CINXE.COM
Cyber security | Jisc
<!DOCTYPE html> <!--[if lt IE 7]><html class="no-js lt-ie9 lt-ie8 lt-ie7" lang="en-GB"><![endif]--> <!--[if IE 7]><html class="no-js lt-ie9 lt-ie8 ie7" lang="en-GB"><![endif]--> <!--[if IE 8]><html class="no-js lt-ie9 ie8" lang="en-GB"><![endif]--> <!--[if IE 9]><html class="no-js ie9" lang="en-GB"><![endif]--> <!--[if gt IE 8]><!--><html class="no-js" lang="en-GB"><!--<![endif]--> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("http://web.archive.org/web"); __wm.wombat("https://www.jisc.ac.uk/cyber-security","20220925234507","http://web.archive.org/","web","/_static/", "1664149507"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title>Cyber security | Jisc</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <script type="text/javascript">var jiscp = {"joid":-1,"name":"","sector":"","region":""};</script> <link rel="preconnect" href="//web.archive.org/web/20220925234507/https://cdn-eu.dynamicyield.com/"> <link rel="preconnect" href="//web.archive.org/web/20220925234507/https://st-eu.dynamicyield.com/"> <link rel="preconnect" href="//web.archive.org/web/20220925234507/https://rcom-eu.dynamicyield.com/"> <link rel="dns-prefetch" href="//web.archive.org/web/20220925234507/https://cdn-eu.dynamicyield.com/"> <link rel="dns-prefetch" href="//web.archive.org/web/20220925234507/https://st-eu.dynamicyield.com/"> <link rel="dns-prefetch" href="//web.archive.org/web/20220925234507/https://rcom-eu.dynamicyield.com/"> <script> var cookiestring = new RegExp("jisc_eprivacy" + '[^;]+').exec(document.cookie); var value = unescape(!!cookiestring ? cookiestring.toString().replace(/^[^=]+/, '').replace('=', '') : ''); if(value === "active-consent") { var script1 = document.createElement('script'); var script2 = document.createElement('script'); script1.src = "//web.archive.org/web/20220925234507/https://cdn-eu.dynamicyield.com/api/9877327/api_dynamic.js"; script2.src = "//web.archive.org/web/20220925234507/https://cdn-eu.dynamicyield.com/api/9877327/api_static.js"; document.getElementsByTagName('head')[0].appendChild(script1); document.getElementsByTagName('head')[0].appendChild(script2); } </script><script> var cookiestring = new RegExp("jisc_eprivacy" + '[^;]+').exec(document.cookie); var value = unescape(!!cookiestring ? cookiestring.toString().replace(/^[^=]+/, '').replace('=', '') : ''); if(value === "active-consent") { (function(h,o,t,j,a,r){ h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)}; h._hjSettings={hjid:2326029,hjsv:6}; a=o.getElementsByTagName('head')[0]; r=o.createElement('script');r.async=1; r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv; a.appendChild(r); })(window,document,'http://web.archive.org/web/20220925234507/https://static.hotjar.com/c/hotjar-','.js?sv='); } </script> <link rel="shortcut icon" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/favicon.ico"/> <link rel="canonical" href="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/cyber-security"/> <link rel="shortlink" href="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/node/41461"/> <meta property="og:site_name" content="Jisc"/> <meta property="og:type" content="website"/> <meta property="og:url" content="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/cyber-security"/> <meta property="og:title" content="Cyber security"/> <meta name="twitter:card" content="summary_large_image"/> <meta name="twitter:site" content="@jisc"/> <meta name="twitter:url" content="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/cyber-security"/> <meta name="twitter:title" content="Cyber security"/> <link rel="alternate" type="application/rss+xml" title="Jisc blog feed" href="http://web.archive.org/web/20220925234507/https://feeds.feedburner.com/JISCBlog"/> <link rel="alternate" type="application/rss+xml" title="Jisc news feed" href="http://web.archive.org/web/20220925234507/https://feeds2.feedburner.com/ac/uabG"/> <link rel="alternate" type="application/rss+xml" title="Jisc events feed" href="http://web.archive.org/web/20220925234507/https://feeds2.feedburner.com/ac/toXU"/> <link rel="alternate" type="application/rss+xml" title="Jisc jobs feed" href="http://web.archive.org/web/20220925234507/https://feeds.feedburner.com/JiscJobVacanciesWebFeed"/> <link rel="alternate" type="application/rss+xml" title="Jisc podcasts feed" href="http://web.archive.org/web/20220925234507/https://feeds.feedburner.com/JiscPodcast"/> <link rel="apple-touch-icon" sizes="144x144" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-144x144-precomposed.png"> <link rel="apple-touch-icon" sizes="114x114" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-114x114-precomposed.png"> <link rel="apple-touch-icon" sizes="57x57" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-57x57-precomposed.png"> <link rel="apple-touch-icon" sizes="72x72" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-72x72-precomposed.png"> <link rel="apple-touch-icon" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-precomposed.png"> <link rel="apple-touch-icon" href="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon.png"> <!-- The conditional comments above make IE show compatibility mode button, unless you add this meta tag. It forces the latest IE rendering engine (even in intranet) & Chrome Frame. Note: to avoid edge case issues and please the validator you could replace this tag with a line in .htaccess (h5bp.com/b/378) --> <meta property="fb:pages" content="499379160101212"/> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/> <meta content="width=device-width,initial-scale=1.0" name="viewport"/> <meta content="on" http-equiv="cleartype"/> <!-- Turn off phone number auto-detection in favour of manual control: http://bit.ly/pHJN6R --> <meta name="format-detection" content="telephone=no"/> <meta name="google-site-verification" content="UNqcoVblscrmuOfPyGUTeRMyNRcroUK_U9ghx-PFl0Q"/> <link href="//web.archive.org/web/20220925234507cs_/https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,500,500i" rel="stylesheet"> <link href="http://web.archive.org/web/20220925234507cs_/https://fonts.googleapis.com/css2?family=Roboto+Slab&display=swap" rel="stylesheet"> <link rel="stylesheet" href="http://web.archive.org/web/20220925234507cs_/https://www.jisc.ac.uk/sites/default/files/css/css_rEI_5cK_B9hB4So2yZUtr5weuEV3heuAllCDE6XsIkI.css"/> <link rel="stylesheet" href="http://web.archive.org/web/20220925234507cs_/https://www.jisc.ac.uk/sites/default/files/css/css_oBsiHIoIA5lAPqK9E6jDdaNe3tAN5Nagql7giHq9cno.css"/> <link rel="stylesheet" href="http://web.archive.org/web/20220925234507cs_/https://www.jisc.ac.uk/sites/default/files/css/css_PsIMLeNhMOWYLk90AWTJ5AtR6KQeGbR_YScSoC_7uSM.css" media="print"/> <style>/* New tags for services */ .c-badge { display: inline-block; padding-top: 0.6rem; padding-right: 0.9rem; padding-bottom: 0.6rem; padding-left: 0.9rem; margin-left: 0.25em; font-family: "Roboto", "HelveticaNeue", "Helvetica Neue", Arial, sans-serif; font-size: 1.5rem; font-weight: 400; line-height: 2.1rem; color: #666; background-color: #f7f7f7; border-radius: 0.3rem; } .c-badge.c-badge--alt { background-color: #fff; } /* Full-width feature box */ section.c-feature-box:nth-of-type(2) .o-grid2__col--span-6 {display: none;} @media screen and (min-width: 757px) {section.c-feature-box:nth-of-type(2) .o-grid2__col--span-5 {max-width: 100%;flex: 0 0 100%;} section.c-feature-box:nth-of-type(3) .o-grid2__col--span-6 {display: none;} @media screen and (min-width: 