- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
The Cyber Essentials Guide to Working with an External IT Company
Resource to support with Cyber Essentials readiness and certification.
Resource to support with Cyber Essentials readiness and certification.
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Read more CSPST: Guidance for buyers in modal dialogPolice Scotland shares advice for students on how to stay safe online. Common frauds that students are experiencing today can range from the more recognisable face-to-face to those carried out by someone anonymously online. This guide will equip you with […]
Read more Student online safety guide 2025 in modal dialogThe NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]
Read more Incident Management in modal dialogThis booklet outlines a number of the most common online frauds and scams.
Read more Little Book of Big Scams in modal dialogThis month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]
Read more CyberByte – September 2025 in modal dialogResources to help public sector bodies embed cyber resilience into the supply chain process.
Read more Supporting guidance for public bodies in modal dialog