Advice and guidance

Related resources

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog

Incident Management

The NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]

Read more Incident Management in modal dialog

Sextortion Guidance

Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]

Read more Sextortion Guidance in modal dialog

Remote Access Fraud

The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]

Read more Remote Access Fraud in modal dialog
Back to top of the page