[pb_row ][pb_column span="span12"][pb_heading el_title="Introduction of 10 Steps to Cyber Security" tag="h1" div_margin_top="30" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Introduction of 10 Steps to Cyber Security[/pb_heading][pb_heading el_title="Summary" tag="h2" div_margin_top="30" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Summary[/pb_heading][pb_text el_title="Introduction..." width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.
 

This collection comprises:

  • an introduction to cyber security for executive/board-level staff
  • a white paper that explains what a common cyber attack looks like, and how attackers execute them
  • the 10 technical advice sheets you should consider putting in place


[/pb_text][pb_divider el_title="Divider 1" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="Introduction to Cyber Security" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Introduction to Cyber Security[/pb_heading][pb_text el_title="Introduction to Cyber Security" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

  1. 10 Steps: Executive Summary

    Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.

  2. 10 Steps: A Board Level Responsibility

    Why protecting your information is a board-level responsibility.

  3. Common Cyber Attacks: Reducing the Impact

    This white paper explains how basic security controls can protect organisations from the most common cyber attacks.

[/pb_text][pb_heading el_title="Technical Advice Sheets" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Technical Advice Sheets[/pb_heading][pb_text el_title="Technical Advice Sheets" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

  1. 10 Steps: Risk Management Regime

    Why defining and communicating your Board’s Information Risk Management Regime is central to your organisation’s overall cyber security strategy.

  2. 10 Steps: Secure Configuration

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Secure Configuration.

  3. 10 Steps: Network Security

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Network Security.

  4. 10 Steps: Managing User Privileges

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Managing User Privileges.

  5. 10 Steps: User Education and Awareness

    This section from within the NCSC's '10 Steps To Cyber Security' concerns User Education and Awareness.

  6. 10 Steps: Incident Management

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Incident Management.

  7. 10 Steps: Malware Prevention

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Malware Prevention.

  8. 10 Steps: Monitoring

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Monitoring.

  9. 10 Steps: Removable Media Controls

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Removable Media Controls.

  10. 10 Steps: Home and Mobile Working

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Home and Mobile Working.

[/pb_text][pb_divider el_title="Divider 1 2 3" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="What Next?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]What Next?[/pb_heading][pb_text el_title="What Next?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

IS Know How Pointer:

You may also be interested to read the next phase of the 10 Steps;

[/pb_text][pb_button el_title="What Next Button" button_text="10 Steps: Executive Summary" link_type="url" button_type_url="https://www.isknow.how/your-is-know-how/national-cyber-security-centre-ncsc/what-is-10-steps-to-cyber-security/10-steps-executive-summary" open_in="current_browser" icon="fa-arrow-right" button_alignment="inherit" button_size="btn-lg" button_color="btn-primary" appearing_animation="0" ][/pb_button][pb_divider el_title="Divider 1 2 3 3" div_margin_top="20" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_alert el_title="Dislcaimer" div_margin_top="20" div_margin_bottom="-20" alert_style="alert-warning" alert_close="no" appearing_animation="0" ]

Disclaimer:

The above resources and content "Contains public sector information licensed under the Open Government Licence v1.0." unless stated with the text "IS Know How Pointer:" which is where ISKH would like to input a call to action to it's visitor's and clients.

ISKH is in no way affiliated with, or working on behalf of the National Cyber Security Centre (NCSC). ISKH is quite simply reproducing their 10 Steps to Cyber Security information, to be able to put it in front of our Third Sector target audience(s) as much as possible.

Additionally, this should further support the NCSC's drive to show that Cyber Security, has a positive impact on a business or organisations Cyber / Data Security Positioning. Any externally linked NCSC content in the ISKH website, including PDF documents or video media, is offered for information purposes only, as is.

[/pb_alert][/pb_column][/pb_row]