SlideShare a Scribd company logo
1 of 7
Download to read offline
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 1 of 7 copyright © March 2020 Guidance use Only Version 1.2
26 Free Data/Cyber Protection Technologies, for
Remote Working
That Will Make You Feel Shocked!
Contents
1. Cyber Security Advice and Guidance......................................................................................... 3
2. Data protection Advice and Guidance........................................................................................ 3
3. Virus Checkers ............................................................................................................................ 3
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 2 of 7 copyright © March 2020 Guidance use Only Version 1.2
4. DNS ............................................................................................................................................. 4
5. Content Filtering......................................................................................................................... 4
6. 2FA Multi factor Authentication................................................................................................. 4
7. Password management.............................................................................................................. 4
8. Anti Ransomware ....................................................................................................................... 4
9. Vulnerability Testing................................................................................................................... 4
10. Website Malware Scanner.......................................................................................................... 4
11. VPN ............................................................................................................................................. 5
12. Secure Email ............................................................................................................................... 5
13. Secure Sending of Attachments ................................................................................................. 5
14. Cyber Security Training............................................................................................................... 5
15. Find out if a password hack has exposed your password online ............................................... 5
16. Check if you have an email account that has been compromised in a data breach ................. 5
17. Secure messaging ....................................................................................................................... 5
Data Protection Guidance Only ......................................................................................................... 5
18. Cookie Detector.......................................................................................................................... 5
19. Where is site Hosted................................................................................................................... 5
20. Privacy Notice Checker............................................................................................................... 5
21. Data Protection Impact Assessment .......................................................................................... 6
22. Encryption software ................................................................................................................... 6
23. Inventory Management.............................................................................................................. 6
Remote Conferencing......................................................................................................................... 6
24. Remote Conferencing................................................................................................................. 6
Telecommunications .......................................................................................................................... 6
25. Mobile App Management........................................................................................................... 6
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 3 of 7 copyright © March 2020 Guidance use Only Version 1.2
26. Flexible Phone Mobile and Landline Numbers in the UK .......................................................... 6
.
1. Cyber Security Advice and Guidance
https://www.ncsc.gov.uk/
2. Data protection Advice and Guidance
https://ico.org.uk/
3. Virus Checkers
Windows 10
Windows Defender Antivirus
https://www.microsoft.com/en-gb/windows/comprehensive-security
https://www.bitdefender.com/solutions/free.html
Android
Avast
https://www.avast.com/en-gb/free-mobile-security
https://www.bitdefender.com/solutions/free.html
Mac
Avast
https://www.avast.com/en-us/free-mac-security
Bitdefender
https://www.bitdefender.com/solutions/free.html
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 4 of 7 copyright © March 2020 Guidance use Only Version 1.2
4. DNS
https://www.quad9.net/
“Quad9, attackers and malware cannot leverage the known malicious domains to control your systems”
Mac Windows
https://www.quad9.net/tag/android/
Android
5. Content Filtering
https://cleanbrowsing.org/filters#security
6. 2FA Multi factor Authentication
Google Authenticator
Playstore and Apple
7. Password management
LastPass
https://www.lastpass.com/
8. Anti Ransomware
https://www.avast.com/c-ransomware-protection-tool
9. Vulnerability Testing
https://www.ssllabs.com/ssltest/
10. Website Malware Scanner
https://www.siteguarding.com/
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 5 of 7 copyright © March 2020 Guidance use Only Version 1.2
11. VPN
https://account.protonvpn.com/signup
12. Secure Email
https://protonmail.com/
13. Secure Sending of Attachments
https://www.virtru.com/
14. Cyber Security Training
https://wizer-training.com/
15. Find out if a password hack has exposed your password online
https://breachalarm.com/
16. Check if you have an email account that has been compromised in a data
breach
https://haveibeenpwned.com/
17. Secure messaging
https://signal.org/
Data Protection Guidance Only
18. Cookie Detector
https://www.cookie-checker.com/
19. Where is site Hosted
https://lookup.icann.org/
20. Privacy Notice Checker
https://privacypolicycheck.ai/
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 6 of 7 copyright © March 2020 Guidance use Only Version 1.2
21. Data Protection Impact Assessment
https://www.cnil.fr/en/open-source-pia-software-helps-carry-out-data-protection-impact-assesment
22. Encryption software
https://www.veracrypt.fr/en/Home.html
23. Inventory Management
https://www.spiceworks.com/free-pc-network-inventory-software/
Remote Conferencing
24.Remote Conferencing
www.roundee.io Great for Web Calls free for 14 participants
www.zoom,us free for 45 Minutes
https://cubedmobile.com/ Mobile Device Management reimagined providing a self-contained smartphone
workspace encapsulated in an app, FreeFor small team of up to 5 users unlimited software.
Telecommunications
25.Mobile App Management
These Links I have collected from talking to clients and peers and they can be good low cost starting point for start-
ups and SME’s etc, There are more , these seem to be the most popular
26. Flexible Phone Mobile and Landline Numbers in the UK
https://www.flextel.com/
Free Cyber Security and Data Protection for Working remotely for Free or Low Cost
All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free
Page 7 of 7 copyright © March 2020 Guidance use Only Version 1.2

