CYBER LIVEWIRE
- Car rental manager fined after unlawfully obtaining customer data
A former Management Trainee at Enterprise Rent-A-Car UK Limited […]
- No regulatory wild west: how the ICO applies the law to emerging tech
John Edwards, Information Commissioner, delivers speech at the New […]
- Children’s services in Birmingham reprimanded after inappropriately disclosing a child’s personal information
We have issued a reprimand to Birmingham Children's Trust Community […]
- Introducing the NCSC's ‘Share and Defend’ capability
Join the community of service providers helping to protect the UK […]
- Organisations must do more to combat the growing threat of cyber attacks
We are calling for all organisations to boost their cyber security […]
- Asset management for cyber security
Help understanding what good asset management looks like from a cyber […]
- ACD the 5th Year: report now available to download
Active Cyber Defence extends its services to organisations beyond the […]
- Accessibility as a cyber security priority
Want security that works better for people? Make it accessible.
- Are you hungry? A two-part blog about risk appetites
Risk appetites; what are they, what’s their purpose, how do […]
- Decrypting diversity: Diversity and inclusion in cyber security report 2020
Joint report between the NCSC and KPMG UK is the first in a series to […]
- Decrypting diversity: Diversity and inclusion in cyber security report 2021
The 2nd joint report between the NCSC and KPMG UK benchmarks against […]
- Advanced Mobile Solutions (AMS) guidance trailer
Chris P explains how AMS will enable high-threat organisations to […]
- Video conferencing services: security guidance for organisations
Guidance to help you to choose, configure and deploy video […]
- NCSC's cyber security training for staff now available
The NCSC’s e-learning package 'Top Tips For Staff' can be completed […]
- Smart devices: using them safely in your home
Many everyday items are now connected to the internet: we explain how […]
- Social Media: how to use it safely
Use privacy settings across social media platforms to manage your […]
- What is an antivirus product? Do I need one?
Detect and prevent malicious software and viruses on your computer or […]
- Securing your devices
How to ensure your devices are as secure as possible.
- Buying and selling second-hand devices
How to erase the personal data from your phone, tablets, and other […]
- Cyber Assessment Framework 3.2
Latest version of the CAF reflects the increased threat to critical […]
- Recovering a hacked account
A step by step guide to recovering online accounts.
- Take down of Austrian-based fraud scheme offering new type of crypto coin
National authorities in Austria, Cyprus and the Czech Republic have […]