- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Phishing – how to report to the NCSC
How to report a phishing email to the NCSC.
How to report a phishing email to the NCSC.
This strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.
Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialogThis guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialogSupporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.
Read more Guidance on effective communications in a cyber incident in modal dialogThis month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]
Read more CyberByte – September 2025 in modal dialogThis guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]
Read more Cryptocurrency Scam Guidance in modal dialogGuidance that helps small to medium sized organisations prepare their response to and plan their recovery from a cyber incident.
Read more Small Business Guide: Response and Recovery in modal dialog