Britain’s Free Cyber Security Service

The British National Cyber Security Centre (NCSC) has recently released a new email security checking service to help organisations identify vulnerabilities that can let hackers spoof emails or create email privacy breaches. According to their official statement the Email Security Check device requires no sign-ups or personal details.

All UK social housing providers have also been offered access to free cyber security services by the NCSC, in a move supported by Housemark, the data and insight company for the UK housing sector

The NCSC provides a range of free cyber security tools and services to eligible organisations as part of the Active Cyber Defence (ACD) programme. This service is now provided online for free to help some UK sectors having a superficial adoption of recommended email security controls and is as low as just 7% in some cases. 

The UK government stated that the Email Security Check is intended to help secure organisational email systems, in two distinct ways.

  • First, by making it difficult for fake emails to be sent from the organisation’s domains.
  • Second, by protecting your email in transit with Transport Layer Security (TLS). 

TLS is a protocol that encrypts and delivers email data securely, for both inbound and outbound email traffic. It helps prevent eaves-dropping between email servers, keeping your messages private while they're moving between email providers. TLS is being adopted as the standard for email security.

It works by checking publicly available Internet DNS records to verify if anti-spoofing controls are correctly configured and the TLS configuration by initiating server communication. TLS checks that anti-spoofing standards are configured correctly to help organisations prevent cyber criminals from abusing their domain and sending out malicious emails pretending to be them. 

“It also looks up whether privacy protocols, such as TLS, are in place to ensure that emails are encrypted when in transit so they cannot be accessed and remain confidential between mail servers.” the NCSC said.

NCSC:       Google:     UK Tech News:       I-HLS:   

You Might Also Read: 

The Top 3 Current Email Threats:


 

« What Security Issues Do 5G Network Providers Need To Address?
Malaysian Airline Ransomware Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.