This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog
Provide a common, effective way for Scottish public sector organisations to assess their cyber resilience arrangements, identify areas of strength and weakness, gain reasonable confidence that they are adhering to minimum cyber resilience requirements, and take decisions on how/whether to […]
Read more Cyber Resilience Framework in modal dialog
This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialog
What is cyber security? This guide covers steps to protect your data and devices, includes information on how to report a cyber crime and covers why you should get Cyber Essentials.
Read more Cyber Security Advice: Businesses and Charities in modal dialog
Research report into young people’s experiences of issues in the digital world and the role of youth work in supporting young people to develop cyber resilient practices.
Read more Youth Work and Cyber Resilience – What Young People Said in modal dialog
The Cyber Essentials Readiness Tool helps you meet Cyber Essentials requirements. The tool includes questions related to the main Cyber Essentials criteria and provides tailored advice to prepare you for certification. This resources provides support with Cyber Essentials readiness and certification
Read more Cyber Essentials Readiness Tool in modal dialog