757px) {section.c-feature-box:nth-of-type(3) .o-grid2__col--span-5 {max-width: 100%;flex: 0 0 100%;} /* Speakerbox */ .c-speakerbox { /* [a] */ padding-bottom: 8.1rem; color: #2c3841; background-color: #fff; } .c-speakerbox__title { /* [b] */ margin-top: 8.1rem; margin-bottom: 0; /* Override global scope CSS. */ font-size: 2.7rem; font-weight: 400; line-height: 3.6rem; text-align: center; } @media screen and (min-width: 757px) { .c-speakerbox__title { font-size: 3.6rem; line-height: 4.5rem; } } .c-speakerbox__title strong { font-weight: 500; } .c-speakerbox__copy__small { /* [c] */ font-size: 2.1rem; font-weight: 300; line-height: 2.7rem; } .c-speakerbox__copy__small a:link { color: #069; text-decoration: underline; } .c-speakerbox__copy__small a:visited { color: #609; } .c-speakerbox__copy__small a:focus { color: #069; text-decoration: none; background-color: #fd6; outline: 0.3rem solid #fd6; } .c-speakerbox__copy__small a:hover { color: #ae460e; transition: color 0.2s ease; } .c-speakerbox__copy__small a:focus:hover { color: #069; text-decoration: none; background-color: #fd6; outline: 0.3rem solid #fd6; } .c-speakerbox__copy__small a:active { color: #069; text-decoration: none; background-color: #fd6; outline: 0.3rem solid #fd6; } .c-speakerbox__copy__small strong { font-weight: 400; } .c-speakerbox__copy__small p { margin-top: 1.8rem; font-family: $font-Roboto; font-size: 2.1rem; font-weight: 300; line-height: 2.7rem; text-align: center; } .c-speakerbox__cta { /* [d] */ margin-top: 2.7rem; text-align: center; } </style> <style type="text/css"> .cookie-bar { color: #fff; background-color: #0d224c;} .cookie-bar__confirm2, .cookie-bar__confirm, .cookie-bar__reject { padding: .9rem 1.8rem; color: #0D224E!important; line-height: 1; text-align: center; text-decoration: none!important; background-color: #fff; margin-left: 25px ; margin-left: 2.5rem ; font-size: 18px ; font-size: 1.8rem ; line-height: 22px ; line-height: 2.2rem ; -webkit-border-radius: 3px; -moz-border-radius: 3px; -ms-border-radius: 3px; -o-border-radius: 3px; border-radius: 3px; } .cookie-bar__confirm2:visited, .cookie-bar__confirm:visited, .cookie-bar__reject:visited { color: #0D224E; } @media print { .cookie-bar__reject:visited { color: #0D224E; } } .cookie-bar__confirm2:focus, .cookie-bar__confirm:focus, .cookie-bar__reject:focus { color: #007aaa; background-color: #d9d9d9; outline: 0.3rem solid #fd6; } .cookie-bar__confirm2:hover, .cookie-bar__confirm:hover, .cookie-bar__reject:hover { box-shadow: 0 0.3rem 1.2rem rgba(0, 0, 0, 0.23), 0 0.3rem 1.2rem rgba(0, 0, 0, 0.16); color: #0D224E; background-color: #d9d9d9; transition: all 0.3s cubic-bezier(0.25, 0.8, 0.25, 1); } .cookie-bar__reject:hover { transition: none; } .cookie-bar__reject:active { box-shadow: none; } .cookie-bar__confirm2:focus:hover, .cookie-bar__confirm:focus:hover, .cookie-bar__reject:focus:hover { color: #0D224E; text-decoration: none; background-color:#d9d9d9; outline: 0.3rem solid #fd6; } .cookie-bar__confirm2:active, .cookie-bar__confirm:active, .cookie-bar__reject:active { color: #0D224E; text-decoration: none; background-color: #d9d9d9; outline: 0.3rem solid #fd6; } </style> <script> dataLayer = []; </script> <script src="/web/20220925234507js_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/js/vendor/modernizr.js"></script> <script src="/web/20220925234507js_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/js/vendor/a11y-toggle.min.js"></script> <!-- Google Tag Manager - JS snippet - GTM Jisc theme --> <script>(function(w,d,s,l,i){ var cookiestring = new RegExp("jisc_eprivacy" + '[^;]+').exec(document.cookie); var value = unescape(!!cookiestring ? cookiestring.toString().replace(/^[^=]+/, '').replace('=', '') : ''); if(value === "active-consent") { w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'http://web.archive.org/web/20220925234507/https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); } })(window,document,'script','dataLayer','GTM-PWX6FN');</script> <!-- End Google Tag Manager --> <!--[if lte IE 8]> <script src="/sites/all/themes/jisc_clean/js/vendor/html5shiv.cx.js"></script> <script src="/sites/all/themes/jisc_clean/js/vendor/respond.js"></script> <![endif]--> </head> <body class="jisc not-front no-sidebars node-type-landing-page"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="http://web.archive.org/web/20220925234507if_/https://www.googletagmanager.com/ns.html?id=GTM-PWX6FN" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <div id="cookie-bar-main" class="cookie-bar" style="display: none;"> <div class="inner"> <p class="cookie-bar__notification">We use cookies to give you the best experience and to help improve our website</p> <p> <a class="cookie-bar__link" href="/web/20220925234507/https://www.jisc.ac.uk/website/cookies">Find out more about how we use cookies</a> </p> <p class="cookie-bar__options-title">Choose whether to use cookies:</p> <p class="cookie-bar__options"> <a href="#" class="cookie-bar__reject">No thanks</a> <a href="#" class="cookie-bar__confirm">Yes, I accept</a> </p> </div> </div> <header class="masthead jsSiteMasthead" role="banner" xmlns="http://www.w3.org/1999/html"> <div class="inner"> <a id="skiplinks" class="visuallyhidden focusable in-page" href="#main"> <span>Skip to main content</span> </a> </div> <div class="c-main-site-header jsMainSiteHeader"> <div class="c-main-site-header__primary-signpost c-main-site-header__primary-signpost--has-nav-items "> <div class="c-main-site-header__container"> <div class="c-main-site-header__primary-signpost-inner"> <p class="c-main-site-header__brand"> <a class="c-main-site-header__brand-link" href="/web/20220925234507/https://www.jisc.ac.uk/" title="Go to the Jisc homepage"> <img class="c-main-site-header__brand-img" src="http://web.archive.org/web/20220925234507im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/img/jisc-logo.svg" alt="Jisc"/> </a> </p> <nav class="c-main-site-header__you-are-in" aria-label="Breadcrumb"> <p class="c-main-site-header__you-are-in-title">You are in:</p> <ul class="c-main-site-header__you-are-in-list"> <li><span>Cyber security</span></li> </ul> </nav> <div class="c-main-site-header__utilities"> <p class="c-main-site-header__utilities-title">Utilities:</p> <ul class="c-main-site-header__utilities-list c-main-site-header__utilities-list--menu-triggers"> <li class="c-main-site-header__utilities-item"> <button class="c-main-site-header__trigger c-main-site-header__trigger--enabled jsUtilityTrigger" data-a11y-toggle="a11ytoggle-siteSearchTarget" data-trigger-role="search" aria-label="Search this website"> <div class="c-main-site-header__trigger-search-icon jsFnbMenuIconTrigger" data-icon-role="search"> <span class="c-main-site-header__trigger-search-icon-circle"></span> <span class="c-main-site-header__trigger-search-icon-handle"></span> </div> <span class="c-main-site-header__trigger-copy">Search this website</span> </button> </li> <li class="c-main-site-header__utilities-item"> <button class="c-main-site-header__trigger c-main-site-header__trigger--enabled jsUtilityTrigger" data-a11y-toggle="a11ytoggle-siteMenuTarget" data-trigger-role="navigation" aria-label="Site navigation"> <div class="c-main-site-header__trigger-menu-icon jsFnbMenuIconTrigger" data-icon-role="navigation"> <span class="c-main-site-header__trigger-menu-icon-line"></span> <span class="c-main-site-header__trigger-menu-icon-line"></span> <span class="c-main-site-header__trigger-menu-icon-line"></span> </div> <span