TSC’s series of eBooks covers some of the principal risks in information security — those risks that continually challenge information security professionals who tirelessly seek to minimise them across their organisations and home users alike.

Our eBooks offer easy-to-digest information on the risks and practical advice to address them. The content can be used in its entirety or in part, in standalone initiatives or as part of larger information security awareness programmes.

We hope you will use these free eBooks to further educate and raise awareness within your organisation to help change actions and shape attitudes towards a more information secure environment. Feel free to encourage your employees to share the contents with their families and friends too.

We are continually adding to the series, so check back regularly to download our latest eBooks.


Your guide to The Cloud

Download it now to find out:

  • What the cloud is
  • The popular services and providers
  • The pros and cons of cloud technology
  • The risks associated with the cloud
  • How to use the cloud securely

 

Download your guide to The Cloud

Your guide to Phishing

Found out more about this number one CISO pain:

  • The types of phishing out there
  • Why criminals use phishing
  • What criminals aim to achieve
  • Signs to look out for
  • How to report a phishing email

 

Download your guide to Phishing

Your guide to GDPR

Refresh your knowledge on:

  • GDPR principles
  • Personal and special category data
  • Data breaches
  • Individual rights
  • Privacy by design
  • Privacy impact assessments
  • Data Protection Act 2018
Download Your guide to GDPR

Your guide to the Internet of Things

Find out more about this growing area:

  • Defining IoT devices
  • How IoT is used in other sectors
  • The pros and cons of IoT devices
  • The security threats IoT users face
  • How to use IoT devices securely
  • IoT regulation

 

 

Download Your guide to the Internet of Things

Your guide to Passwords

Passwords — a vital key to lock your information:

  • How passwords are cracked
  • How to protect your password
  • Password alternatives
  • What to do if your password is compromised
  • Your password checklist

 

Download Your guide to Passwords


This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy