Cybersecurity Toolkits


Prevent Phishing & Viruses Installing Anti Virus and ad/pop-up blockers help protect against accidentally downloading viruses and malicious software from the Internet. Quad9 blocks access to websites known to harbour malicious threats. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Configure Securely Detailed guidance and instructions on how to securely configure your systems from the Center for Internet Security. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Back Up and Recover Regular backing up of data helps ensure recovery from a cyber attack (as well as from flooding and theft) with minimal loss of data. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Control Access Limiting access to network based resources, restricting user permissions and switching off unused/old access routes allows users to function effectively whilst minimising routes in for attack. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Log and Monitor Monitoring what is happening on a continual basis allows abnormalities, which could indicate the presence of an intruder, to be identified and acted upon. These tools are specific to our elections toolkit. Update Your Defenses Timely application of security patches and updates are key for continued protection against attack. This toolbox helps ensure your systems are set to apply these automatically. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Defend Against Ransomware Regular backing up of your data helps ensure recovery from a ransomware attack with minimal loss of data. Ransomware stops you accessing your data and makes demands (often cryptocurrency) to regain access. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Beyond Simple Passwords This section explains the importance of using strong unique passwords for each account, adding a second layer of protection through 2 factor authentication and options for storing multiple complex passwords securely with password managers. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one. Protect Your Email and Reputation The majority of cyber attacks start with a phishing email - Deploying DMARC helps stop others impersonating you or your organisation on email and prevents fraudsters gaining access to your systems by pretending to be from a trusted email address. Please also review the DMARC category on this forum. Know What You Have You can not protect what you do not know you have - assets and inventory. Drop down the tags to identify the tool you wish to discuss. Please check existing topics before creating a new one.
Topic Replies Views Activity
1 92 August 15, 2019
1 93 June 6, 2020
1 50 June 6, 2020
1 39 June 6, 2020
1 43 June 6, 2020
1 22 June 5, 2020
1 104 June 5, 2020
1 77 June 5, 2020
1 78 June 5, 2020
1 41 June 5, 2020
1 25 June 5, 2020
1 99 September 30, 2019
1 55 May 1, 2020
1 45 May 1, 2020
1 99 April 9, 2020
1 88 April 9, 2020
1 177 March 26, 2020
1 173 March 12, 2020
1 178 February 27, 2020
1 132 February 13, 2020
1 41 April 8, 2020
1 45 April 8, 2020
4 111 April 7, 2020
1 44 March 19, 2020
1 45 March 19, 2020
1 219 March 19, 2020
1 63 March 5, 2020
1 113 February 20, 2020
3 183 February 19, 2020
1 66 January 31, 2020