Britain’s Free Cyber Security Service

The British National Cyber Security Centre (NCSC) has recently released a new email security checking service to help organisations identify vulnerabilities that can let hackers spoof emails or create email privacy breaches. According to their official statement the Email Security Check device requires no sign-ups or personal details.

All UK social housing providers have also been offered access to free cyber security services by the NCSC, in a move supported by Housemark, the data and insight company for the UK housing sector

The NCSC provides a range of free cyber security tools and services to eligible organisations as part of the Active Cyber Defence (ACD) programme. This service is now provided online for free to help some UK sectors having a superficial adoption of recommended email security controls and is as low as just 7% in some cases. 

The UK government stated that the Email Security Check is intended to help secure organisational email systems, in two distinct ways.

  • First, by making it difficult for fake emails to be sent from the organisation’s domains.
  • Second, by protecting your email in transit with Transport Layer Security (TLS). 

TLS is a protocol that encrypts and delivers email data securely, for both inbound and outbound email traffic. It helps prevent eaves-dropping between email servers, keeping your messages private while they're moving between email providers. TLS is being adopted as the standard for email security.

It works by checking publicly available Internet DNS records to verify if anti-spoofing controls are correctly configured and the TLS configuration by initiating server communication. TLS checks that anti-spoofing standards are configured correctly to help organisations prevent cyber criminals from abusing their domain and sending out malicious emails pretending to be them. 

“It also looks up whether privacy protocols, such as TLS, are in place to ensure that emails are encrypted when in transit so they cannot be accessed and remain confidential between mail servers.” the NCSC said.

NCSC:       Google:     UK Tech News:       I-HLS:   

You Might Also Read: 

The Top 3 Current Email Threats:


 

« What Security Issues Do 5G Network Providers Need To Address?
Malaysian Airline Ransomware Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.

Sinergi Digital

Sinergi Digital

Sinergi Digital is a business unit of the Metrodata Group with a focus on providing ICT solution to help accelerating digital transformation.