- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Reporting a cyber security incident to NCSC
Reporting a cyber security incident to NCSC.
Reporting a cyber security incident to NCSC.
This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]
Read more Cryptocurrency Scam Guidance in modal dialogThis month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs […]
Read more CyberByte – October 2025 in modal dialogThis month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]
Read more CyberByte – September 2025 in modal dialogThis guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialogAdvice on the selection and deployment of protective Domain Name Systems (DNS).
Read more Protective DNS for the private sector in modal dialogA free, 90 minute non technical workshop which helps organisations find out how resilient they are to cyber attacks and practise their response in a safe environment.
Read more Exercise in a Box workshops in modal dialog