Information and Cyber Security
- Overview
- Guidance, Documents & Policies
- Info/Cyber Security Checklist
- Examples & Advice
- FAQs
- Ask a Question
Data Protection often looks at the security and legalities of personal data, information security looks at more practical steps to secure all data in your organisation - in reality, the two things are intrinsically linked and the DPE data protection framework utilised many approaches from information security frameworks.
The documents include:
- Cyber Essentials Guidance
- Business Continuity Template
- Information Security Policy
- Physical Security Policy
- Changing IT Provider Considerations
For a complete Information Security programme, other resources and tools are necessary, as well as strategic coordination with your information technology and facilities specialists. However, it is important to remember that accountability and governance is the responsibility of leadership and practical security and data protection is everyone's responsibility.
Other policies and tools should be used as part of your information security programme and these are an important part of a data protection programme. These include:
- Clear desk policies
- Record of processing (supplier, systems and hardware due diligence)
- Retention schedules
- Records management
- Risk management
- Bring your own device
- Acceptable use
- Password Management
- User Access Control
- etc.
Risk assessment is a key factor in information governance. We have therefore provided a new e-learning module on risk assessment.
Templates, Policies and Guidance:
document Cyber Essentials Guidance (24 KB)
document What to do immediately after a Cyber Attack (58 KB)
document DPE Business Continuity Template (37 KB)
document Information Security Policy (469 KB)
DPE Model Physical Security Policy
Advice and guidance when changing IT providers: document DPE Changing IT Provider Considerations (205 KB)
Related Best Practice Areas
- Passwords
- Clear desk
- Working out of school
- Records Management
- Acceptable Use
- Site moves
- Data Breaches
- Create a Phishing Simulation Campaign: Phishing Simulation
Drip-feed posters
Stay Safe Online Infographic
NCSC Ten Steps to Cyber Security Infographic
e-Learning
- How to avoid a data breach: Information and Cyber Security
- Stay Safe Online NCSC
- Password Security
- NCSC Cyber Security Training for School Staff
- Introduction to Risk Management
- NCSC Top Tips for Staff Interactive Video
- Cyber Security Guidance for small businesses
External links
Get Ready for Cyber Essentials
ISO/IEC 27001 and related standards
ICO Information Security Checklist
NCSC Cyber Security Toolkit for Boards
NEN Standard Network Design:
NEN MAT Standard Network Design
NEN Secondary Standard Network Design
NEN Primary Standard Network Design
How to Report a Cyber Attack
Tell someone! Report to IT. Report to SLT.
Unplug the computer from the internet by removing the ethernet cable or turning the Wi-Fi off.
If you are a victim of a ransomware attack we would recommend reporting this to Action Fraud: https://www.actionfraud.police.uk/ as well as your data protection officer so they can advise about the data loss. Most cyber crimes like these will also need to be reported to the ICO by your data protection officer.
Government Cyber Incident Reporting Service: https://signpost-cyber-incident.service.gov.uk/
Isolate the infected device and pass to IT
Always ensure there are backups you can restore from.
Little Guide to ACTION FRAUD
Remember – ‘Hackers don’t break in they login’!

Update on Advisory for Rhysida Ransomware

The Crime in a Cyber Attack and a Data Breach

NCSC Annual Review is published for 2023

Learning from Data Breaches

Windows 11 security ineffective against attacks on old devices

International Counter Ransomware Initiative 2023 Joint Statement

Resistant Cloud Backups
We all know that backups are an essential part ...

Top Ten Cyber Security Misconfigurations

ICO Reprimand: company suffered a ransomware attack

October is Cyber Security Awareness Month: 31. On the road to cyber essentials

The UK Online Safety Bill becomes an Act (Law)

October is Cyber Security Awareness Month: 24. Backups

October is Cyber Security Awareness Month: 27. Passwords

October is Cyber Security Awareness Month: 30. Support

October is Cyber Security Awareness Month: 29. Admin controls

October is Cyber Security Awareness Month: 28. Phishing

October is Cyber Security Awareness Month: 26. Physical Security

October is Cyber Security Awareness Month: 25. Server Security

October is Cyber Security Awareness Month: 23. Filtering and Monitoring

October is Cyber Security Awareness Month: 22. Hardware: Printers

October is Cyber Security Awareness Month: 21. Hardware: Asset Control

October is Cyber Security Awareness Month: 20. Hardware: Safe disposal

October is Cyber Security Awareness Month: 19. Anti-virus/anti-malware

October is Cyber Security Awareness Month: 18. Regular Updates

October is Cyber Security Awareness Month: 17. Access Control (Users)

October is Cyber Security Awareness Month: 16. Access Control (Wi-Fi/Network access)

October is Cyber Security Awareness Month: 15. Access Control (working from home/off site)

October is Cyber Security Awareness Month: 14. Access Control (MFA)

October is Cyber Security Awareness Month: 13. Awareness
