Home
Articles
Resources
FAQ
Members
About
Report Incident
My
Contact

News

Icon representing Alert - Microsoft Tech-Support Scammers using WannaCry attack to lure victims
Alert - Microsoft Tech-Support Scammers using WannaCry attack to lure victims

May 24th 2017
Default icon for news items
NCSC: Latest statement on international ransomware cyber attack

May 15th 2017
Icon representing 'Alarming' rise in ransomware
'Alarming' rise in ransomware

May 11th 2017
 

Poll

Have you ever had your email account hacked?


Yes, but only once.
Yes, several times.
No, never.
Not that I know of.
 
 
 

CESG helps you access expertise which has been evaluated against its standards

Getting the right advice 
May 2nd 2016
Getting the right advice
From the CESG Site: Products and Services

CESG helps you access expertise which has been evaluated against its standards


Certified Cyber Consultancy
Category: Getting the right advice
Topics: Best Practice, Government Strategy
CESG Certified Cyber Security Consultancy helps you get the right cyber security consultancy services to protect your information.

CESG Certified Professional
Category: Getting the right advice
Topics: Assurance, Certified Professionals
The CESG Certified Professional (CCP) scheme provides an independent assessment and verification process available to any experienced Information...
 
 
Developing your expertise
CESG certifies a number of training courses and Masters degrees in cyber security


GCHQ Certified Training
Category: Developing your expertise
Topics: Assurance, Research, Certified Training
The GCHQ Certified Training (GCT) scheme provides a benchmark for cyber security training by assuring the quality of both content and its delivery.
 
 
Protect: Choosing products and services
CESG helps you protect your critical data and systems


Commercial Product Assurance - products at foundation grade
Category: Protect: Choosing products and services
Topics: Risk Management, Technology at OFFICIAL, Government Strategy
CPA evaluates commercial off-the-shelf security-enforcing products and their developers against published security and development standards at...

Commercial Products - products in evaluation
Category: Protect: Choosing products and services
Topics: Risk Management, Technology at OFFICIAL, Assurance
This is a list of products that are not yet available but are currently being evaluated to Foundation Grade

CESG Assisted Products Service
Category: Protect: Choosing products and services
Topics:
The scheme evaluates High Grade products developed by industry for use by HMG and other appropriate organisations.

Common Criteria
Category: Protect: Choosing products and services
Topics: Risk Management, Technology at OFFICIAL
An internationally recognised certification scheme, Common Criteria provides formal recognition that a product meets its IA requirements.

TEMPEST and Electromagnetic Security
Category: Protect: Choosing products and services
Topics: Network Security, Secure Communications
The service helps HMG customers understand the level of unintentional signals emanating from ICT equipment which may give away sensitive data.

Commodity Information Assurance Services
Category: Protect: Choosing products and services
Topics: Destruction & Disposal, Risk Management, Secure Communications
CESG Assured Service (CAS) Scheme lists CESG approved commercial suppliers of services such as sanitisation and telecoms.
 
 
Testing your security
To give confidence in your IT and data systems, CESG approved companies can test for potential vulnerabilities


Tailored Evaluation
Category: Testing your security
Topics: Assurance, Certified Services
CESG Tailored Assurance Service (CTAS) provides tailored testing of specific security attributes of a system, product or service.

Penetration Testing
Category: Testing your security
Topics: Network Security, Cloud Security, Risk Management
The CHECK scheme enables CESG approved companies to carry out penetration testing of HMG and other public sector bodies IT systems.
 
 
Responding to incidents
Identifying a supplier of Cyber Incident Response services in advance enables a quicker reaction to cyber incidents


Cyber Incidents
Category: Responding to incidents
Topics: Enterprise IT, Cloud Security, Cyber Attacks
The schemes provide industry expertise to deal with cyber incidents, they determine the extent of the incident and provide recommendations.
 
 
Trusting Others
Key to keeping your information secure is being able to trust other organisations that you deal with.


Cyber Essentials
Category: Trusting Others
Topics: Enterprise IT, Risk Management, Best Practice
Cyber Essentials helps organisations to protect themselves against common cyber threats.