Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource 10 Steps to Cyber Security

10 Steps to Cyber Security

This guidance aims to help organisations manage their cyber security risks by breaking down the task of protecting the organisation into 10 components. It is aimed at medium to large organisations that have someone dedicated to managing the organisation’s cyber security.

Related resources

Small Charity Guide

The advice in the Cyber Security: Small Charity Guide will significantly increase your protection from the most common types of cyber crime. The five topics covered in the guidance are easy to understand, and are free or cost little to implement. 

Read more Small Charity Guide in modal dialog

The Cyber Assessment Framework (CAF) / NCSC CAF Guidance

The Cyber Assessment Framework (CAF) provides guidance for organisations responsible for vitally important services and activities.

Read more The Cyber Assessment Framework (CAF) / NCSC CAF Guidance in modal dialog

Scottish Public Sector Supplier Cyber Security Guidance Note

The security of supply chains is increasingly important as we often see cyber incidents affect public sector bodies indirectly through their suppliers. This guidance note promotes the adoption of a consistent approach to supplier cyber security across the Scottish public […]

Read more Scottish Public Sector Supplier Cyber Security Guidance Note in modal dialog

Cyber Aware Action Plan

Learn how to protect yourself or your small business online with the Cyber Aware Action Plan. Answer a few questions on topics like passwords and two-factor authentication, and get a free personalised list of actions that will help you improve […]

Read more Cyber Aware Action Plan in modal dialog

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog
Back to top of the page