Resources to help public sector bodies embed cyber resilience into the supply chain process.
Read more Supporting guidance for public bodies in modal dialog
Sextortion is a type of cyber-enabled extortion which involves the threat of sharing sexual information, images or clips to extort money from you, whether images actually exist or not. Police Scotland have advice on what you can do to reduce […]
Read more Sextortion in modal dialog
This site is the home of security strategies, standards, policies, and guidance for UK government departments and their arm’s length bodies.
Read more Government Security in modal dialog
Cyber incident response toolkit to help organisations develop plans for responding to the threat of cyber attacks.
Read more Cyber Incident Response Toolkit in modal dialog
This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialog
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog