Getting involved
If you’d like to share resources for inclusion in Cyber@Socitm, we’d love to hear from you! Find out more by visiting our write for us page.
Background information Credential theft is a persistent and significant risk for educational institutions, particularly when multi-factor authentication (MFA) is … Read more
Background information Credential theft remains a significant and persistent risk for educational institutions and their supporting local authorities, especially … Read more
All staff Cyber threats and incidents Cyber incidents can have a significant impact on staff, both professionally and personally. … Read more
Introduction At the start of 2022, Socitm published our Public Sector Digital Trends 2022 report. In it we talked … Read more
Introduction The Covid-19 pandemic represented an unprecedented challenge to the United Kingdom’s public services. The circumstances of the last … Read more
1980s – Hacking emerges and legislation begins 1985 1986 1987 1988 1989 1990s – Malware and legislative response 1990 … Read more
The story of cyber security isn’t just a chronicle of breaches; it’s a dark mirror reflecting the relentless speed … Read more
“We are continuing to focus our digital programmes on building take-up. A number of our services are now at … Read more
Image source: NCSC Artificial Intelligence (AI) isn’t coming, it’s already here. From frontline services to back-office operations, public sector … Read more
Guest blog by Mark Brett, Socitm Honorary Life Member / Pro bono Cyber security and resilience advisor The Microsoft … Read more
Supporting the responsible and secure use of digital – cultures, technologies, artificial intelligence (AI) and data – to support … Read more
By Mark Brett, Socitm Advisor: Cyber Security and Resilience and Martin Ferguson, Director of Policy and Research AI seems … Read more
Upcoming Cyber Technical Advisory Group workshops If you have any questions please let josh.wood@nlawarp.net know. 1. Email security workshops … Read more
Helpful resources: Log4J – So what? Five steps to addressing Log4J vulnerability mark.brett@socitm.net Not the Yule log we were … Read more
Well, quite a lot actually, over a long period. Written by Mark Brett, Socitm Honorary Life Member / Pro bono Cyber advisor mark.brett@socitm.net Cyber security … Read more
If you’d like to share resources for inclusion in Cyber@Socitm, we’d love to hear from you! Find out more by visiting our write for us page.