Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource The Cyber Essentials Guide to Working with an External IT Company

The Cyber Essentials Guide to Working with an External IT Company

Resource to support with Cyber Essentials readiness and certification.

Related resources

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog

Police Scotland’s Cyber Security Strategy 2020

This strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.

Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialog

Executive Education Training: Cyber Security

This programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]

Read more Executive Education Training: Cyber Security in modal dialog

Cyber Security Advice: Businesses and Charities

What is cyber security? This guide covers steps to protect your data and devices, includes information on how to report a cyber crime and covers why you should get Cyber Essentials.

Read more Cyber Security Advice: Businesses and Charities in modal dialog

CyberByte – October 2025

This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs […]

Read more CyberByte – October 2025 in modal dialog

Guidance on effective communications in a cyber incident

Supporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.

Read more Guidance on effective communications in a cyber incident in modal dialog
Back to top of the page