Resetting the relationship between local and national government. Read our Local Government White Paper

Cyber Unpacked

Cyber Unpacked is the first module of Unpacking Digitalisation, a series of short explainer videos on digital concepts, created to support officers and councillors who are digital newcomers.

Local Government Association logo and icons of 4 people and various office equipment on a purple background

Each video takes a term or concept that you might hear during conversations about cyber security and digital, and unpacks it using animated examples. These videos are a tool for members and officers to improve understanding of cyber risk in under 3 minutes, which can aid decision making in the long-term.

Cyber unpacked - Series 1

Cyber unpacked - Series 2

Shades of blue

Cyber unpacked - Series 1


What is cyber security?

The first video in the series will define cyber security, explain why cyber security is important, and introduce and explain some key terms you may hear when learning about cyber security.


What is a network?

The second video in Cyber Unpacked explains what a network is, outlines basic network components and explains the difference between public and private networks.


What is data?

The third video in the series will define data, describe the differences between data and information, define data-related terms, and link this back to cyber security in your council.


Data backups and the NCSC 3-2-1 rule

The fourth video in Cyber Unpacked defines what we mean by data backups, explains what the NCSC 3-2-1 rule is and how to apply it at your council.


What does good password security entail?

The fifth video of the series is all about password security. We define what a password is and lay out good password security practice for you to follow.


What is a cyber vulnerability?

This video explains all about cyber vulnerabilities, including what a zero-day vulnerability is, and the measures you can take to reduce the negative consequences of any which are exploited.


What is ransomware and malware?

This video defines malware and ransomware, and explains how ransomware can affect councils.


What is phishing?

This video will explain what phishing is, the tell tale signs of a phishing attack and what you can do to protect yourself from them.


What does good supply chain security entail?

This video explains why good supply chain security is needed and the practical steps you can take to achieve it.


What does BCP and DRP refer to?

This video explains what Business Continuity Plans and Disaster Recovery Plans are and how they relate to each other.

Shades of blue

Cyber unpacked - Series 2


What is encryption?

At the end of this video, the viewers will be able to: 

  • Define encryption 
  • Give a high-level overview of the encryption process 
  • Think about encrypting council data at rest and in transit 

What is a firewall?

At the end of this video, the viewers will be able to: 

  • Define the terms network and firewall 
  • Differentiate between a boundary firewall and internal firewalls. 
  • Outline some good practice around configuring firewalls 

What are cyber risks and exploits?

At the end of this video, the viewers will be able to: 

  • Define cyber risks and exploits 
  • Apply high level risk analysis to council assets 

What are cyber security controls?

At the end of this video, the viewers will be able to: 

  • Define security controls  
  • Explain the three main types and functions of security controls 

What are patching and lifecycle management?

At the end of this video, the viewers will be able to: 

  • Define patching and lifecycle management 
  • Understand the need for lifecycle management 

What is a distributed denial of service (DDoS) attack?

At the end of this video, the viewers will be able to: 

  • Define denial of service and distributed denial of service 
  • Outline harms that may emerge from such an attack 
  • Lay out initial steps to defend from distributed denial of service attacks 

What is penetration testing?

At the end of this video, the viewers will be able to: 

  • Define penetration testing 
  • Outline key considerations for effective penetration testing 

What does secure by design refer to?

At the end of this video, the viewers will be able to: 

  • Define ‘secure by design’ 
  • Outline the secure by design principles 

What is zero trust architecture?

At the end of this video, the viewers will be able to: 

  • Define zero trust architecture 
  • Lay out the pros and cons of implementing zero trust architecture

What are SIEM and SOC?

At the end of this video, the viewers will be able to: 

  • Define SIEM and SOC 
  • Relate both concepts