- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
The Cyber Essentials Guide to Working with an External IT Company
Resource to support with Cyber Essentials readiness and certification.
Resource to support with Cyber Essentials readiness and certification.
This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialogThis guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.
Read more Guide to Phishing, Smishing and Vishing Scams in modal dialogThis guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialogPractical resources to help schools improve their cyber security. The NCSC has created a dedicated webpage of resources designed to help: Governing boards & senior leaders Staff IT teams/procurers/providers Other useful resources
Read more Cyber Security for Schools in modal dialogThe guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]
Read more Data Breach Guidance in modal dialogThe NCSC’s cyber security advice to protect you and your family, and the technology you rely on.
Read more Individuals & Families in modal dialog