More Related Content

Similar to Free or low cost data cyber and data protection technologies for home remote workers that will make you feel shocked

Nokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_enNokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_en
OumAarya
 
Deployment guide
Deployment guideDeployment guide
Deployment guide
donzerci
 
Linux Vs Windows Tco Comparison
Linux Vs Windows Tco ComparisonLinux Vs Windows Tco Comparison
Linux Vs Windows Tco Comparison
askme
 
Smart Windows Markets, Exec Summary
Smart Windows Markets, Exec SummarySmart Windows Markets, Exec Summary
Smart Windows Markets, Exec Summary
n-tech Research
 
Smart Windows Markets 2012
Smart Windows Markets 2012Smart Windows Markets 2012
Smart Windows Markets 2012
n-tech Research
 
Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430
Banking at Ho Chi Minh city
 
Mobile Discovery User Guide v9
Mobile Discovery User Guide v9Mobile Discovery User Guide v9
Mobile Discovery User Guide v9
David Miller
 

Similar to Free or low cost data cyber and data protection technologies for home remote workers that will make you feel shocked (20)

Nokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_enNokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_en
 
Securing your mobile business with ibm worklight
Securing your mobile business with ibm worklightSecuring your mobile business with ibm worklight
Securing your mobile business with ibm worklight
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
Amdin iws7 817-2179-10
Amdin iws7 817-2179-10Amdin iws7 817-2179-10
Amdin iws7 817-2179-10
 
Bitdefender 2015 av_user_guide antivirus
Bitdefender 2015 av_user_guide antivirusBitdefender 2015 av_user_guide antivirus
Bitdefender 2015 av_user_guide antivirus
 
Perfect PDF 12 User Guide
Perfect PDF 12 User GuidePerfect PDF 12 User Guide
Perfect PDF 12 User Guide
 
Ibm mobile first in action for mgovernment and citizen mobile services red
Ibm mobile first in action for mgovernment and citizen mobile services redIbm mobile first in action for mgovernment and citizen mobile services red
Ibm mobile first in action for mgovernment and citizen mobile services red
 
Hfm install
Hfm installHfm install
Hfm install
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paper
 
Business objects51en
Business objects51enBusiness objects51en
Business objects51en
 
Deployment guide
Deployment guideDeployment guide
Deployment guide
 
Linux Vs Windows Tco Comparison
Linux Vs Windows Tco ComparisonLinux Vs Windows Tco Comparison
Linux Vs Windows Tco Comparison
 
Smart Windows Markets, Exec Summary
Smart Windows Markets, Exec SummarySmart Windows Markets, Exec Summary
Smart Windows Markets, Exec Summary
 
Smart Windows Markets 2012
Smart Windows Markets 2012Smart Windows Markets 2012
Smart Windows Markets 2012
 
Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430Ibm tivoli security solutions for microsoft software environments redp4430
Ibm tivoli security solutions for microsoft software environments redp4430
 
VeraCode State of software security report volume5 2013
VeraCode State of software security report volume5 2013VeraCode State of software security report volume5 2013
VeraCode State of software security report volume5 2013
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
Insight360 it adminguide
Insight360 it adminguideInsight360 it adminguide
Insight360 it adminguide
 
Mobile Discovery User Guide v9
Mobile Discovery User Guide v9Mobile Discovery User Guide v9
Mobile Discovery User Guide v9
 
Storage Area Networks and Wireless Applications
Storage Area Networks and Wireless ApplicationsStorage Area Networks and Wireless Applications
Storage Area Networks and Wireless Applications
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Free or low cost data cyber and data protection technologies for home remote workers that will make you feel shocked

