Articles

December 8, 2025

Sextortion emails: how to protect yourself

Advice in response to the increase in sextortion scams
December 8, 2025

Shopping and paying safely online

Tips to help you purchase items safely and avoid fraudulent websites.
December 8, 2025

How to recover an infected device

Advice for those concerned a device has been infected.
December 8, 2025

Recovering a hacked account

A step by step guide to recovering online accounts.
December 8, 2025

Data breaches: guidance for individuals and families

How to protect yourself from the impact of data breaches
December 8, 2025

How to spot scammers claiming to be from the NCSC

Check that you’re talking to a genuine NCSC employee, and not a criminal.
December 8, 2025

Using IPsec to protect data

Guidance for organisations wishing to deploy products that use IPsec.
December 8, 2025

Prompt injection is not SQL injection (it may be worse)

There are crucial differences between prompt and SQL injection which – if not considered – can undermine mitigations.
December 8, 2025

Using TLS to protect data

Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.