End user technology

Deployment and management of technology used by the employees, partners, or customers of an organisation.
Showing 1 - 25 of 41 results
Sort by: A-Z|Date
  • EUD Security Guidance: Samsung devices with Knox Workspace

    Guidance15 Feb 2018TopicsEnd user technology, End user device

    Secure configuration for Samsung devices running Knox Workspace 2.8 and higher

  • Tape counter

    Updating our Factory Reset Guidance

    Blog post31 Jan 2018AuthorTom WTopicsEnd user technology, End user device

    There's more than one way to reset a device; Tom W explains why this matters.

  • End user devices: factory reset and reprovisioning

    Guidance31 Jan 2018TopicsFlexible working, End user technology, End user device

    The methods described here are not guaranteed data sanitisation methods; they may not completely erase data so it cannot be recovered. For more information about how to sanitise affordably, please refer to the NCSC guidance on Secure sanitisation of storage media.

    Guidance for organisations deploying or redeploying mobile devices onto their networks.

  • NCSC IT: Agile infrastructure

    NCSC IT: How the NCSC built its own IT system

    Blog post29 Jan 2018AuthorRichard CTopicsIT infrastructure, Technology at OFFICIAL, End user technology

    The first in a series of blogs about how we built an OFFICIAL IT system to meet the needs of the NCSC

  • EUD Security Guidance: macOS 10.13 High Sierra

    Guidance05 Dec 2017TopicsEnd user technology, End user device
  • Queue of red London buses

    Firmware bugs are like buses

    Blog post23 Nov 2017AuthorMike HTopicsEnd user technology, End user device

    Intel's report this week of security vulnerabilities emphasises the importance of automating firmware updates

  • Devices

    This Black Friday, we're giving away... advice!

    Blog post20 Nov 2017AuthorTom WTopicsEnd user technology, End user device

    How to keep your shiny new tablets and phones secure

  • EUD Security Guidance: iOS 11

    Guidance10 Nov 2017TopicsEnd user technology, End user device

    Secure configuration for devices running iOS 11

  • EUD Security Guidance: Windows 10 - 1703

    Guidance25 Oct 2017TopicsEnd user technology, End user device

    Secure configuration for devices running Windows 10 1703 “Creators Update”

  • touching fingers

    Updating our Windows 10 guidance

    Blog post25 Oct 2017AuthorStuart GTopicsEnd user technology, End user device

    An introduction to the update of our alpha guidance published for 1607 "Anniversary Update".

  • Automating UEFI Firmware updates

    Automating UEFI Firmware Updates

    Blog post17 Oct 2017AuthorMike HTopicsEnd user technology, End user device
  • EUD Security Guidance: Windows 10 with Mobile Device Management

    Guidance21 Sep 2017TopicsIT infrastructure, End user technology, End user device

    Alpha security configuration guidance for Windows 10 with MDM

  • EUD: Windows 10 MDM

    Modernising Windows 10 Management

    Blog post21 Sep 2017AuthorStuart GTopicsIT infrastructure, End user technology, End user device

    Introducing our new Windows10 with MDM guidance

  • End User Devices: VPNs

    Guidance01 Aug 2017TopicsIT infrastructure, End user technology, Secure communications

    In this guidance we discuss the reasons for using VPNs and make recommendations on aspects of the underlying technology, such as protocols and cryptography. We also give risk management advice to organisations considering the use of VPNs.

  • virtual private networks

    Introducing new guidance on Virtual Private Networks (VPNs)

    Blog post01 Aug 2017AuthorAndy PTopicsIT infrastructure, Network security, End user technology

    An introduction to our new guidance on virtual private networks

  • Case Study: West Berkshire Council

    Case Study14 Jun 2017TopicsEnd user technology, Partnerships

    Easier logins, better connectivity, genuinely portable devices: improving the mobile user experience at West Berkshire Council.

  • Archery targets

    The Secure by Default Partnership Programme 2017

    Blog post02 May 2017AuthorAndy PTopicsSecure by default, End user technology, Partnerships

    We’re seeking proactive public sector partners to explore ways to remove or replace passwords for 2017's Secure by Default Partnership Programme

  • EUD Security Guidance: Chrome OS 56

    Guidance19 Apr 2017TopicsEnd user technology, End user device

    This guidance was developed following testing performed on a Chromebook device running Chrome OS 56.

  • Chromed engine

    New Chrome OS guidance released

    Blog post19 Apr 2017AuthorAndy PTopicsEnd user technology, End user device

    We've revived and refreshed the Chrome OS guidance and published it into our EUD portfolio

  • The Research Institute in Hardware Security

    Information22 Mar 2017TopicsResearch, End user technology, Partnerships

    Establishment of a new virtual academic research institute investigating topics relating to hardware enabled security.

  • EUD Security Guidance: Windows 10

    Guidance06 Mar 2017TopicsEnd user technology, End user device

    Secure configuration for devices running Windows 10 1607 “Anniversary Edition”

  • Windows 10 EUD Guidance

    What's new with Windows 10?

    Blog post06 Mar 2017AuthorAndy PTopicsEnd user technology, BYOD, End user device

    New device security guidance and some timely reminders

  • NCSC IT: Architecture

    NCSC IT: The architecture behind NCSC's IT system

    Blog post22 Feb 2017AuthorRichard CTopicsIT infrastructure, Technology at OFFICIAL, End user technology

    A look at the high-level design of the NCSC's new IT system, including the single sign-on architecture, our initial end user device choices, and how we tackled the captive portal problem.

  • A safe

    Which smartphone is the most secure?

    Blog post10 Feb 2017AuthorAndy PTopicsEnd user technology, Secure communications

    A straight answer to a difficult question

  • Firmware Status Check

    Firmware II: Status check

    Blog post25 Jan 2017AuthorMike HTopicsEnd user technology, End user device

    Initial research shows firmware frequently out of date