class="c-main-site-header__trigger-copy">Site navigation</span> </button> </li> </ul> <ul class="c-main-site-header__utilities-list c-main-site-header__utilities-list--nav-and-site-search"> <li class="c-main-site-header__utilities-item"> <div class="search search--not-front" id="search"> <span class="c-main-site-header__site-search-label-copy">Search the Jisc website</span> <form action="/web/20220925234507/https://www.jisc.ac.uk/search" method="post" id="search-api-page-search-form-search-" accept-charset="UTF-8"> <label class="visuallyhidden" for="search_term"><span class="form-fields__label-text">Search </span></label> <input class="ui-autocomplete-input" placeholder="Search Jisc" id="search_term" autocomplete="off" type="text" name="keys_1" value="" size="30" maxlength="128"/> <input type="hidden" name="id" value="1"/> <a href="#" class="close ico ico-cross">Clear search results</a><input class="ico ico-search-glass" type="submit" id="edit-submit-1" name="op" value="Search"/><input type="hidden" name="form_build_id" value="form-LN2I_ToeyQ5u-7Wjnf34jprkt-3iuzzHO6e05EBx8zI"/> <input type="hidden" name="form_id" value="search_api_page_search_form_search_"/> </form> <div id="search-results" class="search-results-dropdown"> <p class="search-results__intro"></p> </div> </div> </li> </ul> </div> </div> </div> </div> <div class="c-main-site-header__menu jsMenuTarget" id="a11ytoggle-siteSearchTarget" data-is-small-viewport=""> <div class="c-main-site-header__site-search c-main-site-header__site-search--in-menu" role="search"> <div class="search search--not-front" id="search"> <span class="c-main-site-header__site-search-label-copy">Search the Jisc website</span> <form action="/web/20220925234507/https://www.jisc.ac.uk/search" method="post" id="search-api-page-search-form-search-" accept-charset="UTF-8"> <label class="visuallyhidden" for="search_term"><span class="form-fields__label-text">Search </span></label> <input class="ui-autocomplete-input" placeholder="Search Jisc" id="search_term" autocomplete="off" type="text" name="keys_1" value="" size="30" maxlength="128"/> <input type="hidden" name="id" value="1"/> <a href="#" class="close ico ico-cross">Clear search results</a><input class="ico ico-search-glass" type="submit" id="edit-submit-1" name="op" value="Search"/><input type="hidden" name="form_build_id" value="form-LN2I_ToeyQ5u-7Wjnf34jprkt-3iuzzHO6e05EBx8zI"/> <input type="hidden" name="form_id" value="search_api_page_search_form_search_"/> </form> <div id="search-results" class="search-results-dropdown"> <p class="search-results__intro"></p> </div> </div> </div> </div> <div class="c-main-site-header__menu jsMenuTarget" id="a11ytoggle-siteMenuTarget" data-is-small-viewport=""> <nav> <div class="c-main-site-header__main-nav jsMainNavHook"> <p class="c-main-site-header__main-nav-title">Navigation:</p> <div class="c-main-site-header__main-nav-secondary jsMainNavSecondaryHook"> <ul class="c-main-site-header__container"><li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/allow-and-deny-lists" class="c-main-site-header__main-nav-link">Allow and deny lists</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/ddos-mitigation" class="c-main-site-header__main-nav-link">Foundation DDoS mitigation</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/critical-services-protection" class="c-main-site-header__main-nav-link">Critical services protection</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-essentials" class="c-main-site-header__main-nav-link">Cyber Essentials</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-assessment" class="c-main-site-header__main-nav-link">Cyber security assessment</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-financial-x-ray" class="c-main-site-header__main-nav-link">Cyber security financial X-ray</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/csirt" class="c-main-site-header__main-nav-link">CSIRT</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-threat-intelligence" class="c-main-site-header__main-nav-link">Cyber threat intelligence</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/security-operations-centre" class="c-main-site-header__main-nav-link">Security operations centre</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/email-advice" class="c-main-site-header__main-nav-link">Email advice and testing</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/janet-network-resolver" class="c-main-site-header__main-nav-link">Janet Network resolver</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/network-time-service-ntp" class="c-main-site-header__main-nav-link">Network time service (NTP)</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/managed-firewall" class="c-main-site-header__main-nav-link">Managed firewall</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-threat-monitoring" class="c-main-site-header__main-nav-link">Cyber security threat monitoring</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/penetration-testing" class="c-main-site-header__main-nav-link">Penetration testing</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/primary-nameserver" title="" class="c-main-site-header__main-nav-link">Primary nameserver service</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/simulated-phishing-and-associated-training" class="c-main-site-header__main-nav-link">Simulated phishing and associated training</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/web-filtering" class="c-main-site-header__main-nav-link">Web filtering and monitoring framework</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20220925234507/https://www.jisc.ac.uk/vulnerability-assessment-service-and-tools-supply-framework" class="c-main-site-header__main-nav-link">Vulnerability assessment service</a></li> </ul> </div> </div> </nav> </div> </div> </header> <main id="main" class="jsMainContent" role="main"> <div class="inner l-pull-left "> <div class="l-centre-offset row"> </div> </div> <section class="t-landing-page"> <div class="inner"><div id="target-space"></div></div><!--node-landing-page-full.tpl.php --> <div class="inner"> <div class="email-signup"> </div> </div> <!-- field-collection-item-field-slice-item.php --> <section class="c-top-box" style="background-color:#007DBB; background-image: url(/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/geo3-bg-007dbb.png); background-position: left center; background-repeat: no-repeat; background-size:cover;"> <div class="inner inner--sitewide-layout-container"> <div class="c-top-box__inner"> <div class="c-top-box__content-container"> <div class="c-top-box__content"> <h1 class="c-top-box__title" style="color: #fff;">Cyber security</h1> <div class="c-top-box__copy" style="color: #fff;"> <p>Building solid security practice and culture together to empower you with technology and hands-on cyber posture support.</p> </div> </div> </div> <div class="c-top-box__foreground-img-container"> <div class="c-top-box__foreground-img" style="background-color: transparent; background-image: url(/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/cyber-security-landing-hero.jpg); background-position: center; background-repeat: no-repeat; background-size: cover;"> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <p class="twig-promo" style="margin-top: 18px;"><i class="fal fa-check-square"></i> <a href="http://web.archive.org/web/20220925234507/https://repository.jisc.ac.uk/8549/1/cyber-security-16-questions-checklist.pdf">16 questions you need to ask to assess your cyber security posture (pdf)</a></p><!