This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as digital pickpocketing. As our lives become ever more connected, the convenience of storing payment cards, tickets and identification […]
Read more CyberByte – November 2025 in modal dialog
Information to help public bodies, businesses and third sector organisations improve their online security and protect against cyber threats.
Read more Cyber Resilience: General Guidance in modal dialog
Proposing a series of 12 principles, designed to help you establish effective control and oversight of your supply chain.
Read more Supply Chain Security Guidance in modal dialog
Insight into the thoughts, good practice and stories from across the NCSC and its partners.
Read more NCSC Blogs in modal dialog
This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialog
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog