Britain’s Free Cyber Security Service

The British National Cyber Security Centre (NCSC) has recently released a new email security checking service to help organisations identify vulnerabilities that can let hackers spoof emails or create email privacy breaches. According to their official statement the Email Security Check device requires no sign-ups or personal details.

All UK social housing providers have also been offered access to free cyber security services by the NCSC, in a move supported by Housemark, the data and insight company for the UK housing sector

The NCSC provides a range of free cyber security tools and services to eligible organisations as part of the Active Cyber Defence (ACD) programme. This service is now provided online for free to help some UK sectors having a superficial adoption of recommended email security controls and is as low as just 7% in some cases. 

The UK government stated that the Email Security Check is intended to help secure organisational email systems, in two distinct ways.

  • First, by making it difficult for fake emails to be sent from the organisation’s domains.
  • Second, by protecting your email in transit with Transport Layer Security (TLS). 

TLS is a protocol that encrypts and delivers email data securely, for both inbound and outbound email traffic. It helps prevent eaves-dropping between email servers, keeping your messages private while they're moving between email providers. TLS is being adopted as the standard for email security.

It works by checking publicly available Internet DNS records to verify if anti-spoofing controls are correctly configured and the TLS configuration by initiating server communication. TLS checks that anti-spoofing standards are configured correctly to help organisations prevent cyber criminals from abusing their domain and sending out malicious emails pretending to be them. 

“It also looks up whether privacy protocols, such as TLS, are in place to ensure that emails are encrypted when in transit so they cannot be accessed and remain confidential between mail servers.” the NCSC said.

NCSC:       Google:     UK Tech News:       I-HLS:   

You Might Also Read: 

The Top 3 Current Email Threats:


 

« What Security Issues Do 5G Network Providers Need To Address?
Malaysian Airline Ransomware Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

The Networking People (TNP)

The Networking People (TNP)

TNP specialises in network consultancy and engineering services including information security.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Cryptovision

Cryptovision

cv cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

FiberWolf

FiberWolf

FiberWolf is a Managed Security Service Provider (MSSP) serving customers from diverse industries including Government, Education, Banking and Technology.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.