Advice and guidance

Related resources

Remote Access Fraud

The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]

Read more Remote Access Fraud in modal dialog

Cyber Resilience Framework

Provide a common, effective way for Scottish public sector organisations to assess their cyber resilience arrangements, identify areas of strength and weakness, gain reasonable confidence that they are adhering to minimum cyber resilience requirements, and take decisions on how/whether to […]

Read more Cyber Resilience Framework in modal dialog

Scottish Cyber Coordination Centre – Organisational Cyber Testing and Exercising Regime: Guidance

Outlines a cyber exercising regime to enhance preparedness and recovery from incidents across technical, operational, and strategic levels. It provides guidance for the Scottish public sector, offering a structured approach to testing and exercising, tailored to an organisation’s size.

Read more Scottish Cyber Coordination Centre – Organisational Cyber Testing and Exercising Regime: Guidance in modal dialog

Data Breach Guidance

The guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]

Read more Data Breach Guidance in modal dialog

Sextortion Guidance

Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]

Read more Sextortion Guidance in modal dialog

Executive Education Training: Cyber Security

This programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]

Read more Executive Education Training: Cyber Security in modal dialog
Back to top of the page