To address the increasing and rapidly evolving cyber threats, creating a safe, trusted, and collaborative national cyberspace has become one of the top national priorities in the Kingdom. In alignment with this priority, we provide expert and independent cyber security guidance for all entities operating in the Kingdom. All our guidance is advisory in nature and is underpinned by our unique insights into cyber threats.
Organizations perform Penetration Testing (PT) to gain an assessment of the current status of IT infrastructure, networks, and business applications in order to identify attack vectors, vulnerabilities, and control weaknesses.This document provides general guideline for organizations to help them understand the types of penetration testing, how to select a suitable supplier and provide a set of general guidelines for each stage of the penetration testing.
The use of personal mobile devices became an essential part our daily activities. These device usually process and store a lot of personal information to help us carry out tasks and stay connected. It is important for users to understand the capabilities of the devices they use, and know how to use it in the most secure way. This guide provides a number of security tips on the feature that needs to be enabled, or used throughout the device’s lifecycle.
Many organizations realize the importance of social media as a marketing tool and a way to directly communicate with their existing and potential customers. As more individuals integrate social media into their daily life and as the technology evolve, more social media features get introduced to enable sharing in new ways. This evolution in communication brings with it a new set of threats and increase the risk of old threats. This guideline provides a number of recommendations on how to manage the organization's social presence.