- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Board Toolkit
NCSC’s Board Toolkit will provide you with the tools you need to have the necessary conversations with your IT team/supplier.
NCSC’s Board Toolkit will provide you with the tools you need to have the necessary conversations with your IT team/supplier.
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialogThis guidance helps CEOs in public and private sector organisations manage a cyber incident. It sets out aspects to consider at the start of an incident and throughout it.
Read more Responding to a cyber incident -a guide for CEOs in modal dialogSextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]
Read more Sextortion Guidance in modal dialogA public sector tool for the improvement of cyber security in the supply chain.
Read more CSPST: Cyber Security Procurement Support Tool in modal dialogResources to build cyber resilience into youth work practice including some resources developed across the sector.
Read more Building cyber resilience in modal dialogOutlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.
Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog