Malicious software locks systems and files until a ransom is paid, causing major operational disruption.
Ransomware
Pause and check links or messages before interacting with them.
Think before you click
Cyber Barometer
A personal cyber‑risk dashboard that helps you understand and reduce your risk levels.
Attackers use stolen credentials to access sensitive systems, with most breaches involving compromised identities.
Identity theft
Use strong, secure passwords and keep them private.
Protect your passwords
Digital Security Intranet
Your one‑stop hub for resources and guidance on digital security.
Losing files or data exposes sensitive information and is often caused by human error.
Data loss
Immediately raise concerns about anything that looks unusual or unsafe.
If you suspect it, report it
Cyber Assist
Provides quick answers to cyber‑security questions and support in emergencies.