NI Cyber Security Centre (@nicybersc) 's Twitter Profile
NI Cyber Security Centre

@nicybersc

We work to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses. #CyberSecureNI

ID: 1200011638948159488

linkhttp://www.nicybersecuritycentre.gov.uk calendar_today28-11-2019 11:22:51

2,2K Tweet

1,1K Takipçi

361 Takip Edilen

NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

🔐 Lock Down Your Old Accounts 🔐 How many unused accounts still have your personal information? Every online account you've ever created holds pieces of your identity. Even if you no longer use them, they can be a goldmine for cyber criminals looking to: ➡️ Steal your data

🔐 Lock Down Your Old Accounts 🔐

How many unused accounts still have your personal information?

Every online account you've ever created holds pieces of your identity. Even if you no longer use them, they can be a goldmine for cyber criminals looking to:

➡️ Steal your data
Action Fraud (@actionfrauduk) 's Twitter Profile Photo

⚠️ Received a suspicious text or email? ℹ️Contact the organisation directly. Don’t use the numbers or address in the message – use the details from their official website. ✅Report suspicious emails by forwarding them to: [email protected] #CyberProtect

⚠️ Received a suspicious text or email?

ℹ️Contact the organisation directly. Don’t use the numbers or address in the message – use the details from their official website.

✅Report suspicious emails by forwarding them to: report@phishing.gov.uk

#CyberProtect
NCSC UK (@ncsc) 's Twitter Profile Photo

Tonight, the NCSC features on BBC Panorama’s ‘Fighting Cyber Criminals’ where we share some of our work countering threats, supporting victims and empowering organisations to protect themselves. Watch on BBC1 at 8:30pm or on iPlayer now bbc.co.uk/iplayer/episod…

NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

🏠 Securing Remote Work 🏠 Working from home shouldn't mean letting security slip. Remote work is here to stay - but it also brings new risks if devices and networks aren't protected. Here are essential steps to keep buisness data safe when working remotely: 🔐 Use a secure

🏠 Securing Remote Work 🏠

Working from home shouldn't mean letting security slip.

Remote work is here to stay - but it also brings new risks if devices and networks aren't protected. Here are essential steps to keep buisness data safe when working remotely:

🔐 Use a secure
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

📧 Business Email Compromise 📧 An email that looks real can come at a devastating cost. Business Email Compromise (BEC) happens when criminals impersonate a trusted contact - like your boss or a supplier - to trick you into sending money or sensitive information. Stay

📧 Business Email Compromise 📧

An email that looks real can come at a devastating cost.

Business Email Compromise (BEC) happens when criminals impersonate a trusted contact - like your boss or a supplier - to trick you into sending money or sensitive information. 

Stay
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

📱Keeping Mobile Devices Secure 📱 Smartphones and tablets often hold work emails, contacts, and sensitive data. Protect them by: 🔐 Using strong PINs, passwords, or biometic locks. 🔁Installing updates as soon as they're available. 📲Only downloading apps from offical

📱Keeping Mobile Devices Secure 📱

Smartphones and tablets often hold work emails, contacts, and sensitive data. Protect them by: 

🔐 Using strong PINs, passwords, or biometic locks.
🔁Installing updates as soon as they're available. 
📲Only downloading apps from offical
Action Fraud (@actionfrauduk) 's Twitter Profile Photo

Ever received a suspicious email? 🚨 ℹ️ As of May 2025, over 42 million suspicious emails have been reported to the Suspicious Email Reporting Service, resulting in the removal of 400,000 scam websites by NCSC UK. Find out more about how to report suspicious emails, texts and

Ever received a suspicious email? 🚨

ℹ️ As of May 2025, over 42 million suspicious emails have been reported to the Suspicious Email Reporting Service, resulting in the removal of 400,000 scam websites by <a href="/NCSC/">NCSC UK</a>.

Find out more about how to report suspicious emails, texts and
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

📁 Protecting Sensitive Documents 📁 Could anyone walk off with your confidential files? Sensitive business documents - whether digital or paper - need protection: 🚷 Restrict access so only authorised staff can view or edit files. 📝 Store physical documents securely in locked

📁 Protecting Sensitive Documents 📁

Could anyone walk off with your confidential files? Sensitive business documents - whether digital or paper - need protection:

🚷 Restrict access so only authorised staff can view or edit files.
📝 Store physical documents securely in locked
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

Cyber Security Training: The First Line of Defence Is You 🫵 Most cyber attacks start with a simple mistake - like clicking a malicious link. Regular training helps people recognise red flags, understand new threats, and respond quickly. Tip ➡️ schedule short and engaging

Cyber Security Training: The First Line of Defence Is You 🫵

Most cyber attacks start with a simple mistake - like clicking a malicious link. Regular training helps people recognise red flags, understand new threats, and respond quickly.
 