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2 o-grid2--row-reverse@MD"> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__img"> <img src="/web/20220925234507im_/https://www.jisc.ac.uk/cyber-security" alt=""> </div> </div> <div class="o-grid2__col o-grid2__col--span-5"> <h2 class="c-feature-box__title"> </h2> <div class="c-feature-box__copy"> <p>As technology becomes more complex and threats more sophisticated, it’s a challenge to keep your online environment and physical infrastructure secure.</p><p>Acting as a trusted partner and critical friend, we can support you through these challenges with our range of services and in-house expertise.</p><p>Find out more about what's included in your <a href="/web/20220925234507/https://www.jisc.ac.uk/membership">membership package</a>. <a id="ten-steps" name="ten-steps"></a></p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-boombox" style="background-color:#007DBB; background-image: url(/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/geo3-bg-007dbb_0.png); background-size:cover; background-repeat:no-repeat;"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-10 o-grid2__col--push-1"> <h2 class="c-boombox__title"> Ten steps to cyber security </h2> <div class="c-boombox__copy"> <p>The <a href="http://web.archive.org/web/20220925234507/https://www.ncsc.gov.uk/collection/10-steps-to-cyber-security">National Cyber Security Centre’s ten steps to cyber security</a> breaks down the task of defending your networks, systems and information into its essential components. Working in partnership with them, we’ve matched our key services to each step.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/incident-management-illustration-square.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Risk management </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Take a risk-based approach to securing your data and systems.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>A good risk management approach gives you the foundations to respond to threats. Evaluate your current security posture with <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-assessment">cyber security assessment</a>, and test your systems and networks against real-world cyber attack scenarios with <a href="/web/20220925234507/https://www.jisc.ac.uk/penetration-testing">penetration testing</a>. Underpinning the Janet Network, <a href="/web/20220925234507/https://www.jisc.ac.uk/ddos-mitigation">foundation DDoS mitigation</a> and <a href="/web/20220925234507/https://www.jisc.ac.uk/ddos-mitigation#plus">foundation plus</a> reduces disruption to help avoid financial loss or reputational damage.</p><p><strong>Key training</strong>: Test vulnerabilities by <a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/penetration-testing">learning to think like a hacker</a>.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box c-feature-box--alt"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/user-education-and-awareness-illustration-square.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Engagement and training </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Collaboratively build security that works for people in your organisation.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>Your staff can be an effective resource in preventing or detecting incidents. Using the <a href="/web/20220925234507/https://www.jisc.ac.uk/simulated-phishing-and-associated-training">simulated phishing and associated training framework</a> can help users safely experience what an attack might look like so they understand wider risks and know what to do if they suspect an issue.</p><p><a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/e-learning-modules/information-security">Information security e-learning</a> covers phishing, malware and password security, and training around <a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/developing-effective-security-awareness-campaigns">developing effective security awareness campaigns</a> gives you the tools you need to build a strong security culture to support your staff.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/network-security-illustration-square.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Asset management </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Know what data and systems you have and what business need they support.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>It can be hard to maintain an understanding of all the assets within your environment and the risks for each one. Use <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-assessment">cyber security assessment</a> to meet audit and compliance needs, and <a href="/web/20220925234507/https://www.jisc.ac.uk/vulnerability-assessment-service-and-tools-supply-framework">vulnerability assessment service and tools supply framework</a> to choose the right strategy to detect and assess vulnerabilities within your IT estate.</p><p>Make sure you have vital security precautions in place by gaining or renewing your <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-essentials">Cyber Essentials</a> certification.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box c-feature-box--alt"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/secure-configuration-illustration-square.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Architecture and configuration </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Design, build, maintain and manage systems securely.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>Ensuring that good security is at the heart of your projects means you're mitigating the risks your organisation cares about. Choose the right strategy using <a href="/web/20220925234507/https://www.jisc.ac.uk/vulnerability-assessment-service-and-tools-supply-framework">vulnerability assessment service and tools supply framework</a>, securely manage your public DNS records with <a href="/web/20220925234507/https://www.jisc.ac.uk/primary-nameserver">primary nameserver service</a> and ensure your users are protected from email abuse using <a href="/web/20220925234507/https://www.jisc.ac.uk/allow-and-deny-lists">allow and deny lists</a>.</p><p>For peace of mind, <a href="/web/20220925234507/https://www.jisc.ac.uk/critical-services-protection">critical services protection</a> safeguards your business-critical services with out-of-hours coverage, whilst our <a href="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/managed-firewall">managed firewall service</a> reduces your management burden and helps you stay ahead of the current threat.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/malware-prevention-illustration-square.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Vulnerability management </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Keep your systems protected throughout their lifecycle.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>Many security incidents are caused by attackers exploiting publicly disclosed vulnerabilities. Proactively managing threats using a <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-threat-monitoring">threat monitoing service</a> can help protect your systems, spot anomalies early and respond quickly. Add a layer of defence with <a href="/web/20220925234507/https://www.jisc.ac.uk/janet-network-resolver">Janet Network resolver</a> which uses RPZ feeds that update to adapt to emerging threats, while our <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-threat-intelligence">cyber threat intelligence</a> experts analyse threats for the education and research sectors.