Key Cyber Risks
Six Digital Security Rules
Key Tools
100

Malicious software locks systems and files until a ransom is paid, causing major operational disruption.

Ransomware 

100

Pause and check links or messages before interacting with them.

Think before you click

100

Cyber Barometer

A personal cyber‑risk dashboard that helps you understand and reduce your risk levels.

200

Attackers use stolen credentials to access sensitive systems, with most breaches involving compromised identities.

Identity theft

200

Use strong, secure passwords and keep them private.

Protect your passwords

200

Digital Security Intranet

Your one‑stop hub for resources and guidance on digital security.

300

Losing files or data exposes sensitive information and is often caused by human error.

Data loss

300

Immediately raise concerns about anything that looks unusual or unsafe.

If you suspect it, report it 

300

Cyber Assist 

Provides quick answers to cyber‑security questions and support in emergencies.

M
e
n
u