TSC’s series of eBooks covers some of the principal risks in information security — those risks that continually challenge information security professionals who tirelessly seek to minimise them across their organisations and home users alike.
Our eBooks offer easy-to-digest information on the risks and practical advice to address them.
The content can be used in its entirety or in part, in standalone initiatives or as part of larger information security awareness programmes.
We hope you will use these free eBooks to further educate and raise awareness within your organisation to help change actions and shape attitudes towards a more information secure environment.

Your guide to Malware
Download it now to find out:
- What is malware?
- Who is at risk?
- The dangers of malware
- Types of malware
- How devices become infected
- How you can stay secure
- What to do if a device becomes infected
Download your guide to Malware
Your guide to The Cloud
Download it now to find out:
- What the cloud is
- The popular services and providers
- The pros and cons of cloud technology
- The risks associated with the cloud
- How to use the cloud securely
Download your guide to The Cloud


Your guide to Phishing
Found out more about this number one CISO pain:
- The types of phishing out there
- Why criminals use phishing
- What criminals aim to achieve
- Signs to look out for
- How to report a phishing email
Download your guide to Phishing
Your guide to GDPR
Refresh your knowledge on:
- GDPR principles
- Personal and special category data
- Data breaches
- Individual rights
- Privacy by design
- Privacy impact assessments
- Data Protection Act 2018


Your guide to the Internet of Things
Find out more about this growing area:
- Defining IoT devices
- How IoT is used in other sectors
- The pros and cons of IoT devices
- The security threats IoT users face
- How to use IoT devices securely
- IoT regulation
Download Your guide to the Internet of Things
Your guide to Passwords
Passwords — a vital key to lock your information:
- How passwords are cracked
- How to protect your password
- Password alternatives
- What to do if your password is compromised
- Your password checklist
Download Your guide to Passwords
