End user technology

Deployment and management of technology used by the employees, partners, or customers of an organisation.
Showing 1 - 25 of 47 results
Sort by: A-Z|Date
  • EUD Security Guidance: Chrome OS 65

    Guidance26 Jun 2018TopicsDesign and configuration, End user technology

    Secure configuration advice for Chrome OS 65

  • Android Go

    Ready, Set... Android Go?

    Blog post26 Jun 2018AuthorStuart GTopicsEnd user technology

    Is Android Go suitable for enterprise?

  • EUD Security Guidance: Windows 10 with Mobile Device Management

    Guidance21 May 2018TopicsIT infrastructure, End user technology, End user device

    Alpha security configuration guidance for Windows 10 with MDM

  • Cyber security at the World Cup

    Avoid scoring a cyber security own goal this summer

    Blog post16 May 2018AuthorSarah LTopicsEnd user technology

    Cyber security advice for fans travelling to the FIFA™ World Cup 2018 In Russia.

  • EUD Security Guidance: macOS 10.13 High Sierra

    Guidance07 May 2018TopicsEnd user technology, End user device
  • EUD Security Guidance: Windows 10 - 1709

    Guidance24 Apr 2018TopicsEnd user technology, End user device

    Secure configuration for devices running Windows 10 1709 “Fall Creators Update”

  • windows fall 1709

    What's new in Windows Fall Creators Update (1709)?

    Blog post24 Apr 2018AuthorStuart GTopicsEnd user technology, End user device

    An introduction to the updated Windows 10 guidance following the 1709 “Fall Creators Update”.

  • EUD Security Guidance: Android 8

    Guidance05 Apr 2018TopicsEnd user technology, End user device

    Secure configuration for work-managed devices running Android 8 (Oreo).

  • Image of a plate of Oreo biscuits with a model of the green android logo

    Introducing our EUD Guidance for Android 8

    Blog post05 Apr 2018AuthorStuart GTopicsEnd user technology, End user device

    Introducing our new End User Device guidance for Android 8 (Oreo) deployments.

  • Security Procedures Egress Switch

    Document07 Mar 2018TopicsIT infrastructure, Technology at OFFICIAL, End user technology, Secure communications

    These Security Procedures provide guidance in the secure operation of Egress Switch.

  • EUD Security Guidance: Samsung devices with Knox Workspace

    Guidance15 Feb 2018TopicsEnd user technology, End user device

    Secure configuration for Samsung devices running Knox Workspace 2.8 and higher

  • End user devices: factory reset and reprovisioning

    Guidance31 Jan 2018TopicsFlexible working, End user technology, End user device

    The methods described here are not guaranteed data sanitisation methods; they may not completely erase data so it cannot be recovered. For more information about how to sanitise affordably, please refer to the NCSC guidance on Secure sanitisation of storage media.

    Guidance for organisations deploying or redeploying mobile devices onto their networks.

  • Tape counter

    Updating our Factory Reset Guidance

    Blog post31 Jan 2018AuthorTom WTopicsEnd user technology, End user device

    There's more than one way to reset a device; Tom W explains why this matters.

  • NCSC IT: Agile infrastructure

    NCSC IT: How the NCSC built its own IT system

    Blog post29 Jan 2018AuthorRichard CTopicsIT infrastructure, Technology at OFFICIAL, End user technology

    The first in a series of blogs about how we built an OFFICIAL IT system to meet the needs of the NCSC

  • Queue of red London buses

    Firmware bugs are like buses

    Blog post23 Nov 2017AuthorMike HTopicsEnd user technology, End user device

    Intel's report this week of security vulnerabilities emphasises the importance of automating firmware updates

  • Devices

    This Black Friday, we're giving away... advice!

    Blog post20 Nov 2017AuthorTom WTopicsEnd user technology, End user device

    How to keep your shiny new tablets and phones secure

  • EUD Security Guidance: iOS 11

    Guidance10 Nov 2017TopicsEnd user technology, End user device

    Secure configuration for devices running iOS 11

  • EUD Security Guidance: Windows 10 - 1703

    Guidance25 Oct 2017TopicsEnd user technology, End user device

    Secure configuration for devices running Windows 10 1703 “Creators Update”

  • touching fingers

    Updating our Windows 10 guidance

    Blog post25 Oct 2017AuthorStuart GTopicsEnd user technology, End user device

    An introduction to the update of our alpha guidance published for 1607 "Anniversary Update".

  • Automating UEFI Firmware updates

    Automating UEFI Firmware Updates

    Blog post17 Oct 2017AuthorMike HTopicsEnd user technology, End user device
  • EUD: Windows 10 MDM

    Modernising Windows 10 Management

    Blog post21 Sep 2017AuthorStuart GTopicsIT infrastructure, End user technology, End user device

    Introducing our new Windows10 with MDM guidance

  • End User Devices: VPNs

    Guidance01 Aug 2017TopicsIT infrastructure, End user technology, Secure communications

    In this guidance we discuss the reasons for using VPNs and make recommendations on aspects of the underlying technology, such as protocols and cryptography. We also give risk management advice to organisations considering the use of VPNs.

  • virtual private networks

    Introducing new guidance on Virtual Private Networks (VPNs)

    Blog post01 Aug 2017AuthorAndy PTopicsIT infrastructure, Network security, End user technology

    An introduction to our new guidance on virtual private networks

  • Case Study: West Berkshire Council

    Case Study14 Jun 2017TopicsEnd user technology, Partnerships

    Easier logins, better connectivity, genuinely portable devices: improving the mobile user experience at West Berkshire Council.

  • Archery targets

    The Secure by Default Partnership Programme 2017

    Blog post02 May 2017AuthorAndy PTopicsSecure by default, End user technology, Partnerships

    We’re seeking proactive public sector partners to explore ways to remove or replace passwords for 2017's Secure by Default Partnership Programme