  • 1. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 1 of 7 copyright © March 2020 Guidance use Only Version 1.2 26 Free Data/Cyber Protection Technologies, for Remote Working That Will Make You Feel Shocked! Contents 1. Cyber Security Advice and Guidance......................................................................................... 3 2. Data protection Advice and Guidance........................................................................................ 3 3. Virus Checkers ............................................................................................................................ 3
  • 2. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 2 of 7 copyright © March 2020 Guidance use Only Version 1.2 4. DNS ............................................................................................................................................. 4 5. Content Filtering......................................................................................................................... 4 6. 2FA Multi factor Authentication................................................................................................. 4 7. Password management.............................................................................................................. 4 8. Anti Ransomware ....................................................................................................................... 4 9. Vulnerability Testing................................................................................................................... 4 10. Website Malware Scanner.......................................................................................................... 4 11. VPN ............................................................................................................................................. 5 12. Secure Email ............................................................................................................................... 5 13. Secure Sending of Attachments ................................................................................................. 5 14. Cyber Security Training............................................................................................................... 5 15. Find out if a password hack has exposed your password online ............................................... 5 16. Check if you have an email account that has been compromised in a data breach ................. 5 17. Secure messaging ....................................................................................................................... 5 Data Protection Guidance Only ......................................................................................................... 5 18. Cookie Detector.......................................................................................................................... 5 19. Where is site Hosted................................................................................................................... 5 20. Privacy Notice Checker............................................................................................................... 5 21. Data Protection Impact Assessment .......................................................................................... 6 22. Encryption software ................................................................................................................... 6 23. Inventory Management.............................................................................................................. 6 Remote Conferencing......................................................................................................................... 6 24. Remote Conferencing................................................................................................................. 6 Telecommunications .......................................................................................................................... 6 25. Mobile App Management........................................................................................................... 6
  • 3. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 3 of 7 copyright © March 2020 Guidance use Only Version 1.2 26. Flexible Phone Mobile and Landline Numbers in the UK .......................................................... 6 . 1. Cyber Security Advice and Guidance https://www.ncsc.gov.uk/ 2. Data protection Advice and Guidance https://ico.org.uk/ 3. Virus Checkers Windows 10 Windows Defender Antivirus https://www.microsoft.com/en-gb/windows/comprehensive-security https://www.bitdefender.com/solutions/free.html Android Avast https://www.avast.com/en-gb/free-mobile-security https://www.bitdefender.com/solutions/free.html Mac Avast https://www.avast.com/en-us/free-mac-security Bitdefender https://www.bitdefender.com/solutions/free.html
  • 4. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 4 of 7 copyright © March 2020 Guidance use Only Version 1.2 4. DNS https://www.quad9.net/ “Quad9, attackers and malware cannot leverage the known malicious domains to control your systems” Mac Windows https://www.quad9.net/tag/android/ Android 5. Content Filtering https://cleanbrowsing.org/filters#security 6. 2FA Multi factor Authentication Google Authenticator Playstore and Apple 7. Password management LastPass https://www.lastpass.com/ 8. Anti Ransomware https://www.avast.com/c-ransomware-protection-tool 9. Vulnerability Testing https://www.ssllabs.com/ssltest/ 10. Website Malware Scanner https://www.siteguarding.com/
  • 5. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 5 of 7 copyright © March 2020 Guidance use Only Version 1.2 11. VPN https://account.protonvpn.com/signup 12. Secure Email https://protonmail.com/ 13. Secure Sending of Attachments https://www.virtru.com/ 14. Cyber Security Training https://wizer-training.com/ 15. Find out if a password hack has exposed your password online https://breachalarm.com/ 16. Check if you have an email account that has been compromised in a data breach https://haveibeenpwned.com/ 17. Secure messaging https://signal.org/ Data Protection Guidance Only 18. Cookie Detector https://www.cookie-checker.com/ 19. Where is site Hosted https://lookup.icann.org/ 20. Privacy Notice Checker https://privacypolicycheck.ai/
  • 6. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 6 of 7 copyright © March 2020 Guidance use Only Version 1.2 21. Data Protection Impact Assessment https://www.cnil.fr/en/open-source-pia-software-helps-carry-out-data-protection-impact-assesment 22. Encryption software https://www.veracrypt.fr/en/Home.html 23. Inventory Management https://www.spiceworks.com/free-pc-network-inventory-software/ Remote Conferencing 24.Remote Conferencing www.roundee.io Great for Web Calls free for 14 participants www.zoom,us free for 45 Minutes https://cubedmobile.com/ Mobile Device Management reimagined providing a self-contained smartphone workspace encapsulated in an app, FreeFor small team of up to 5 users unlimited software. Telecommunications 25.Mobile App Management These Links I have collected from talking to clients and peers and they can be good low cost starting point for start- ups and SME’s etc, There are more , these seem to be the most popular 26. Flexible Phone Mobile and Landline Numbers in the UK https://www.flextel.com/
  • 7. Free Cyber Security and Data Protection for Working remotely for Free or Low Cost All Our Online Data Protection is Now Free www.thetrustbridge.co.uk/free Page 7 of 7 copyright © March 2020 Guidance use Only Version 1.2