- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
The Cyber Essentials Guide to Working with an External IT Company
Resource to support with Cyber Essentials readiness and certification.
Resource to support with Cyber Essentials readiness and certification.
This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogThis strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.
Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialogThis programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]
Read more Executive Education Training: Cyber Security in modal dialogWhat is cyber security? This guide covers steps to protect your data and devices, includes information on how to report a cyber crime and covers why you should get Cyber Essentials.
Read more Cyber Security Advice: Businesses and Charities in modal dialogThis month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs […]
Read more CyberByte – October 2025 in modal dialogSupporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.
Read more Guidance on effective communications in a cyber incident in modal dialog