|CookieConsent||https://www.clc-uk.org/||Stores the user's cookie consent state for the current domain||1 Year||HTTP|
|_ga||https://www.clc-uk.org/||Registers a unique ID that is used to generate statistical data on how the visitor uses the website.||1 Year||HTTP|
|_gat||https://www.clc-uk.org/||Used by Google Analytics to throttle request rate||Session||HTTP|
|_gid||https://www.clc-uk.org/||Registers a unique ID that is used to generate statistical data on how the visitor uses the website.||Session||HTTP|
|collect||google-analytics.com||Used to send data to Google Analytics about the visitor's device and behaviour. Tracks the visitor across devices and marketing channels.||Session||Pixel|
|GPS||youtube.com||Registers a unique ID on mobile devices to enable tracking based on geographical GPS location.||Session||HTTP|
|VISITOR_INFO1_LIVE||youtube.com||Tries to estimate the users' bandwidth on pages with integrated YouTube videos.||1 Year||HTTP|
|YSC||youtube.com||Registers a unique ID to keep statistics of what videos from YouTube the user has seen.||Session||HTTP|
The National Cyber Security Centre has a five step plan to help businesses secure themselves and so reduce the risk of becoming a victim of a cyber attack.
Following their five quick and easy steps outlined in the guide could save time, money and even your
business’ reputation. The guide can’t guarantee protection from all types of cyber attack, but the steps outlined can significantly reduce the chances of your business becoming a victim of cyber crime.
See the guide here and help protect yourself and your business.
If you want to improve your cyber security further, then you can also seek certification under the Cyber Essentials scheme, which has the benefit of demonstrating to your clients (or prospective clients) that you take the protection of their data seriously.
5 free and easy-to-implement tips that can help prevent malware damaging your organisation.
5 quick tips that can help keep your mobile devices (and the information stored on them) secure.
5 things to keep in mind when using passwords.
Steps to help you identify the most common phishing attacks.