Cyber Crime

Related resources

Guidance on effective communications in a cyber incident

Supporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.

Read more Guidance on effective communications in a cyber incident in modal dialog

Incident Management

The NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]

Read more Incident Management in modal dialog

SIM Swap Guidance

This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]

Read more SIM Swap Guidance in modal dialog

CyberByte – September 2025

This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]

Read more CyberByte – September 2025 in modal dialog

Police Scotland’s Cyber Security Strategy 2020

This strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.

Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialog
Back to top of the page