Online safety

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Business email compromise: defending your organisation

This guidance helps small to medium sized organisations deal with business
email compromise (BEC). It provides actions to help businesses reduce the
likelihood of being affected by BEC, and includes steps to take if you think your
organisation has already been compromised.

Related resources

10 Steps to Cyber Security

This guidance aims to help organisations manage their cyber security risks by breaking down the task of protecting the organisation into 10 components. It is aimed at medium to large organisations that have someone dedicated to managing the organisation’s cyber security.

Read more 10 Steps to Cyber Security in modal dialog

Cyber Directory

Search the directory to find a Scottish company that can help provide you with a specific product or service. Businesses across any sector can quickly view Scottish technology businesses that can deliver solutions to a range of related issues, from […]

Read more Cyber Directory in modal dialog

Training for School Staff

Free cyber security training to raise awareness and help school staff manage some of the key cyber threats facing schools. The training is available in two formats: a scripted presentation pack or group delivery can be found below in the […]

Read more Training for School Staff in modal dialog

How to get cyber essentials certified IASME

NCSC Cyber Essentials Partner the IASME consortium can help your organisation undertake Cyber Essentials certification or if you want to know how you can become a Certification Body. 

Read more How to get cyber essentials certified IASME in modal dialog

Cryptocurrency Scam Guidance

This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]

Read more Cryptocurrency Scam Guidance in modal dialog
Back to top of the page