</p><p><strong>Top tip</strong>: make sure you <a href="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/vulnerability-assessment-service-and-tools-supply-framework">choose a strategy to detect and assess vulnerabilities</a> within your IT estate, and work towards <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-essentials">Cyber Essentials</a> certification for confidence that you're keeping your systems and data protected.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box c-feature-box--alt"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/managing-user-privileges-illustration-square_0_0.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Identity and access management </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Control who and what can access your systems and data.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>You need to understand who needs access to data, systems and services, as well as who needs to be kept out. <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-essentials">Cyber Essentials</a> helps you to make sure vital security precautions are in place and show areas you may need to improve.</p><p>Our world-leading <a href="/web/20220925234507/https://www.jisc.ac.uk/trust-and-identity">trust and identity services</a> can also help you manage access efficiently and effectively.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/data-security-icon-ten-steps_0.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Data security </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Protect data where it is vulnerable.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>You should have confidence that your data is appropriately protected, wherever it is. <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-threat-monitoring">Cyber security threat monitoring</a> works to help you proactively manage threats and protect sensitive data.</p><p>A <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-assessment">cyber security assessment</a> can help flag any vulnerabilities you have to make sure you meet audit and compliance needs.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box c-feature-box--alt"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/monitoring-illustration-square_0_0.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Logging and monitoring </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Design your systems to be able to detect and investigate incidents.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>Understanding <em>how</em> your systems are being used and what impact an incident may have is the foundation of security monitoring.</p><p><a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-threat-monitoring">Cyber security threat monitoring</a> monitors your systems, turning data logs into actionable insight</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/incident-management-icon-ten-steps_0.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Incident management </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Plan your response to cyber incidents in advance.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>Being able to quickly detect and respond to incidents will help you reduce the impact when they happen. Make the most of the <a href="/web/20220925234507/https://www.jisc.ac.uk/csirt">CSIRT</a> team, safeguarding your current and future computer security. By monitoring and resolving security incidents that occur on the Janet Network, we can share intelligence and advice to help keep your own networks safe.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box c-feature-box--alt"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-5"> <div class="c-feature-box__title-icon-and-copy-container"> <div class="c-feature-box__title-and-icon-container"> <div class="c-feature-box__title-icon-container"> <img class="c-feature-box__title-icon" src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/supply-chain-security-ten-steps-icon.png" alt="" role="presentation"/> </div> <div class="c-feature-box__title-container"> <h2 class="c-feature-box__title"> Supply chain security </h2> </div> </div> <div class="c-feature-box__copy-container"> <div class="c-feature-box__copy"> <p>Collaborate with your suppliers and partners.</p> </div> </div> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-6"> <div class="c-feature-box__supporting-copy"> <p>An attack on the suppliers you rely on can be as damaging as one that targets your own organisation. <a href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-assessment">Cyber security assessment</a> helps you to evaluate, analyse and prioritise security issues according to risk.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-boombox" style="background-color:#010000; background-image: url(/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/seccon22_web-banner-boom-box-02.png); background-repeat:no-repeat;"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-10 o-grid2__col--push-1"> <h2 class="c-boombox__title"> Jisc security conference 2022 </h2> <div class="c-boombox__copy"> <p>7-9 November 2022<br>Come together as a community at Jisc security conference 2022 to interact face to face, share stories and meet industry partners.</p> </div> <p class="c-boombox__cta"> <a class="c-button c-button--ghost-dark-bg" href="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/security-conference">Find out more and book your place</a> </p> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-speakerbox" style="background-color: #ffff;"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-10 o-grid2__col--push-1"> <h2 class="c-speakerbox__title">Training to support you</h2> <div class="c-speakerbox__copy__small"> <p>ISO 27001 is a widely recognised standard for information security management systems and is designed to help organisations of all sizes manage information security processes and support your organisation to meet these ten steps. Register for <a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/iso-27001-foundation">ISO 27001 foundation training</a>, <a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/iso-27001-lead-implementer">lead implementer training</a> or join our <a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/iso-27001-clinic">drop-in clinic</a>.</p> <p>Test your infrastructure, policies and procedures with a realistic simulated incident on our tailored <a href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/ransomware-incident-response-workshop">ransomware incident response workshop</a>. </div> </div> </div> </div> </section><!-- field-collection-item-field-slice-item.php --> <section class="c-boombox" style="background-color:#007DBB; background-image: url(/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/geo3-bg-007dbb.png); background-size:cover; background-repeat:no-repeat;"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-10 o-grid2__col--push-1"> <h2 class="c-boombox__title" style="color: #fff;"> Monitor your network activity </h2> <div class="c-boombox__copy" style="color: #fff;"> <p>Gain insight into your network security threats, view DDoS mitigation data and have seamless access to security services.