Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Protective DNS for the private sector

Protective DNS for the private sector

Advice on the selection and deployment of protective Domain Name Systems (DNS).

This guidance is aimed at private sector organisations who do not qualify to use the NCSC’s Protective DNS (PDNS).

Related resources

Social Media Marketplace Fraud Guide

This guide highlights how fraudsters exploit social media marketplaces to trick users into buying or selling items that either don’t exist or aren’t as advertised – whether that’s goods, tickets or other services. It outlines what to watch out for, […]

Read more Social Media Marketplace Fraud Guide in modal dialog

Passwords & Two-Step Verification

This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]

Read more Passwords & Two-Step Verification in modal dialog

Exercise in a box

Exercise in a box is an NCSC online tool which helps organisations find out how resilient they are to cyber-attacks and to help them practice their response. The service provides exercises, based around the main cyber threats which your organisation […]

Read more Exercise in a box in modal dialog

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog

Guide to Phishing, Smishing and Vishing Scams

This guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.

Read more Guide to Phishing, Smishing and Vishing Scams in modal dialog
Back to top of the page