Tip ➡️ schedule short and engaging
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

☁️Cloud Security: Convenience Needs Caution ☁️ Storing files in the cloud makes access easy but poor settings or weak access controls can lead to data leaks or breaches. Tip ➡️ Use reputable cloud services with encryptions, enable 2FA, and review access permissions regularly.

☁️Cloud Security: Convenience Needs Caution ☁️

Storing files in the cloud makes access easy but poor settings or weak access controls can lead to data leaks or breaches. 

Tip ➡️ Use reputable cloud services with encryptions, enable 2FA, and review access permissions regularly.
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

🚨 Insider Threats: Not All Risks Come from Outside 🚨 Insider threats can be intentional (like data theft) or accidental (like sending sensitive information to the wrong person). Both can be costly. Tip ➡️ Only give staff access to the information they need. Read more

🚨 Insider Threats: Not All Risks Come from Outside 🚨

Insider threats can be intentional (like data theft) or accidental (like sending sensitive information to the wrong person). Both can be costly.

Tip ➡️  Only give staff access to the information they need.

Read more
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

⚠️Incident Response: Be Ready Before It Happens ⚠️ No system is 100% breach proof. The key is being prepared to respond quickly and effectively if something goes wrong. A clear incident response plan reduces damage and downtime. Tip ➡️ Make sure your team knows the steps to

⚠️Incident Response: Be Ready Before It Happens ⚠️

No system is 100% breach proof. The key is being prepared to respond quickly and effectively if something goes wrong. A clear incident response plan reduces damage and downtime. 

Tip ➡️ Make sure your team knows the steps to
Action Fraud (@actionfrauduk) 's Twitter Profile Photo

🚨If you're a customer of an organisation that has suffered a data breach, check out this guidance from NCSC UK on what steps you can take to protect yourself. Find out more: ncsc.gov.uk/guidance/data-… #CyberProtect

🚨If you're a customer of an organisation that has suffered a data breach, check out this guidance from <a href="/NCSC/">NCSC UK</a> on what steps you can take to protect yourself.

Find out more: ncsc.gov.uk/guidance/data-…

#CyberProtect
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

🕵️Social Engineering: When Hackers Trick People, Not Systems 🕵️ Social Engineering involves manipulating people into giving away confidential information. It might look like a call from "IT" or a message from a colleague asking for a password. Tip ➡️ Always verify unexpected

🕵️Social Engineering: When Hackers Trick People, Not Systems 🕵️

Social Engineering involves manipulating people into giving away confidential information. It might look like a call from "IT" or a message from a colleague asking for a password. 

Tip ➡️  Always verify unexpected
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

💪 Foster a Strong Security Culture: Trust Builds Resilience 💪 It is important to create an environment where employees feel safe to report mistakes or suspicious activity - without fear or blame. A culture rooted in trust and transparency helps teams learn from security

💪 Foster a Strong Security Culture: Trust Builds Resilience 💪

It is important to create an environment where employees feel safe to report mistakes or suspicious activity - without fear or blame. A culture rooted in trust and transparency helps teams learn from security
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

Starting uni in 2026 or in your first year? Get up to £24k in funding – whatever you study. Gain real-world experience with top tech employers & in-demand skills. Our bursary is open to all but women can register for tailored upskilling events here ➡️ ncsc.gov.uk/cyberfirst/bur…

Starting uni in 2026 or in your first year? Get up to £24k in funding – whatever you study. Gain real-world experience with top tech employers &amp; in-demand skills. Our bursary is open to all but women can register for tailored upskilling events here ➡️ ncsc.gov.uk/cyberfirst/bur…
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

🔎Monitor Your Accounts: Spot Suspicious Activity Early 🔎 Cyber attacks often go unnoticed until damage is done. Regular monitoring of accounts can help you spot unusual activity - like unexpected logins or password reset requests - before its too late. Tip ➡️ Enable account

🔎Monitor Your Accounts: Spot Suspicious Activity Early 🔎

Cyber attacks often go unnoticed until damage is done. Regular monitoring of accounts can help you spot unusual activity - like unexpected logins or password reset requests - before its too late. 

Tip ➡️ Enable account
NI Cyber Security Centre (@nicybersc) 's Twitter Profile Photo

Two-Factor Authentication (2FA): Add a Second Lock 🔒 Even strong passwords can be cracked. Two-factor authentication (2FA) adds an extra layer of security - like a code sent to your phone or an authentication app - so even if someone gets your password, they still can't access

Two-Factor Authentication (2FA): Add a Second Lock 🔒

Even strong passwords can be cracked. Two-factor authentication (2FA) adds an extra layer of security - like a code sent to your phone or an authentication app - so even if someone gets your password, they still can't access