LATEST THREAT INTELLIGENCE

Microsoft
Search our Knowledgebase

Google_1

BEST PRACTICE: NCSC - Recommended actions to improve your Cybersecurity protocols

NCSC: Recommended actions to improve your Cybersecurity protocols
Posted By: Iain Fraser - Cybersecurity Journalist
via https://bit.ly/CyberJourno

The UK National Cyber Security Centre (NCSC) has recently published recommended actions for UK organisations to take when the cyber threat is heightened and steps to improve security.

An organisation's view of its cyber risk might change if new information emerges that the threat has heightened. This might be because of a temporary uplift in adversary capability, if for example there is a zero-day vulnerability in a widely used service that capable threat actors are actively exploiting. Or it could be more specific to a particular organisation, sector or even country, resulting from hacktivism or geopolitical tensions.

These diverse factors mean that organisations of all sizes must take steps to ensure they can respond to these events. It is rare for an organisation to be able to influence the threat level, so actions usually focus on reducing your vulnerability to attack in the first place and reducing the impact of a successful attack. Even the most sophisticated and determined attacker will use known vulnerabilities, misconfigurations or credential attacks (such as password spraying, attempting use of breached passwords or authentication token reuse) if they can. Removing their ability to use these techniques can reduce the cyber risk to your organisation. Learn More/...




Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ad

Microsoft365 for Business

Below Post Ad

Get 10 for £10 at New Scientist now