Select Page

Cyber Security Resources

Growing list of cyber security related material to keep your website and digital assets safe

Cyber security is a growing issue for all businesses who operate online yet there is an enormous gap in education when it comes to how businesses and website owners need to protect their self. It is far too easy for businesses to take a lax approach to cyber security which often results in disastrous consequences from websites going offline for a long period of time as a minimum, to brand reputational damage and even as far as exposing all customers personal details and data.

Planning and preparation is key to minimise the risks for your business and digital assets. This list of resources is designed to be a signposting page to all of the great resources available which covers the important topics related to cyber security that you need to be aware of and check your systems for vulnerabilities before cyber criminals do.

The resources start at the basics and do go quite technical which we make no apologies for. If you don’t personally understand some of the topics in the resources listed, then get in touch and we can talk you through things in more detail and test your systems accordingly for issues.


The Risks

Before we jump into the resources, ask yourself a few questions about your digital assets to put cyber security into context;

  • When a cyber security issue happens, how quickly can you get your website back up and running?
  • How much will this website down-time cost your business in terms of revenue lost through missed sales?
  • What data do you store about customers on your website and how is this protected?
  • What is the schedule for your automated website backup solution?
  • How is your web server configured and is your website at risk by being on a shared platform?
  • Are you running the latest CMS version, the latest PHP version, the latest MySQL version and other technology on your server, or do you not know when the last time this was updated?

Based on experience, we know that most businesses are at risk in one way, shape or form. To put this into perspective, below are a few WordPress statistics for self-hosted WordPress installations taken from the WordPress Statistics data;


WordPress Versions

WordPress Versions

WordPress 4.1 was released to patch a critical security update, yet at the time of writing weeks after this update, over 50% of WordPress websites are still running older versions that are vulnerable to attacks. Bearing in mind that WordPress powers over 23% of websites on the internet, this is a lot of websites that are vulnerable.


PHP Versions

PHP Versions

PHP is the language that WordPress is built on. Just as all technology, there are different versions that are installed on web servers around the world. And just as with all technology, older versions are often vulnerable to attacks when people know how to exploit things. To put this into perspective, websites such as CVE Details lists known exploits for anyone to browse through which is essentially a shopping list for cyber criminals. For example, here are known vulnerabilities related to PHP Version 5.5. Maybe it is worth upgrading to the latest version?


MySQL Versions

MySQL Versions

Following a similar trend above, there are over 135 MySQL 5.5 vulnerabilities. Yet over 60% of WordPress websites are running on web servers that are running on version 5.5. Maybe time for an upgrade?


Other Technology

The above examples have been given for WordPress specifically due to the popularity of the platform. The same issues lie in all technologies which is why cyber security is hugely important to keep up to date with vulnerabilities and protect your website.

We naturally keep up to date with this and as one of our services work to keep your WordPress website safe and secure. Keeping up to date with the latest cyber security news is a big job but is an essential one to mitigate risks to your business which is why we take cyber security seriously.

The examples given above aren’t a hard and fast rule that you must always be running the latest version since your application or systems may not be at risk depending on their functionality. Likewise, there are many sub-versions within the headings above which have patched known vulnerabilities already. Hopefully this gives a bit of context to cyber security risks though and the importance of taking this seriously.


The Basics on Cyber Security

Ok, so let’s start with the basic resources.

Cyber Streetwise

Cyber Streetwise


Resource from central government which covers a wide range of topics including;

  • Secure your devices online: Firewalls; Passwords; Security Software; Software Updates; Wireless Networks; Internet of Things; Common Scams
  • Protect your online privacy: Internet safety for children; Online dating; Passwords; Social networking; Common scams
  • Look after your money online: Banking online securely; Safe shopping online; Common scams
  • Defend your business: IT policies; Office IT; Selling online; Common scams; Managing staff privileges; Understanding the Data Protection Act; Bring Your Own Device (BYOD)


Cyber Security Guidance for Business

GovUK Logo


Resource from central government which covers a wide range of topics including;


10 Steps to Cyber Security

  1. User education and awareness – Read more
  2. Home and mobile working – Read more
  3. Secure configuration – Read more
  4. Removable media controls – Read more
  5. Managing user privileges – Read more
  6. Incident management – Read more
  7. Monitoring – Read more
  8. Malware protection – Read more
  9. Network security – Read more
  10. Information risk management regime – Read more

Summary document Reducing the Cyber Risk in 10 Critical Areas [PDF]


10 steps A Board Level Responsibility

Protection of key information assets is critical

  • How confident are we that our company’s most important information is being properly managed and is safe from cyber threats?
  • Are we clear that the Board are likely to be key targets?
  • Do we have a full and accurate picture of:
    • the impact on our company’s reputation, share price or existence if sensitive internal or customer information held by the company were to be lost or stolen?
    • the impact on the business if our online services were disrupted for a short or sustained period?

Exploring who might compromise our information and why

  • Do we receive regular intelligence from the Chief Information Officer/Head of Security on who may be targeting our company, their methods and their motivations?
  • Do we encourage our technical staff to enter into information-sharing exchanges with other companies in our sector and/or across the economy in order to benchmark, learn from others and help identify emerging threats?

