC's Cloud security guidance collection
https://www.ncsc.gov.uk/blog-post/relaunching-the-ncscs-cloud-security-guidance-collection
Published: March 13, 2025 08:11
Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.
Refreshed 'cyber security toolkit' helps board members to govern online risk
https://www.ncsc.gov.uk/blog-post/refreshed-toolkit-helps-board-members-to-govern-cyber-risk
Published: March 13, 2025 08:07
Lindy Cameron, CEO, introduces changes to the NCSC’s cyber security resources specifically designed for board members.
Ransomware and the cyber crime ecosystem
https://www.ncsc.gov.uk/blog-post/ransomware-cyber-crime-ecosystem
Published: March 13, 2025 08:07
A new white paper examines the rise of 'ransomware as a service' and extortion attacks.
Raising the cyber resilience of software 'at scale'
https://www.ncsc.gov.uk/blog-post/raising-cyber-resilience-software-at-scale
Published: March 13, 2025 08:05
New ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services.
QR Codes - what's the real risk?
https://www.ncsc.gov.uk/blog-post/qr-codes-whats-real-risk
Published: March 13, 2025 08:03
How safe is it to scan that QR code in the pub? Or in that email?
Protecting how you administer cloud services
https://www.ncsc.gov.uk/blog-post/protecting-how-you-administer-cloud-services
Published: March 13, 2025 08:00
New advice on implementing high-risk and ‘break-glass’ accesses in cloud services.
Protecting PBX from cyber attacks
https://www.ncsc.gov.uk/blog-post/protecting-pbx-from-cyber-attacks
Published: March 13, 2025 07:58
Why small organisations need to manage their private branch exchange (PBX) telephone networks.
Protecting parked domains for the UK public sector
https://www.ncsc.gov.uk/blog-post/protecting-parked-domains
Published: March 13, 2025 07:57
Non-email sending (parked) domains can be used to generate spam email, but they're easy to protect.
Protecting internet-facing services on public service CNI
https://www.ncsc.gov.uk/blog-post/protecting-internet-facing-services-public-service-cni
Published: March 13, 2025 07:57
How operators of critical national infrastructure (CNI) can use NCSC guidance and blogs to secure their internet-facing services.
Protect your management interfaces
https://www.ncsc.gov.uk/blog-post/protect-your-management-interfaces
Published: March 13, 2025 07:55
Why it's important to protect the interfaces used to manage your infrastructure, and some recommendations on how you might do this.
Principles and how they can help us with assurance
https://www.ncsc.gov.uk/blog-post/principles-and-how-they-can-help-us-with-assurance
Published: March 13, 2025 07:54
Explaining the forthcoming NCSC Technology Assurance Principles.
Preparing for the long haul: the cyber threat from Russia
https://www.ncsc.gov.uk/blog-post/preparing-the-long-haul-the-cyber-threat-from-russia
Published: March 13, 2025 07:52
Although the UK has not experienced severe cyber attacks in relation to Russia’s invasion of Ukraine, now is not the time for complacency.
Post-quantum cryptography: what comes next?
https://www.ncsc.gov.uk/blog-post/post-quantum-cryptography-what-comes-next
Published: March 13, 2025 07:51
Jeremy B explains how the NCSC will help organisations plan their migration to PQC.
Pathways: exploring a new way to achieve Cyber Essentials certification
https://www.ncsc.gov.uk/blog-post/pathways-achieve-cyber-essentials-certification
Published: March 13, 2025 07:50
For large, complex firms struggling with the prescriptiveness of Cyber Essentials, ‘Pathways’ will provide a new route to certification.
Our new principles to help make cloud backups more resilient
https://www.ncsc.gov.uk/blog-post/new-principles-make-cloud-backups-more-resilient
Published: March 13, 2025 07:45
Introducing a new set of NCSC principles to strengthen the resilience of organisations' cloud backups from ransomware attackers.
Offline backups in an online world
https://www.ncsc.gov.uk/blog-post/offline-backups-in-an-online-world
Published: March 13, 2025 07:45
How to protect your backups that are stored in the public cloud.
Not all types of MFA are created equal...
https://www.ncsc.gov.uk/blog-post/not-all-types-mfa-created-equal
Published: March 12, 2025 14:29
Our updated multi-factor authentication (MFA) guidance recommends organisations use techniques that give better protection against phishing attacks.
New techniques added to the NCSC’s ‘risk management toolbox’
https://www.ncsc.gov.uk/blog-post/new-techniques-added-to-the-ncsc-risk-management-toolbox
Published: March 12, 2025 14:28
Refreshed guidance published to help practitioners manage cyber risk.
~ 208 additional posts are not shown ~