Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Cyber Resilience Framework

Cyber Resilience Framework

Provide a common, effective way for Scottish public sector organisations to assess their cyber resilience arrangements, identify areas of strength and weakness, gain reasonable confidence that they are adhering to minimum cyber resilience requirements, and take decisions on how/whether to achieve higher levels of cyber resilience on a risk-based and proportionate basis.

Related resources

Incident Response Helpline

If you are concerned your organisation has been the victim of either a cyber or financial fraud attack, you can call the Incident Response helpline. The free helpline will help organisations confirm they have been the victim of an attack […]

Read more Incident Response Helpline in modal dialog

Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure

Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.

Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog

Scottish Public Sector Cyber Resilience Framework v2

Sets out the second iteration of the Scottish public sector cyber resilience framework. The framework supports Scottish public sector organisations, to improve their cyber resilience and to comply with a range of requirements.

Read more Scottish Public Sector Cyber Resilience Framework v2 in modal dialog

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog
Back to top of the page