CERT-UK archive

Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.
Showing 17 results
Sort by: A-Z|Date
  • The Ongoing Legacy of Windows XP

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    The current place of XP in the OS market, the resultant risks and some advice on mitigation of the risk of still running it.

  • Patch management and vulnerabilities

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    This paper which highlights where shortfalls may lie and suggests methods for improving patch management policies for UK organisations.

  • Demystifying the exploit kit

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

  • Phishing – what is it and how does it affect me?

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages

    This report covers the basics of phishing as well as serving as a guide to executives on the importance of training and investing in defences

  • Understanding the security of digital currencies for UK businesses

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    This report provides the information necessary to make an informed decision about adopting digital currencies.

  • An introduction to threat intelligence

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    Two papers dealing with the technical aspects of threat intelligence.

  • Cyber-security risks in the supply chain

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    An introduction to cyber-security risks in supply chains and also provides examples to highlight the benefits of an inclusive approach.

  • Windows Server 2003 End of Life update

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    Options for organisations to minimise the risks faced as the result of Windows Server 2003 end of life.

  • An introduction to social engineering

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    An overview of social engineering techniques used and the steps that can be taken to help you protect your organisation’s information.

  • Denial of service attacks – what you need to know

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    What is meant by DOS/DDOS and how this type of attack works.

  • Code obfuscation

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    This best practice document introduces some of the key concepts in code obfuscation.

  • The ‘BadUSB’ vulnerability

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    An outline of the 'BadUSB’ vulnerability which exploits unprotected firmware in order to deliver malicious code to computers and networks.

  • Focus on WordPress

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    A high level paper that seeks to look at some of the issues surrounding WordPress.

  • Cloud computing and data storage

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    This report provides a good description of cloud storage benefits and risks and suggestions on how to maintain data security in the cloud.

  • An introduction to malware

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    A high level introduction to malware.

  • Cyber threats to the legal sector and implications to UK businesses

    Guidance01 Oct 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that has not yet been absorbed into the new NCSC web pages.

    An overview of the trend of attacks against the legal sector.

  • The hidden backdoor: how droppers spread malware

    Guidance30 Sep 2016TopicsArchived guidance, CERT-UK archive

    Archive content originally produced by CERT-UK that is no longer supported.

    How malicious actors use droppers and downloaders, how they work, what their role is in malware distribution and how they can be defended against.