</p> </div> <p class="c-boombox__cta"> <a class="c-button c-button--ghost-dark-bg" href="http://web.archive.org/web/20220925234507/https://cybersecurity.jisc.ac.uk/">Visit the cyber security portal</a> </p> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2 o-grid2--row-reverse@MD"> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-4"> <div class="c-feature-box__img"> <img src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/security-conference-2021-photo-feature-1.png" alt=""> </div> </div> <div class="o-grid2__col o-grid2__col--span-7"> <h2 class="c-feature-box__title"> Join the cyber security community group </h2> <div class="c-feature-box__copy"> <p>A trusted community that helps Jisc members increase their security posture.</p><p><a href="/web/20220925234507/https://www.jisc.ac.uk/get-involved/cyber-security-community-group">Join discussion groups and share experiences about cyber security challenges and best practice</a>.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box c-feature-box--alt"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-4"> <div class="c-feature-box__img"> <img src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/colleagues-in-discussion-tech-team-feature-box.jpg" alt=""> </div> </div> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-7"> <h2 class="c-feature-box__title"> Need cloud security solutions and advice? </h2> <div class="c-feature-box__copy"> <p>Your cloud cyber team offers security-focused reviews to determine if platforms have been deployed in-line with platform vendor best practice and benchmarking.</p><p>As your trusted partner, contact us at <a href="http://web.archive.org/web/20220925234507/mailto:cloud@jisc.ac.uk">cloud@jisc.ac.uk</a> as you may already have solutions to strengthening your cloud security posture at your disposal.</p> </div> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-feature-box"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2 o-grid2--row-reverse@MD"> <div class="o-grid2__col o-grid2__col--push-1 o-grid2__col--span-4"> <div class="c-feature-box__img"> <img src="/web/20220925234507im_/https://www.jisc.ac.uk/sites/default/files/crown-commercial-service-logo-150-colour.png" alt=""> </div> </div> <div class="o-grid2__col o-grid2__col--span-7"> <h2 class="c-feature-box__title"> An easy route to procurement </h2> <div class="c-feature-box__copy"> <p>We are an approved supplier on the <a href="http://web.archive.org/web/20220925234507/https://www.crowncommercial.gov.uk/agreements/RM3764.3">Crown Commercial Service</a> dynamic purchasing system (DPS). This provides a simple and trusted way for public sector buyers and our members to procure Jisc cyber security services.</p> </div> <p class="c-feature-box__cta"> <a class="c-button c-button--primary" href="http://web.archive.org/web/20220925234507/http://www.crowncommercial.gov.uk/products-and-services/technology/cyber-security">Find out more on the Crown Commercial Service website</a> </p> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-signpost-group"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-12"> <div class="c-signpost-group__copy"> <h2 class="c-signpost-group__title">Useful links</h2> </div> </div> </div> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-6"> <ul class="c-signpost-group__list"> <li class="c-signpost-group__list-item"> <a class="c-signpost-group__list-link" href="http://web.archive.org/web/20220925234507/mailto:help@jisc.ac.uk"> help@jisc.ac.uk </a> <span class="c-signpost-group__list-icon-container"> <i class="c-signpost-group__list-icon far fa-envelope" aria-hidden="true"></i> </span> </li> <li class="c-signpost-group__list-item"> <a class="c-signpost-group__list-link" href="tel:03003002212"> 0300 300 2212 </a> <span class="c-signpost-group__list-icon-container"> <i class="c-signpost-group__list-icon fas fa-phone" aria-hidden="true"></i> </span> </li> </ul> </div> <div class="o-grid2__col o-grid2__col--span-6"> <ul class="c-signpost-group__list"> <li class="c-signpost-group__list-item"> <a class="c-signpost-group__list-link" href="http://web.archive.org/web/20220925234507/https://cybersecurity.jiscinvolve.org/wp/"> Cyber security blog </a> <span class="c-signpost-group__list-icon-container"> <i class="c-signpost-group__list-icon far fa-comments" aria-hidden="true"></i> </span> </li> <li class="c-signpost-group__list-item"> <a class="c-signpost-group__list-link" href="http://web.archive.org/web/20220925234507/https://youtu.be/DpjoZGOONiQ"> Watch our documentary </a> <span class="c-signpost-group__list-icon-container"> <i class="c-signpost-group__list-icon fab fa-youtube" aria-hidden="true"></i> </span> </li> </ul> </div> </div> </div> </section> <!-- field-collection-item-field-slice-item.php --> <section class="c-explore-group"> <div class="inner inner--sitewide-layout-container"> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-12"> <div class="c-explore-group__copy"> <h2 class="c-explore-group__title">Explore cyber security</h2> </div> </div> </div> <div class="o-grid2"> <div class="o-grid2__col o-grid2__col--span-3"> <p class="c-explore-group__marker"> <span class="marker marker--explore-group marker--services"> Services </span> </p> <ul class="c-explore-group__list--has-marker"> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/allow-and-deny-lists"> Allow and deny lists </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/critical-services-protection"> Critical services protection </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/cyber-essentials"> Cyber Essentials </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-assessment"> Cyber security assessment </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-financial-x-ray"> Cyber security financial X-ray </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/cyber-threat-intelligence"> Cyber threat intelligence </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security-threat-monitoring"> Cyber security threat monitoring </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/ddos-mitigation"> Foundation DDoS mitigation </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/email-advice"> Email advice and testing </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/csirt"> Janet Network CSIRT </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/janet-network-resolver"> Janet Network resolver </a> </li> </ul> </div> <div class="o-grid2__col o-grid2__col--span-3"> <ul class="c-explore-group__list"> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/network-time-service-ntp"> Network time service (NTP) </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/managed-firewall"> Managed firewall </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/penetration-testing"> Penetration testing </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/primary-nameserver"> Primary nameserver service </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/security-operations-centre"> Security operations centre </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/simulated-phishing-and-associated-training"> Simulated phishing and associated training framework </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/vulnerability-assessment-service-and-tools-supply-framework"> Vulnerability assessment service and tools supply framework </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/web-filtering"> Web