Serviceteam IT Security News

Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS Server

The vulnerability also exposed login credentials for a massive national insurance claims database,...
Serviceteam IT Security News

Gojdue Variant Eludes Microsoft, Google Cloud Protection, Researchers Say

Researchers have identified a new ransomware strain that went undetected by built-in malware...
Serviceteam IT Security News

Introducing new guidance on Virtual Private Networks (VPNs)

To help you decide on your approach to using a VPN for remote access, we have just released our new VPN guidance. We know many of you struggle with the multitude of configuration options and products available when making decisions on VPN…
Serviceteam IT Security News

Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims

Hotspot Shield has been downloaded more than 500 million times, according to its...
Serviceteam IT Security News

Cisco Issues New Patches for Critical Firewall Software Vulnerability

The vulnerability has a CVSS base score of 10.0, the highest possible, and...
Serviceteam IT Security News

Announcing the NCSC’s new Phishing Guidance

I'm delighted to announce the publication today of our new guidance, Phishing Attacks: Defending...
Serviceteam IT Security News

Research into dealing with weak domain passwords

Update We are no longer looking for participants for this study, but we...
Serviceteam IT Security News

Active Cyber Defence – one year on

In November 2016, just after the NCSC formally came into existence, and as...
Serviceteam IT Security News

JenX Botnet Has Grand Theft Auto Hook

A GTA hosting site is offering powerful DDoS attacks for $20 a pop,...
Serviceteam IT Security News

New Western Digital My Cloud Bugs Give Local Attackers Root on NAS Devices

Two new WD My Cloud vulnerabilities have been identified, adding to last month’s...
Serviceteam IT Security News

Crypto Miners May Be the ‘New Payload of Choice’ for Attackers

Crypto mining botnets provide a stealthy way to generate big bucks, without the...
Serviceteam IT Security News

Massive Smominru Cryptocurrency Botnet Rakes In Millions

Researchers say Smominru threat actors are in control of 500,000 node botnet and...
Serviceteam IT Security News

Updating our Factory Reset Guidance

We’ve just published new End User Devices Factory Reset Guidance on our website. We hope...
Serviceteam IT Security News

Cisco Patches Critical VPN Vulnerability

Cisco Systems released a patch Monday to fix a critical security vulnerability, with...
Serviceteam IT Security News

NCSC IT: How the NCSC built its own IT system

“When are you going to share the design of the NCSC IT system?”...
Serviceteam IT Security News

Supply chain security collection

Proposing a series of 12 principles, designed to help you establish effective control and...
Serviceteam IT Security News

III. Check your arrangements

  10. Build assurance activities into your supply chain management Require those suppliers who...
Serviceteam IT Security News

Objective A. Managing security risk

Principles under this Objective A1. Governance Putting in place the policies and processes...
Serviceteam IT Security News

IV. Continuous improvement

  11. Encourage the continuous improvement of security within your supply chain Encourage your...
Serviceteam IT Security News

B1. Service protection policies and processes

Principle The organisation defines, implements, communicates and enforces appropriate policies and processes that...
Serviceteam IT Security News

Introduction to the NIS Directive

General Introduction What does the NIS Directive cover and when will it...
Serviceteam IT Security News

D1. Response and recovery planning

Principle There are well-defined and tested incident management processes in place, that aim...
Serviceteam IT Security News

A4. Supply chain

Principle The organisation understands and manages security risks to networks and information systems...
Serviceteam IT Security News

Supply chain security: 12 Principles infographic

This guidance has been produced to help organisations gain and maintain control of...
Serviceteam IT Security News

D2. Lessons learned

Principle When an incident occurs, steps must be taken to understand its root...
Serviceteam IT Security News

Assessing supply chain management practice

  Good Bad Develop partnerships with your suppliers. If your suppliers adopt your approach...
Serviceteam IT Security News

B5. Resilient networks and systems

Principle The organisation builds resilience against cyber-attack and system failure into the design,...
Serviceteam IT Security News

I. Understand the risks

Until you have a clear picture of you supply chain, it will be...
Serviceteam IT Security News

A3. Asset management

Principle Everything required to deliver, maintain or support networks and information systems for...
Serviceteam IT Security News

A2. Risk management

Principle The organisation takes appropriate steps to identify, assess and understand security risks...