Home Working Cyber Security Toolkit

The British cyber security agency have created a tool to practice being cyber attacked and businesses are being urged to help keep their home working staff safe from cyber-attacks by testing their defences in a roleplay exercise devised by the National Cyber Security Centre (NCSC). 

The new exercise is part of a series in the agency’s Exercise in a Box toolkit, which is an online tool designed for helping organisations to understand how resilient they are to cyber-attacks and also for practicing their response in a safe environment.

The ‘Home and Remote Working’ exercise is the latest addition to the NCSC’s highly successful ‘Exercise in a Box’ toolkit, which helps businesses (notably SMEs) carry out drills in preparation for actual cyber-attacks. It has been launched as people continue to work from home in an attempt to stop the spread of coronavirus, often doing so over personal internet connections and computers. The tool allows people to test their defences by roleplaying the experience of being hit by a cyber-attack. 

It comes as millions of workers continue to work from home during the coronavirus pandemic, and has been designed to help workers reduce the risk of data compromises while working away from the office.

The exercise focuses on three key areas, teaching staff how they can safely access networks from home, which services might be needed for secure collaboration and what processes need to be in place to manage a cyber-attack remotely.
The NCSC has previously published guidance on safe home working during the pandemic, including tips on securely setting up video conferencing software.

The new online roleplay is the latest in the existing Exercise in a Box toolkit aimed at businesses wanting to test their cyber security.

Sarah Lyons, NCSC deputy director for economy and society engagement, said: "We know that businesses want to do all they can to keep themselves and their staff safe while home working continues, and using Exercise in a Box is an excellent way to do that. "While cyber security can feel daunting, it doesn't have to be, and the feedback we have had from our exercises is that they're fun as well as informative....  I would urge business leaders to treat Exercise in a Box in the same way they do their regular fire drills - doing so will help reduce the chances of falling victim to future cyber-attacks." 

The NCSC is the UK’s lead technical authority on cyber security and offers unrivalled real-time threat analysis, defence against national cyber-attacks and tailored advice to victims when incidents do happen.

NCSC:       Independent:      FS Matters:      Government Computiing

You Might Also Read: 

Easing Out Of Lockdown: Why Should Cyber Security Remain High On The Agenda?:

 

 

« US National Cyber Defense Policy
Vital Necessity Of Cloud Computing Highlights Security Risks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.