filtering and monitoring framework </a> </li> </ul> </div> <div class="o-grid2__col o-grid2__col--span-3"> <p class="c-explore-group__marker"> <span class="marker marker--explore-group marker--training"> Training </span> </p> <ul class="c-explore-group__list--has-marker"> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/computers-privacy-and-the-law"> Computers, privacy and the law </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/cyber-essentials-drop-in-clinic"> Cyber Essentials drop-in clinic </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training/penetration-testing"> Penetration testing - think like a hacker </a> </li> </ul> </div> <div class="o-grid2__col o-grid2__col--span-3"> <p class="c-explore-group__marker"> <span class="marker marker--explore-group marker--guides"> Guides </span> </p> <ul class="c-explore-group__list--has-marker"> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="http://web.archive.org/web/20220925234507/https://www.jisc.ac.uk/guides/maintaining-access-to-internal-services-during-a-continuity-event"> Maintaining access to internal services during a continuity event </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/guides/data-protection"> Data protection </a> </li> <li class="c-explore-group__list-item"> <a class="c-explore-group__list-link" href="/web/20220925234507/https://www.jisc.ac.uk/guides/preparing-for-the-general-data-protection-regulation-gdpr"> Preparing for GDPR </a> </li> </ul> </div> </div> </div> </section> <div class="inner"> </div> <div class="padding-top"> <div class="inner l-gutter--top "> <div class=""> <h3 class="field field-type-text section__title">News and updates</h3><section class="region region--2-up clearfix "><!-- field-collection-item-field-drivers.php --> <div class="block block-1"> <article class="teaser t-news-and-blog "> <div class="marker"> News </div> <!-- Views template :view-driver-content view-id-driver_content view-display-id-default view-dom-id-c118792dda3f4b252bf4c286a65206bc --> <div class="view-header"> </div> <div class="view-filters"> </div> <div class="attachment attachment-before"> </div> <ul class="teaser_linklist"> <li class="teaser__linklist__item"> <a href="/web/20220925234507/https://www.jisc.ac.uk/news/registration-opens-for-novembers-jisc-cyber-security-conference-09-jun-2022"><span class="ico ico-arrow-right"></span>Registration opens for November’s Jisc cyber security conference </a> </li> <li class="teaser__linklist__item"> <a href="/web/20220925234507/https://www.jisc.ac.uk/news/survey-helps-jisc-target-effort-to-support-members-in-building-robust-cyber-security-strategies-07-jun-2022"><span class="ico ico-arrow-right"></span>Survey helps Jisc target effort to support members in building robust cyber security strategies </a> </li> <li class="teaser__linklist__item"> <a href="/web/20220925234507/https://www.jisc.ac.uk/news/jisc-announces-operating-partner-for-new-managed-firewall-service-across-uk-29-03-2022"><span class="ico ico-arrow-right"></span>Jisc announces operating partner for new managed firewall service across UK research and education providers </a> </li> </ul> <div class="attachment attachment-after"> </div> <div class="view-footer"> </div> <div class="feed-icon"> </div> </article> </div> <!-- field-collection-item-field-drivers.php --> <div class="block block-2"> <article class="teaser t-news-and-blog "> <div class="marker"> Blog </div> <!-- Views template :view-driver-content view-id-driver_content view-display-id-default view-dom-id-336606cdad8e1ee53b732696b67717e1 --> <div class="view-header"> </div> <div class="view-filters"> </div> <div class="attachment attachment-before"> </div> <ul class="teaser_linklist"> <li class="teaser__linklist__item"> <a href="/web/20220925234507/https://www.jisc.ac.uk/blog/lack-of-investment-in-cyber-security-is-a-false-economy-24-aug-2022"><span class="ico ico-arrow-right"></span>‘Lack of investment in cyber security is a false economy’ </a> </li> <li class="teaser__linklist__item"> <a href="/web/20220925234507/https://www.jisc.ac.uk/blog/achieving-cyber-essentials-options-for-colleges-and-universities-12-jul-2022"><span class="ico ico-arrow-right"></span>Achieving Cyber Essentials: options for colleges and universities </a> </li> <li class="teaser__linklist__item"> <a href="/web/20220925234507/https://www.jisc.ac.uk/blog/why-jisc-members-shouldnt-pay-ransomware-demands-08-jul-2022"><span class="ico ico-arrow-right"></span>Why Jisc members shouldn’t pay ransomware demands </a> </li> </ul> <div class="attachment attachment-after"> </div> <div class="view-footer"> </div> <div class="feed-icon"> </div> </article> </div> </section> </div> </div> </div> </section> </main><!--/page--> <footer role="contentinfo"> <div class="inner l-pull-left light l-gutter--top"> <div class="l-centre-offset row"> </div> <!--/ /-centre-offset.row --> <div class="l-centre-offset row"> </div> <!--/ /-centre-offset.row --> </div> <div class="inner l-pull-left medium"> <div class="l-centre-offset"> <div class="region region--4-up"> </div> </div> <!--/ .l-centre-offset.region --> </div> <!-- main site footer --> <div class="c-main-site-footer"> <!--Adding the breadcrumb Footer --> <div class="c-main-site-footer__breadcrumb"> <div class="inner inner--main-site-footer"> <div class="c-main-site-footer-grid"> <div class="c-main-site-footer-grid__item u-6/12@medium u-9/12@large"> <nav class="c-main-site-footer__you-are-here" aria-label="Breadcrumb"> <p class="c-main-site-footer__you-are-here-title">You are in:</p> <div class="c-main-site-footer__you-are-here-item-home"> <a class="c-main-site-footer__you-are-here-link" href="/web/20220925234507/https://www.jisc.ac.uk/" aria-label="Jisc homepage"><i class="fas fa-home" aria-hidden="true"></i></a> </div> <ul> <li><span>Cyber security</span></li> </ul> </nav> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <!--Printing the feedback html that has been set up in the block content.--> <!-- <div class="c-main-site-footer__feedback"><p class="c-main-site-footer__feedback-copy"><a class="c-main-site-footer__feedback-link" href="https://jisc.researchfeedback.net/wh/s.asp?k=150461655147&s=https://www.jisc.ac.uk/cyber-security"><span class="c-main-site-footer__feedback-link-icons"> <i aria-hidden="true" class="far fa-frown"></i> <i aria-hidden="true" class="far fa-meh"></i> <i aria-hidden="true" class="far fa-smile"></i> </span> <span class="c-main-site-footer__feedback-link-copy">Give feedback</span> </a></p></div> --> </div> </div> </div> </div> <!