Skip Ribbon Commands
Skip to main content
Mauritian National Computer Security Incident Response Team (CERT-MU)

Guidelines




Guidelines: Year 2017

  Guideline on Devising a Personal Back Up Plan

 Guideline on Email Encryption and Signatures 

 Guideline on Cyber Threat Intelligence  

 

Guidelines: Year 2016

 Cyber Security Guidelines for Employers and Employees   

 Guideline on IT security for Academic Institutions   

 Guideline on Mobile Payment Security    

 Guideline on Malware Incident Response   

 Guideline on Internet of Things (IoT) Security

 Guideline on Online Identity Theft 

 

Guidelines: Year 2015
 

Guideline on Cloud Business Applications
Guideline on Secure Disposal
Guideline on Ransomware Removal
Guideline on Responding to Social Media Attacks
Good Code of Practice on Digital Forensics
Guideline on Phishing Prevention

Guidelines: Year 2014
Guideline on Audit Log Management
Guideline on Incidents and Digital Evidence
Guideline on Cloud Security
 Guideline on Vulnerability and Patch Management   
 Guideline on Firewall  
Guideline on Safe BYOD Management​ 

Guidelines: Year 2013 

 Guideline on Implementing Cloud IAM  

 Guideline on Securing Public and Private Wi-Fi Networks  

 Guideline on Securing Mac OS X Mountain Lion

 Updated Guideline on Mobile Devices Security 

 Guideline on Public Key Infrastructure (PKI)  

 

 Guidelines: Year 2012 



 Technical Guideline on Public Internet Access Points 
  (Computer Clubs, Cyber-Caravans and Post-Offices)

    Guideline on Strong Passwords and Passphrase

 Guideline on Spam Control

 Guideline on Auditing and Log Management

 Guideline on Email Best Practices

 Guideline on Debit or Credit Cards Usage

 Guideline on Wireless Security

 Guideline on Incident Handling and Reporting

 Guideline on Windows 7 Parental Controls


 Guidelines: Year 2011


 Guideline on Intrusion Detection and Prevention Systems

 Instant Messaging and Chat Rooms – Play It Safe

 Guideline on Access Control

 Guideline on Secure Internet Banking

 Security Guideline for Standalone and Network Computers

 Guideline on Securing Cisco Routers

 Guideline on Information Security Policy

 Guidelines on Social Networks

 Guideline for Securing Your Web Browser

 Mobile Devices Security Guideline



 Guidelines: Year 2010


 Antivirus Best Practices