Pro-active management of the cyber risk at Board level is critical

  • The cyber security risk impacts share value, mergers, pricing, reputation, culture, staff, information, process control, brand, technology, and finance. Are we confident that:
    • we have identified our key information assets and thoroughly assessed their vulnerability to attack?
    • responsibility for the cyber risk has been allocated appropriately? Is it on the risk register?
    • we have a written information security policy in place, which is championed by us and supported through regular staff training? Are we confident the entire workforce understands and follows it?


10 Steps The Executive Companion

  1. Do you have the right skills to effectively manage your cyber risk?
  2. What information should you protect?
  3. What players might pose a risk to your information?
  4. What are the risks to your information and how much risk can you accept?
  5. What measures do you need?
  6. Do the security measures work?
  7. What would happen to the business if one of your risks became a reality?
  8. How do you embed risk management within your company?
  9. How can you ensure that you have the best possible understanding of the threat to your business?
  10. Cyber Essentials


Common Cyber Attacks – Reducing the Impact

Resource: Common Cyber Attacks – Reducing the Impact [PDF]

  • Who might by attacking you? Cyber criminals; Industrial competitors; Foreign intelligence services; Hackers; Hacktivists; Employees
  • Untargeted attacks: Phishing; Water holing; Ransomware; Scanning
  • Targeted attacks: Spear-phishing; Deploying a botnet; Subverting the supply chain
  • Understanding vulnerabilities: Flaws; Features; User error;
  • Reducing your exposure: Firewalls and internet gateways; Network perimeter defences; Web proxy; Web filtering; Content checking; Firewall policies; Malware protection; Patch management; Whitelisting and execution control; Secure configuration; Password policy; User access control


UK Cyber Security Strategy


Outlining a lot of the work central government are currently doing to advice businesses around cyber security related matters including;


Information and Data Protection for Cyber Security

Information Commissioners Office

Data protection guidelines for small businesses;

Further guidance for small businesses – Read more

Further guidance for organisations – Read more


ICO Guidance for Technology;


8 Principles of Data Protection;

  • Fair and lawful
  • Purposes
  • Adequacy
  • Accuracy
  • Retention
  • Rights
  • Security
  • International

Read full guidelines to data protection


CREST Resources

CREST is a not for profit organisation that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry. They provide guidelines for industry experts, businesses and more;


Cyber Security Incident

Cyber Security Incident



The above guides from CREST are just a small amount of the resources that are available throughout their website. Take a good look around.


Technical Cyber Security Topics

Now onto some of the more technical aspects related to cyber security and most importantly how to protect against these known and common vulnerabilities.


OWASP Top 10

Resource: OWASP Top 10 2013 (Latest Version) [PDF]

Listing the top most critical web application security risks. The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organisations to develop, purchase and maintain applications that can be trusted.

OWASP Top 10

A1 – Injection

Injection flaws, such as SQL, OS and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorisation


A2 – Broken Authentication and Session Management

Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities


A3 – Cross-Site Scripting (XSS)

XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface websites, or redirect the user to malicious sites


A4 – Insecure Direct Object References

A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorised data.


A5 – Security Misconfiguration

Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server and platform. Secure settings should be defined, implemented, and maintained, as defaults are often insecure. Additionally, software should be kept up to date.


A6 – Sensitive Data Exposure

Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.


A7 – Missing Function Level Access Control

Most web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access functionality without proper authorisation.


A8 – Cross-Site Request Forgery (CSRF)

A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.


A9 – Using Known Vulnerable Components

Components, such as libraries, frameworks, and other software modules, almost always run with full privileges. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications using components with known vulnerabilities may undermine application defences and enable a range of possible attacks and impacts.


A10 – Unvalidated Redirects and Forwards

Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorised pages.



Within the OWASP Top 10 document is information to check how vulnerable your web application is to the specific threat along with how to prevent and protect yourself from known vulnerabilities.

Next steps for developers include;

  • Application security requirements
  • Application security architecture
  • Standard security controls
  • Secure development lifecycle
  • Application security education

Read the full OWASP Dev Guide on GitHub for detailed recommendations


Java Development Secure Coding Guidelines

Following on from the OWASP guidelines, more specific guidelines for Java development can be found at;

There are an awful lot of security topics related to every programming language, a little too much to list every single one here.


Final Resources

A few other resources that haven’t been mentioned above which are an interesting read for those wanting to dig a little deeper in the field of cyber security;



There are an awful lot of resources throughout this document all of which are related to cyber security. Whether this is educational and awareness type content or more technical hands-on content for those implementing the changes, there is something for everyone. The actual hands on work behind all of these resources is an enormous topic and is far too big to cover within this Cyber Security Resource.

If any of the topics raised throughout this document worry you, then get in touch to discuss how our expertise can be used to put your mind at ease. Working with these technologies daily we have a good background and experience working with many systems, processes, training and more related to websites, technologies and security which integrates through everything. Get in touch to discuss your specific needs.