Langham Walsh

NCSC guidance on long-term cyber resilience

Talk to an expert

The National Cyber Security Centre (NCSC) states that UK organisations should prepare for an extended period of heightened cyber security threat. It has guidance for organisations on the steps to take to improve security.


The guidance is designed to be applicable to any period of sustained heightened cyber threat, including the one arising from Russia in light of events in and around Ukraine.


The NCSC says that the cyber threat to the UK remains heightened and they expect it to stay that way for some time.


The NCSC guidance aims to help organisations avoid complacency and staff burnout. It advises that increased workloads for cyber security staff over an extended period can harm wellbeing and lead to lower productivity, with a potential rise in unsafe behaviours or errors.


The recommended actions in the guidance include:

  • following the NCSC's actions to take when the cyber threat is heightened guidance;
  • revisiting risk-based decisions taken during the initial phase of heightened threat;
  • empowering cyber staff to make day-to-day decisions about the threat response without requiring additional oversight;
  • ensuring workloads are spread evenly across individuals and teams;
  • ensuring frontline cyber staff can take breaks to recharge; and
  • accelerating planned action to harden networks and boost defence capabilities.
    See: [Maintaining a sustainable strengthened cyber security posture - NCSC.GOV.UK](https://www.ncsc.gov.uk/guidance/maintaining-a-sustainable-strengthened-cyber-security-posture)
May 7, 2026
Data law change relaxes consent rules for charities

The Information Commissioner's Office (ICO) has published final guidance on the new ‘charitable purposes soft opt-in’ provision introduced by the Data (Use and Access) Act 2025.

Read article
May 6, 2026
The NCSC to begin recommending use of passkeys

The National Cyber Security Centre (NCSC) announced at CYBERUK 2026 in Glasgow that it will begin recommending the use of passkeys wherever a service supports them, and two-step verification (2SV) where it does not.

Read article