Guidance

10 Steps to Cyber Security

Created:  04 Aug 2016
Updated:  09 Aug 2016
10 Steps To Cyber Security
Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.

This collection comprises:

  • an introduction to cyber security for executive/board-level staff
  • a white paper that explains what a common cyber attack looks like, and how attackers execute them
  • the 10 technical advice sheets you should consider putting in place

NCSC Common Cyber Attacks White Paper.pdf

PDF, 725.53KB

This file may not be suitable for users of assistive technology.

NCSC 10 Steps to Cyber Security Infographic.pdf

PDF, 399.05KB

This file may not be suitable for users of assistive technology.

NCSC Common Cyber Attacks Infographic.pdf

PDF, 275.31KB

This file may not be suitable for users of assistive technology.

Introduction to Cyber Security

  1. 10 Steps: Executive Summary

    Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.

  2. 10 Steps: A Board Level Responsibility

    Why protecting your information is a board-level responsibility.

  3. Common Cyber Attacks: Reducing the Impact

    This white paper explains how basic security controls can protect organisations from the most common cyber attacks.

Technical advice sheets

  1. 10 Steps: Risk Management Regime

    Why defining and communicating your Board’s Information Risk Management Regime is central to your organisation’s overall cyber security strategy.

  2. 10 Steps: Secure Configuration

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Secure Configuration.

  3. 10 Steps: Network Security

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Network Security.

  4. 10 Steps: Managing User Privileges

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Managing User Privileges.

  5. 10 Steps: User Education and Awareness

    This section from within the NCSC's '10 Steps To Cyber Security' concerns User Education and Awareness.

  6. 10 Steps: Incident Management

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Incident Management.

  7. 10 Steps: Malware Prevention

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Malware Prevention.

  8. 10 Steps: Monitoring

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Monitoring.

  9. 10 Steps: Removable Media Controls

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Removable Media Controls.

  10. 10 Steps: Home and Mobile Working

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Home and Mobile Working.

Topics

Was this guidance helpful?

We need your feedback to improve this content.

Yes No