Ngā Aratohu Guidance

Practical information on keeping systems and data safe from attack.

Guide

Protect your organisation against ransomware

Ransomware attacks are becoming increasingly common and sophisticated. This guidance explains how you can stop a ransomware attack in its tracks.

Joint guidance

Cyber security best practices for smart cities

Helping communities improve infrastructure through digital innovation while protecting data and critical systems.

Guide

Cyber security governance

Boards and senior executives play a critical role in creating a cyber resilient organisation through governance.

Guide

How to report a vulnerability

A vulnerability is a weakness in software, hardware, or an online service. Malicious actors can exploit vulnerabilities to damage systems or access sensitive information.

Guide

Industrial control systems

The resources on this page provide guidance on how to protect your industrial control systems from cyber security threats.

Joint guidance

Principles and approaches for secure by design software

This guidance will help software developers embed security into products from the outset.

Joint guidance

Guidelines for secure AI system development

The intent of this guidance is to help organisations build cyber security into AI systems from design to deployment.

Guide

Responding to third-party data breaches

If your organisation has been affected by a third-party data breach, there are several steps to take to ensure your data

Guide

Preparing for and mitigating Denial of service (DoS) incidents

The intent of this guide is to help organisations prepare for and mitigate the impacts of denial-of-service incidents.

Guide

Checklist for high-profile individuals

Our four-step checklist will help you understand how to protect yourself online.

Guide

Cyber security guidance for high-profile individuals

If you have a high-profile job or are well-known, this guidance will help you protect yourself online.

Guide

Bring Your Own Device (BYOD)

This guidance summarises security considerations for a bring-your-own-device (BYOD) policy in your organisation.