The NCSC's CEO says:
In this year’s Annual Review , we reflect on key developments, achievements and trends from the last year. We’ve also included five case studies on areas of specific interest to the cyber security community – setting out the NCSC’s thinking on AI cyber security, on securing the UK’s critical national infrastructure, on defending our democratic processes, the future of UK cyber security services (including the NCSC’s role in their provision) and reflecting back on what we have learned from Russia’s invasion of Ukraine.
It says that they will focus their work on three priorities over the coming year:
1. Improve the UK's cyber resilience to the most significant cyber risks.
2. Retain their edge - as technology is developing faster than ever they must ensure the UK retains its edge in the face of future cyber security challenges, including those emanating from China.
3. The NCSC will only be successful in its mission if they are the strongest organisation they can be.
This year has seen the emergence of state-aligned actors as a new and emerging cyber threat to critical national infrastructure, the continuation of Russia's invasion of Ukraine and the concerns about the potential risks of AI.
Ransomware is still one of the main cyber threats facing the UK and all domestic organisations should take actions to protect themselves. The now-normal approach of stealing and encrypting data continues to be the main tactic used by cyber criminals. However, data extortion attacks, in which data is stolen but not encrypted are a growing trend.

The full report can be read: NCSC Annual Review 2023
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
m. Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to