Cybersecurity Toolkits


Configure Securely Detailed guidance and instructions on how to securely configure your systems from the Center for Internet Security. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Prevent Phishing & Viruses Installing Anti Virus and ad/pop-up blockers help protect against accidentally downloading viruses and malicious software from the Internet. Quad9 blocks access to websites known to harbour malicious threats. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Back Up and Recover Regular backing up of data helps ensure recovery from a cyber attack (as well as from flooding and theft) with minimal loss of data. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Control Access Limiting access to network based resources, restricting user permissions and switching off unused/old access routes allows users to function effectively whilst minimising routes in for attack. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Log and Monitor Monitoring what is happening on a continual basis allows abnormalities, which could indicate the presence of an intruder, to be identified and acted upon. These tools are specific to our elections toolkit. Defend Against Ransomware Regular backing up of your data helps ensure recovery from a ransomware attack with minimal loss of data. Ransomware stops you accessing your data and makes demands (often cryptocurrency) to regain access. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Update Your Defenses Timely application of security patches and updates are key for continued protection against attack. This toolbox helps ensure your systems are set to apply these automatically. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Beyond Simple Passwords This section explains the importance of using strong unique passwords for each account, adding a second layer of protection through 2 factor authentication and options for storing multiple complex passwords securely with password managers. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Know What You Have You can not protect what you do not know you have - assets and inventory. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Protect Your Email and Reputation The majority of cyber attacks start with a phishing email - Deploying DMARC helps stop others impersonating you or your organisation on email and prevents fraudsters gaining access to your systems by pretending to be from a trusted email address. Please also review the DMARC category on this forum.
Topic Replies Views Activity
1 73 August 15, 2019
1 85 September 30, 2019
1 33 May 1, 2020
1 25 May 1, 2020
1 82 April 9, 2020
1 70 April 9, 2020
1 103 March 26, 2020
1 111 March 12, 2020
1 134 February 27, 2020
1 97 February 13, 2020
1 27 April 8, 2020
1 29 April 8, 2020
4 97 April 7, 2020
1 27 March 19, 2020
1 29 March 19, 2020
1 166 March 19, 2020
1 51 March 5, 2020
1 50 February 20, 2020
3 101 February 19, 2020
1 52 January 31, 2020
1 49 January 31, 2020
1 120 January 27, 2020
1 67 January 24, 2020
1 78 September 12, 2019
1 67 September 12, 2019
2 100 December 20, 2019
3 251 December 2, 2019
1 76 September 30, 2019
1 66 September 20, 2019
2 109 September 19, 2019