TSC’s series of eBooks covers some of the principal risks in information security — those risks that continually challenge information security professionals who tirelessly seek to minimise them across their organisations and home users alike.

Our eBooks offer easy-to-digest information on the risks and practical advice to address them.

The content can be used in its entirety or in part, in standalone initiatives or as part of larger information security awareness programmes.

We hope you will use these free eBooks to further educate and raise awareness within your organisation to help change actions and shape attitudes towards a more information secure environment.

Your guide to Data loss prevention: part 2


Download it now to find out:

  • How to prepare
  • Data classification
  • Your role in preventing data loss
  • Classify
  • Store securely
  • Share, retain and destroy safely
  • Email and encryption
  • See something, say something


Download your guide to Data loss prevention: part 2

Your guide to Data loss prevention: part 1

Download it now to find out:

  • The different types of data
  • Personal data
  • Global data protection legislation
  • How data is lost



Download your guide to Data loss prevention: part 1

Your guide to Malware

Download it now to find out:

  • What is malware?
  • Who is at risk?
  • The dangers of malware
  • Types of malware
  • How devices become infected
  • How you can stay secure
  • What to do if a device becomes infected


Download your guide to Malware

Your guide to The Cloud

Download it now to find out:

  • What the cloud is
  • The popular services and providers
  • The pros and cons of cloud technology
  • The risks associated with the cloud
  • How to use the cloud securely


Download your guide to The Cloud

Your guide to Phishing

Found out more about this number one CISO pain:

  • The types of phishing out there
  • Why criminals use phishing
  • What criminals aim to achieve
  • Signs to look out for
  • How to report a phishing email


Download your guide to Phishing

Your guide to GDPR

Refresh your knowledge on:

  • GDPR principles
  • Personal and special category data
  • Data breaches
  • Individual rights
  • Privacy by design
  • Privacy impact assessments
  • Data Protection Act 2018
Download Your guide to GDPR

Your guide to the Internet of Things

Find out more about this growing area:

  • Defining IoT devices
  • How IoT is used in other sectors
  • The pros and cons of IoT devices
  • The security threats IoT users face
  • How to use IoT devices securely
  • IoT regulation



Download Your guide to the Internet of Things

Your guide to Passwords

Passwords — a vital key to lock your information:

  • How passwords are cracked
  • How to protect your password
  • Password alternatives
  • What to do if your password is compromised
  • Your password checklist


Download Your guide to Passwords

This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy