Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.
Advice from security and intelligence experts across government about how to prevent the majority of cyber (information technology) attacks, and how to manage common cyber risk. This guidance has been updated to include the document ‘Common Cyber Attacks’ which sets out what a common cyber attack looks like and how attackers typically execute them.
This Guide and the accompanying documents have been produced jointly by GCHQ, BIS and CPNI. They are not intended to be an exhaustive guide to potential cyber threats or mitigations, are not tailored to individual needs and are not a replacement for specialist advice. Companies should ensure that they take appropriate specialist advice where necessary.
This Guide and the accompanying documents are provided without any warranty or representation of any kind whether express or implied. The government departments involved in the production of these documents cannot therefore accept any liability whatsoever for any loss or damage suffered or costs incurred by any person arising from the use of this document.
Findings and recommendations in this Guide and the accompanying documents have not been provided with the intention of avoiding all risks and following the recommendations will not remove all such risks. Ownership of information risks remains with the relevant system owner at all times.
© Crown Copyright 2015