Cookies on this site
--------------------
We use some essential cookies to make this website work.
We’d like to set additional cookies to understand how you use our website so we can improve our services.
Accept optional cookies
Reject optional cookies
[
Manage Cookies (opens in a new tab)
](/section/about-this-website/cookie-policy)
Written for
-----------
This section shows the list of targeted audiences that the article is written for
Close
[
#### Experienced a cyber attack?
Find resources to help you or your organisation to recover
](/section/respond-recover/overview)
Find guidance and resources for . . .
-------------------------------------
[
You & your family
](/section/information-for/you-your-family)
[
Small & medium sized organisations
](/section/information-for/small-medium-sized-organisations)
[
Large organisations
](/section/information-for/large-organisations)
[
Self employed & sole traders
](/section/information-for/self-employed-sole-traders)
[
Public sector
](/section/information-for/public-sector)
[
Cyber security professionals
](/section/information-for/cyber-security-professionals)
[
View latest content
-------------------
](/section/advice-guidance/all-articles?q=&defaultTypes=guidance,information,blog-post,collection,report,news,section&sort=date%2Bdesc)
[
GUIDANCE
#### Network security fundamentals
How to design, use, and maintain secure networks.
](/guidance/network-security-fundamentals)
[
GUIDANCE
#### Secure sanitisation and disposal of storage media
How to ensure data cannot be recovered from electronic storage media.
](/guidance/secure-sanitisation-storage-media)
[
GUIDANCE
#### Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both before and after a compromise.
](/guidance/guidance-on-digital-forensics-protective-monitoring)
Protect your organisation with Cyber Essentials
-----------------------------------------------
3,500 UK organisations certified every month.
[Visit Cyber Essentials to learn more](/cyberessentials/overview)
Popular content for organisations
---------------------------------
[
COLLECTION
#### Cyber Security Toolkit for boards
Resources designed to help board members govern cyber risk more effectively.
](/collection/board-toolkit)
[
COLLECTION
#### Device Security Guidance
Guidance for organisations on how to choose, configure and use devices securely
](/collection/device-security-guidance)
[
COLLECTION
#### Cyber Assessment Framework
Cyber incidents can result in a number of different consequences, depending on the nature of the network and information systems targeted and intention of the perpetrators.
](/collection/cyber-assessment-framework)
[
SECTION
#### Cyber Essentials
Protect your organisation, whatever its size, against the most common cyber threats.
](/cyberessentials/overview)
Heightened cyber threat
-----------------------
Advice and information for organisations looking to improve their resilience when the cyber threat is heightened.
[Learn more](/section/keep-up-to-date/heightened-threat)
Popular content for you & your family
-------------------------------------
[
GUIDANCE
#### Recovering a hacked account
A step by step guide to recovering online accounts.
](/guidance/recovering-a-hacked-account)
[
COLLECTION
#### Top tips for staying secure online
Top tips to ensure you are doing all you can to secure you and your family online
](/collection/top-tips-for-staying-secure-online)
[
COLLECTION
#### Phishing: Spot and report scam emails, texts, websites and calls
How to recognise and report emails, texts, websites, adverts or phone calls that you think are trying to scam you.
](/collection/phishing-scams)
[
SECTION
#### You & your family
Advice for individuals to respond to an online scam.
](/section/respond-recover/you)
Received a suspicious message?
------------------------------
Help track and stop cyber criminals. Send suspicious emails to [[email protected]](mailto:[email protected]), texts to 7726 and [report scam websites](/collection/phishing-scams/report-scam-website)
[Learn more about spotting suspicious messages](/collection/phishing-scams)
[
Content by topic
----------------
](/section/advice-guidance/all-topics)
[
Authentication
](/section/advice-guidance/all-topics?allTopics=true&topics=authentication)
[
Cyber Essentials
](/section/advice-guidance/all-topics?allTopics=true&topics=cyber essentials)
[
Education
](/section/advice-guidance/all-topics?allTopics=true&topics=education)
[
Phishing
](/section/advice-guidance/all-topics?allTopics=true&topics=phishing)
[
Respond to a cyber attack
-------------------------
](/section/respond-recover/overview)
Resources for individuals and organisations in the UK who have experienced an online scam or cyber attack.
[
#### You & your family
Advice for individuals to respond to an online scam.
](/section/respond-recover/you)
[
#### Sole traders & small organisations
Advice for sole traders and small organisations to respond to cyber attacks.
](/section/respond-recover/sole-small)
[
#### Medium & large organisations
Advice and guidance for medium to large organisations to help respond to a cyber incident.
](/section/respond-recover/medium-large)
Search
------
[
Search
](/search?q=)
### Popular searches
[Cyber Aware](/search?q=Cyber%20Aware)
[Cyber Essentials](/section/advice-guidance/all-topics?allTopics=true&topics=cyber%20essentials&sort=date%2Bdesc)
[CYBERUK](/search?q=CYBERUK)
[Passwords](/section/advice-guidance/all-topics?allTopics=true&topics=passwords&sort=date%2Bdesc)
[Phishing](/section/advice-guidance/all-topics?allTopics=true&topics=phishing&sort=date%2Bdesc)
[Ransomware](/section/advice-guidance/all-topics?allTopics=true&topics=ransomware&sort=date%2Bdesc)