--Adding the linklist Footer --> <div class="c-main-site-footer__linklist"> <div class="inner inner--main-site-footer"> <div class="c-main-site-footer-grid"> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Areas</h2> <ul class="c-main-site-footer__linklist-group"><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/connectivity">Connectivity</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/cyber-security">Cyber security</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/cloud">Cloud</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/data-and-analytics">Data analytics</a></li></ul><ul><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/libraries-and-research">Libraries, learning resources and research</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/student-experience">Student experience</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/trust-and-identity">Trust and identity</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/advice">Advice and guidance</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Explore</h2> <ul class="c-main-site-footer__linklist-group"><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/guides">Guides</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/training">Training</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/consultancy">Consultancy</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="http://web.archive.org/web/20220925234507/https://beta.jisc.ac.uk/events">Events</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/rd">R&D</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Useful</h2> <ul class="c-main-site-footer__linklist-group"><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/about">About</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/membership">Membership</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/get-involved">Get involved</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/news">News</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/jobs">Jobs</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Get in touch</h2> <ul class="c-main-site-footer__linklist-group"> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/contact"> Contact us </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/headlines"> Sign up to our newsletter </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20220925234507/https://twitter.com/jisc"> <i class="fab fa-twitter" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">Twitter</span> </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20220925234507/https://www.facebook.com/jiscsocial"> <i class="fab fa-facebook" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">Facebook</span> </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20220925234507/https://www.linkedin.com/company/jisc"> <i class="fab fa-linkedin" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">LinkedIn</span> </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20220925234507/http://www.youtube.com/user/JISCmedia"> <i class="fab fa-youtube" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">YouTube</span> </a> </li> </ul></div> </div> </div> </div> <!--Adding the Utilities and Additional Footer --> <div class="c-main-site-footer__utilities"> <div class="inner inner--main-site-footer"> <div class="c-main-site-footer-grid"> <div class="c-main-site-footer-grid__item u-6/12@medium u-9/12@large"> <ul class="c-main-site-footer__utilities-list"><li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer_utilities-list-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/website/cookies">Cookies</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer_utilities-list-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/website/privacy-notice">Privacy</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer_utilities-list-item-link" href="/web/20220925234507/https://www.jisc.ac.uk/about/corporate/slavery-and-human-trafficking-statement">Modern slavery</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer__utilities-additional-link" href="/web/20220925234507/https://www.jisc.ac.uk/about/corporate/carbon-reduction-plan">Carbon reduction plan</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer__utilities-additional-link" href="/web/20220925234507/https://www.jisc.ac.uk/website/accessibility-statement">Accessibility</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> </div> </div> </div> </div> </div> <script src="//web.archive.org/web/20220925234507js_/https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js"></script> <script>window.jQuery || document.write("<script src='/sites/all/modules/contrib/jquery_update/replace/jquery/1.8/jquery.min.js'>\x3C/script>")</script> <script src="http://web.archive.org/web/20220925234507js_/https://www.jisc.ac.uk/sites/default/files/js/js_38VWQ3jjQx0wRFj7gkntZr077GgJoGn5nv3v05IeLLo.js"></script> <script src="//web.archive.org/web/20220925234507js_/https://ajax.googleapis.com/ajax/libs/jqueryui/1.10.2/jquery-ui.min.js"></script> <script>window.jQuery.ui || document.write("<script src='/sites/all/modules/contrib/jquery_update/replace/ui/ui/minified/jquery-ui.min.js'>\x3C/script>")</script> <script src="http://web.archive.org/web/20220925234507js_/https://www.jisc.ac.uk/sites/default/files/js/js_yxpcsmG10aGVUSD90BA4qltlgKI1rbhnUmWB7jdXazY.js"></script> <script src="http://web.archive.org/web/20220925234507js_/https://www.jisc.ac.uk/sites/default/files/js/js_ln3elyxIXiDHhui9wGpVhQknbd0x6dFFLEcw-d2kY7c.js"></script> <script src="http://web.archive.org/web/20220925234507js_/https://www.google.com/recaptcha/api.js"></script> <script src="http://web.archive.org/web/20220925234507js_/https://www.jisc.ac.uk/sites/default/files/js/js_MRJGmiHDN-YmxpVwJXrmhddeFsDyTTAop4jAFfeWcSc.js"></script> <script src="http://web.archive.org/web/20220925234507js_/https://www.jisc.ac.uk/sites/default/files/js/js_gGSozz5nhS9RR6GeFycLd0mjTBR0-860cSp4ccsVjF8.js"></script> <script>jQuery.extend(Drupal.settings, {"basePath":"\/","pathPrefix":"","ajaxPageState":{"theme":"jisc_clean","theme_token":"qZBO4EBwRtpgStr1J2MFGFUS8lC1S2MaOedeNus5cS4","js":{"\/\/web.archive.org\/web\/20220925234507\/https:\/\/ajax.googleapis.com\/ajax\/libs\/jquery\/1.8.3\/jquery.min.js":1,"0":1,"misc\/jquery-extend-3.4.0.js":1,"misc\/jquery-html-prefilter-3.5.0-backport.js":1,"misc\/jquery.once.js":1,"misc\/drupal.js":1,"\/\/web.archive.org\/web\/20220925234507\/https:\/\/ajax.googleapis.com\/ajax\/libs\/jqueryui\/1.10.2\/jquery-ui.min.js":1,"1":1,"sites\/all\/modules\/custom\/jisc_search_section\/js\/jiscSectionSearch.js":1,"sites\/all\/modules\/custom\/jisc_ia_nav\/js\/JiscIaNav.js":1,"http:\/\/web.archive.org\/web\/20220925234507\/https:\/\/www.google.com\/recaptcha\/api.js":1,"sites\/all\/themes\/mothership\/mothership\/js\/contextual.js":1,"sites\/all\/themes\/jisc_clean\/js\/jisc-lib.min.js":1,"sites\/all\/themes\/jisc_clean\/js\/extras.js":1,"sites\/all\/themes\/jisc_clean\/js\/integration\/timeline.js":1,"sites\/all\/themes\/jisc_clean\/js\/jisc-p13n.js":1},"css":{"modules\/system\/system.base.css":1,"modules\/system\/system.messages.css":1,"sites\/all\/themes\/jisc_clean\/css\/content.css":1,"sites\/all\/themes\/jisc_clean\/css\/print.css":1,"0":1}},"jiscFlashPath":"\/sites\/all\/themes\/jisc_clean\/flash\/","searchAutocompletePath":"\/server\/search-results","facetapi":{"view_args":{"rss_snippets:block_1":["41461","41461","41461"],"driver_content:default":["news_story","368","news_story","368"],"driver_content:default-1":["blog_post","368"]},"exposed_input":{"rss_snippets:block_1":[],"driver_content:default":[],"driver_content:default-1":[]},"view_path":{"rss_snippets:block_1":null,"driver_content:default":"node\/41461","driver_content:default-1":"node\/41461"},"view_dom_id":{"rss_snippets:block_1":"1c690db6bcd3c7071754a810906938c0","driver_content:default":"c118792dda3f4b252bf4c286a65206bc","driver_content:default-1":"336606cdad8e1ee53b732696b67717e1"}},"urlIsAjaxTrusted":{"\/search":true}});</script> </body> </html> <!-- FILE ARCHIVED ON 23:45:07 Sep 25, 2022 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 05:21:46 Dec 03, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.541 exclusion.robots: 0.026 exclusion.robots.policy: 0.016 esindex: 0.009 cdx.remote: 7.693 LoadShardBlock: 224.793 (6) PetaboxLoader3.datanode: 166.784 (7) PetaboxLoader3.resolve: 123.135 (2) load_resource: 132.533 -->