Threat Information
Plan & Build
It is important that you understand the risks associated with deploying these technologies, whether they relate to location sensitivities, data protection considerations or privacy concerns
NCST are highly functional computers which are connected to a network and need to be suitably protected
Electronic attack of physical security systems is the means of carrying out a localised cyber-attack specifically on the security system. This can be to corrupt data, open a portal or disable alarms.
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems.
Operate & Detect
Passport to Good Security - Online Social Behaviour: what your employees do and say online, or how they use digital devices, can make them and your organisation vulnerable to security threats.
Passport to Good Security - Home and Mobile Working: working away from the office can have numerous benefits for employees, but can also present an additional security risks.
This guidance is for users of shared workspaces and provides practical advice tailored to your workspace and activities
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems.
Response & Review
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems
Complete Guidance
Considerations for use of AI in protective security and guidance on defending against AI enabled threats
Information on how open and shared data relates to a Security-Minded approach.
NPSA and NCSC have written guidance about Network Connected Security Technologies (NCST)
A key purpose of connected places, also known as smart cities, also known as is to join up specific vertical sectors across organisational boundaries into a whole-city approach for the creation, delivery and use of city spaces and services
Guidance on how to take a Security-Minded approach to Digital Engineering, Technologies, Projects and Initiatives
Guidance aimed at Users and Providers of shared workspaces, offices, coworking spaces and laboratories to encourage basic security practices and enhance your security awareness
NPSA have released new election protective security guidance on protecting pedestrian queues
Guidance for data centre owners and users. You should use this guidance to inform your own risk management strategy that is unique to your organisation’s needs
This guidance is designed to help workspace providers provide the safety and collaboration that your users seek.
Guidance on how to take a security-minded approach to Digital Engineering, Technologies, Projects and Initiatives
The UK’s thriving science and technology sector is at risk of being compromised by certain states for their technological, economic, political, and military gain. Secure your success
Foreign governments could use their intelligence services and their economic power to target your research. Secure your success
Being part of the UK's Critical National Infrastructure makes you, your colleagues, and your organisation highly attractive targets to certain states. Secure your success
Critical and emerging technology companies are at risk of being compromised by certain states for their technological, economic, political, and military gain. Secure your success
UK technology companies are at risk of being compromised by certain states for their technological, economic, political, and military gain. Secure your success
NPSA’s Passport to Good Security for Senior Executives sets out 20 principles for effective security management
Protect sensitive information about your activities and people connected to you.
Protect your personal information to reduce the opportunity for people to target you.


