Common Cyber Attacks: Summary of the White Paper

Common Cyber Attacks: Reducing The Impact helps organisations understand what a common cyber attack looks like and explains why all organisations should establish basic security controls and processes, to protect themselves from such attacks. The full version can be downloaded here (PDF).

It can be read alongside the recently updated 10 Steps to Cyber Security, which offers more comprehensive guidance on the practical steps organisations can take to improve the security of their networks and the information carried on them.

The paper does not provide a comprehensive review of sophisticated or persistent attacks, nor a detailed analysis of how those attacks occurred.

Common Cyber Attacks at-a-glance

The following infographic summarises the security controls you can apply to reduce your organisation’s exposure to a successful cyber attack.

Common Cyber Attacks - Reducing the Impact Image

IS Know How Pointer:

Why not use the above Infographic, to distribute amongst your Third Sector Organisation's Personnel for a little light reading?

Download the NCSC 10 Steps To Cyber Security infographic (PDF)

The Threat Landscape

Before investing in defences, many organisations often want concrete evidence that they are, or will be targeted, by specific threats. Unfortunately, in cyberspace it is often difficult to provide an accurate assessment of the threats that specific organisations face.

However, every organisation is a potential victim. All organisations have something of value that is worth something to others. If you openly demonstrate weaknesses in your approach to cyber security by failing to do the basics, you will experience some form of cyber attack.

Reducing your Exposure to Cyber Attack

Fortunately, there are effective and affordable ways to reduce your organisation’s exposure to the more common types of cyber attack on systems that are exposed to the Internet. The following controls are contained in the Cyber Essentials, together with more information about how to implement them:

  • boundary firewalls and internet gateways - establish network perimeter defences, particularly web proxy, web filtering, content checking, and firewall policies to detect and block executable downloads, block access to known malicious domains and prevent users’ computers from communicating directly with the Internet
  • malware protection - establish and maintain malware defences to detect and respond to known attack code
  • patch management - patch known vulnerabilities with the latest version of the software, to prevent attacks which exploit software bugs
  • whitelisting and execution control - prevent unknown software from being able to run or install itself, including AutoRun on USB and CD drives
  • secure configuration - restrict the functionality of every device, operating system and application to the minimum needed for business to function
  • password policy - ensure that an appropriate password policy is in place and followed
  • user access control - include limiting normal users’ execution permissions and enforcing the principle of least privilege

If your organisation is likely to be targeted by a more technically capable attacker, give yourself greater confidence by putting in place these additional controls set out in the 10 Steps to Cyber Security:

  • security monitoring - to identify any unexpected or suspicious activity
  • user training education and awareness - staff should understand their role in keeping your organisation secure and report any unusual activity
  • security incident management - put plans in place to deal with an attack as an effective response will reduce the impact on your business

Raising your Cyber Defences

The Internet can be a hostile environment. The threat of attack is ever present as new vulnerabilities are released and commodity tools are produced to exploit them. Doing nothing is no longer an option. Protect your organisation and your reputation by establishing some basic cyber defences to ensure that your name is not added to the growing list of victims.

What Next?

IS Know How Pointer:

You may also be interested to read the next phase of the 10 Steps;


The above resources and content "Contains public sector information licensed under the Open Government Licence v1.0." unless stated with the text "IS Know How Pointer:" which is where ISKH would like to input a call to action to it's visitor's and clients.

ISKH is in no way affiliated with, or working on behalf of the National Cyber Security Centre (NCSC). ISKH is quite simply reproducing their 10 Steps to Cyber Security information, to be able to put it in front of our Third Sector target audience(s) as much as possible.

Additionally, this should further support the NCSC's drive to show that Cyber Security, has a positive impact on a business or organisations Cyber / Data Security Positioning. Any externally linked NCSC content in the ISKH website, including PDF documents or video media, is offered for information purposes only, as is.