Introduction of 10 Steps to Cyber Security

Summary

Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.
 

This collection comprises:

  • an introduction to cyber security for executive/board-level staff
  • a white paper that explains what a common cyber attack looks like, and how attackers execute them
  • the 10 technical advice sheets you should consider putting in place


Introduction to Cyber Security

  1. 10 Steps: Executive Summary

    Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.

  2. 10 Steps: A Board Level Responsibility

    Why protecting your information is a board-level responsibility.

  3. Common Cyber Attacks: Reducing the Impact

    This white paper explains how basic security controls can protect organisations from the most common cyber attacks.

Technical Advice Sheets

  1. 10 Steps: Risk Management Regime

    Why defining and communicating your Board’s Information Risk Management Regime is central to your organisation’s overall cyber security strategy.

  2. 10 Steps: Secure Configuration

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Secure Configuration.

  3. 10 Steps: Network Security

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Network Security.

  4. 10 Steps: Managing User Privileges

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Managing User Privileges.

  5. 10 Steps: User Education and Awareness

    This section from within the NCSC's '10 Steps To Cyber Security' concerns User Education and Awareness.

  6. 10 Steps: Incident Management

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Incident Management.

  7. 10 Steps: Malware Prevention

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Malware Prevention.

  8. 10 Steps: Monitoring

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Monitoring.

  9. 10 Steps: Removable Media Controls

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Removable Media Controls.

  10. 10 Steps: Home and Mobile Working

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Home and Mobile Working.

What Next?

IS Know How Pointer:

You may also be interested to read the next phase of the 10 Steps;

Disclaimer:

The above resources and content "Contains public sector information licensed under the Open Government Licence v1.0." unless stated with the text "IS Know How Pointer:" which is where ISKH would like to input a call to action to it's visitor's and clients.

ISKH is in no way affiliated with, or working on behalf of the National Cyber Security Centre (NCSC). ISKH is quite simply reproducing their 10 Steps to Cyber Security information, to be able to put it in front of our Third Sector target audience(s) as much as possible.

Additionally, this should further support the NCSC's drive to show that Cyber Security, has a positive impact on a business or organisations Cyber / Data Security Positioning. Any externally linked NCSC content in the ISKH website, including PDF documents or video media, is offered for information purposes only, as is.